Opleiding: CompTIA-C CompTIA Cloud+ (CV0-003) Active Learning (English)
Tijdens de CompTIA Cloud + training bekijk je cloudgebaseerde infrastructuurdiensten in de context van bredere IT-systeemactiviteiten, ongeacht het platform. Jij leert vaardigheden die nodig zijn voor het implementeren en automatiseren van veilige cloudomgevingen die de hoge beschikbaarheid van bedrijfssystemen en gegevens ondersteunen.
Na afronding van deze training kun je onder andere:
- Beveiligen van een netwerk in een cloud omgeving
- Maatregelen implementeren om aan de security eisen te voldoen
- Uitrollen van cloud networking solutions
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
CompTIA Cloud+ validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data. CompTIA Cloud+ views cloud-based infrastructure services in the context of broader IT systems operations regardless of the platform. Migrating to the cloud presents opportunities to deploy, optimize, and protect mission critical applications and data storage. CompTIA Cloud+ validates the technical skills needed to secure these valuable assets. The reality of operating multicloud environments poses new challenges. CompTIA Cloud+ is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ now features flexible training options including self-paced learning, live online training, custom training and labs to advance the career development of IT professionals in server administration.Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
- Je bepaalt zelf je leertempo.
- De trainer coacht je bij het definiëren van jouw leertraject.
- Je onthoudt en begrijpt je nieuwe kennis beter.
- Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
Jobs That Use Cloud+:- Sr. Systems Administrator
- Cloud Engineer
- Systems Engineer
- Sr. Network Administrator
- Sr. Network Engineer
- Cloud Specialist
- Cloud Project Manager
- Sr. Systems Administrator
- Cloud Engineer
- Systems Engineer
- Sr. Network Administrator
- Sr. Network Engineer
- Cloud Specialist
- Cloud Project Manager
Voorkennis
CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Cloud Architecture and Design 13%Compare and contrast the different types of cloud models.- Deployment models
- Service models
- Advanced cloud services
- Shared responsibility model
- Requirements
- Standard templates
- Licensing
- User density
- System load
- Trend analysis
- Performance capacity planning
- Hypervisors
- Oversubscription
- Regions and zones
- Applications
- Containers
- Clusters
- High availability of network functions
- Avoid single points of failure
- Scalability
- Requirement analysis
- Environments
- Testing techniques
- Identification and authorization
- Directory services
- Federation
- Certificate management
- Multifactor authentication (MFA)
- Single sign-on (SSO)
- Public key infrastructure (PKI)
- Secret management
- Key management
- Network segmentation
- Protocols
- Network services
- Log and event monitoring
- Network flows
- Hardening and configuration changes
- Policies
- User permissions
- Antivirus/anti-malware/endpoint detection and response (EDR)
- Host-based IDS (HIDS)/Host-based IPS (HIPS)
- Hardened baselines
- File integrity
- Log and event monitoring
- Configuration management
- Builds
- Operating system (OS) upgrades
- Encryption
- Mandatory access control
- Software firewall
- Encryption
- Integrity
- Classification
- Segmentation
- Access control
- Impact of laws and regulations
- Records management
- Data loss prevention (DLP)
- Cloud access security broker (CASB)
- Tools
- Vulnerability assessment
- Security patches
- Risk register
- Prioritization of patch application
- Deactivate default accounts
- Impacts of security tools on systems and services
- Effects of cloud service models on security implementation
- Preparation
- Incident response procedures
- Subscription services
- Provisioning resources
- Application
- Deploying virtual machines (VMs) and custom images
- Templates
- Identity management
- Containers
- Auto-scaling
- Post-deployment validation
- Types
- Tiers
- Input/output operations per second (IOPS) and read/write
- Protocols
- Redundant array of inexpensive disks (RAID)
- Storage system features
- User quotas
- Hyperconverged
- Software-defined storage (SDS)
- Services
- Virtual private networks (VPNs)
- Virtual routing
- Network appliances
- Virtual private cloud (VPC)
- VLAN/VXLAN/GENEVE
- Single root input/output virtualization (SR-IOV)
- Software-defined network (SDN)
- Virtualization
- Central processing unit (CPU)/ virtual CPU (vCPU)
- Graphics processing unit (GPU)
- Clock speed/Instructions per cycle (IPC)
- Hyperconverged
- Memory
- Physical to virtual (P2V)
- Virtual to virtual (V2V)
- Cloud-to-cloud migrations
- Storage migrations
- Database migrations
- Logging
- Monitoring
- Alerting
- Confirm completion of backups
- Life-cycle management
- Change management
- Asset management
- Patching
- Impacts of process improvements on systems
- Upgrade methods
- Dashboard and reporting
- Right-sizing
- Compute
- Storage
- Network
- Placement
- Device drivers and firmware
- Infrastructure as code
- Continuous integration/continuous deployment (CI/CD)
- Version control
- Configuration management
- Containers
- Automation activities
- Secure scripting
- Orchestration sequencing
- Backup types
- Backup objects
- Backup targets
- Backup and restore policies
- Restoration methods
- Failovers
- Failback
- Restore backups
- Replication
- Network configurations
- On-premises and cloud sites
- Requirements
- Documentation
- Geographical datacenter requirements
- Always consider corporate policies, procedures, and impacts before implementing changes.
- Identify the problem
- Establish a theory of probable
- Test the theory to determine cause
- Establish a plan of action to resolve the problem and implement the solution
- Verify full system functionality and, if applicable, implement preventive measures
- Document the findings, actions, and outcomes throughout the process.
- Given a scenario, troubleshoot security issues.
- Privilege
- Authentication
- Authorization
- Security groups
- Keys and certificates
- Misconfigured or misapplied policies
- Data security issues
- Exposed endpoints
- Misconfigured or failed security appliances
- Unsupported protocols
- External/internal attacks
- Connectivity issues
- Performance degradation
- Configurations
- Applications in containers
- Misconfigured templates
- Missing or incorrect tags
- Insufficient capacity
- Licensing issues
- Vendor-related issues
- Network security group misconfigurations
- Common networking configuration issues
- Network troubleshooting tools
- Resource utilization
- Application
- Incorrectly configured or failed load balancing
- Account mismatches
- Change management failures
- Server name changes
- IP address changes
- Location changes
- Version/feature mismatch
- Automation tool incompatibility
- Job validation issue
- Patching failure
- Deployment models
- Service models
- Advanced cloud services
- Shared responsibility model
- Requirements
- Standard templates
- Licensing
- User density
- System load
- Trend analysis
- Performance capacity planning
- Hypervisors
- Oversubscription
- Regions and zones
- Applications
- Containers
- Clusters
- High availability of network functions
- Avoid single points of failure
- Scalability
- Requirement analysis
- Environments
- Testing techniques
- Identification and authorization
- Directory services
- Federation
- Certificate management
- Multifactor authentication (MFA)
- Single sign-on (SSO)
- Public key infrastructure (PKI)
- Secret management
- Key management
- Network segmentation
- Protocols
- Network services
- Log and event monitoring
- Network flows
- Hardening and configuration changes
- Policies
- User permissions
- Antivirus/anti-malware/endpoint detection and response (EDR)
- Host-based IDS (HIDS)/Host-based IPS (HIPS)
- Hardened baselines
- File integrity
- Log and event monitoring
- Configuration management
- Builds
- Operating system (OS) upgrades
- Encryption
- Mandatory access control
- Software firewall
- Encryption
- Integrity
- Classification
- Segmentation
- Access control
- Impact of laws and regulations
- Records management
- Data loss prevention (DLP)
- Cloud access security broker (CASB)
- Tools
- Vulnerability assessment
- Security patches
- Risk register
- Prioritization of patch application
- Deactivate default accounts
- Impacts of security tools on systems and services
- Effects of cloud service models on security implementation
- Preparation
- Incident response procedures
- Subscription services
- Provisioning resources
- Application
- Deploying virtual machines (VMs) and custom images
- Templates
- Identity management
- Containers
- Auto-scaling
- Post-deployment validation
- Types
- Tiers
- Input/output operations per second (IOPS) and read/write
- Protocols
- Redundant array of inexpensive disks (RAID)
- Storage system features
- User quotas
- Hyperconverged
- Software-defined storage (SDS)
- Services
- Virtual private networks (VPNs)
- Virtual routing
- Network appliances
- Virtual private cloud (VPC)
- VLAN/VXLAN/GENEVE
- Single root input/output virtualization (SR-IOV)
- Software-defined network (SDN)
- Virtualization
- Central processing unit (CPU)/ virtual CPU (vCPU)
- Graphics processing unit (GPU)
- Clock speed/Instructions per cycle (IPC)
- Hyperconverged
- Memory
- Physical to virtual (P2V)
- Virtual to virtual (V2V)
- Cloud-to-cloud migrations
- Storage migrations
- Database migrations
- Logging
- Monitoring
- Alerting
- Confirm completion of backups
- Life-cycle management
- Change management
- Asset management
- Patching
- Impacts of process improvements on systems
- Upgrade methods
- Dashboard and reporting
- Right-sizing
- Compute
- Storage
- Network
- Placement
- Device drivers and firmware
- Infrastructure as code
- Continuous integration/continuous deployment (CI/CD)
- Version control
- Configuration management
- Containers
- Automation activities
- Secure scripting
- Orchestration sequencing
- Backup types
- Backup objects
- Backup targets
- Backup and restore policies
- Restoration methods
- Failovers
- Failback
- Restore backups
- Replication
- Network configurations
- On-premises and cloud sites
- Requirements
- Documentation
- Geographical datacenter requirements
- Always consider corporate policies, procedures, and impacts before implementing changes.
- Identify the problem
- Establish a theory of probable
- Test the theory to determine cause
- Establish a plan of action to resolve the problem and implement the solution
- Verify full system functionality and, if applicable, implement preventive measures
- Document the findings, actions, and outcomes throughout the process.
- Given a scenario, troubleshoot security issues.
- Privilege
- Authentication
- Authorization
- Security groups
- Keys and certificates
- Misconfigured or misapplied policies
- Data security issues
- Exposed endpoints
- Misconfigured or failed security appliances
- Unsupported protocols
- External/internal attacks
- Connectivity issues
- Performance degradation
- Configurations
- Applications in containers
- Misconfigured templates
- Missing or incorrect tags
- Insufficient capacity
- Licensing issues
- Vendor-related issues
- Network security group misconfigurations
- Common networking configuration issues
- Network troubleshooting tools
- Resource utilization
- Application
- Incorrectly configured or failed load balancing
- Account mismatches
- Change management failures
- Server name changes
- IP address changes
- Location changes
- Version/feature mismatch
- Automation tool incompatibility
- Job validation issue
- Patching failure
