Opleiding: CompTIA-C CompTIA Cloud+ (CV0-003) E-Learning (English)
Tijdens de CompTIA Cloud + training bekijk je cloudgebaseerde infrastructuurdiensten in de context van bredere IT-systeemactiviteiten, ongeacht het platform. Jij leert vaardigheden die nodig zijn voor het implementeren en automatiseren van veilige cloudomgevingen die de hoge beschikbaarheid van bedrijfssystemen en gegevens ondersteunen.
Na afronding van deze training kun je onder andere:
- Beveiligen van een netwerk in een cloud omgeving
- Maatregelen implementeren om aan de security eisen te voldoen
- Uitrollen van cloud networking solutions
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.Doelgroep
Jobs That Use Cloud+:- Sr. Systems Administrator
- Cloud Engineer
- Systems Engineer
- Sr. Network Administrator
- Sr. Network Engineer
- Cloud Specialist
- Cloud Project Manager
- Sr. Systems Administrator
- Cloud Engineer
- Systems Engineer
- Sr. Network Administrator
- Sr. Network Engineer
- Cloud Specialist
- Cloud Project Manager
Voorkennis
CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Cloud Architecture and Design 13%Compare and contrast the different types of cloud models.- Deployment models
- Service models
- Advanced cloud services
- Shared responsibility model
- Requirements
- Standard templates
- Licensing
- User density
- System load
- Trend analysis
- Performance capacity planning
- Hypervisors
- Oversubscription
- Regions and zones
- Applications
- Containers
- Clusters
- High availability of network functions
- Avoid single points of failure
- Scalability
- Requirement analysis
- Environments
- Testing techniques
- Identification and authorization
- Directory services
- Federation
- Certificate management
- Multifactor authentication (MFA)
- Single sign-on (SSO)
- Public key infrastructure (PKI)
- Secret management
- Key management
- Network segmentation
- Protocols
- Network services
- Log and event monitoring
- Network flows
- Hardening and configuration changes
- Policies
- User permissions
- Antivirus/anti-malware/endpoint detection and response (EDR)
- Host-based IDS (HIDS)/Host-based IPS (HIPS)
- Hardened baselines
- File integrity
- Log and event monitoring
- Configuration management
- Builds
- Operating system (OS) upgrades
- Encryption
- Mandatory access control
- Software firewall
- Encryption
- Integrity
- Classification
- Segmentation
- Access control
- Impact of laws and regulations
- Records management
- Data loss prevention (DLP)
- Cloud access security broker (CASB)
- Tools
- Vulnerability assessment
- Security patches
- Risk register
- Prioritization of patch application
- Deactivate default accounts
- Impacts of security tools on systems and services
- Effects of cloud service models on security implementation
- Preparation
- Incident response procedures
- Subscription services
- Provisioning resources
- Application
- Deploying virtual machines (VMs) and custom images
- Templates
- Identity management
- Containers
- Auto-scaling
- Post-deployment validation
- Types
- Tiers
- Input/output operations per second (IOPS) and read/write
- Protocols
- Redundant array of inexpensive disks (RAID)
- Storage system features
- User quotas
- Hyperconverged
- Software-defined storage (SDS)
- Services
- Virtual private networks (VPNs)
- Virtual routing
- Network appliances
- Virtual private cloud (VPC)
- VLAN/VXLAN/GENEVE
- Single root input/output virtualization (SR-IOV)
- Software-defined network (SDN)
- Virtualization
- Central processing unit (CPU)/ virtual CPU (vCPU)
- Graphics processing unit (GPU)
- Clock speed/Instructions per cycle (IPC)
- Hyperconverged
- Memory
- Physical to virtual (P2V)
- Virtual to virtual (V2V)
- Cloud-to-cloud migrations
- Storage migrations
- Database migrations
- Logging
- Monitoring
- Alerting
- Confirm completion of backups
- Life-cycle management
- Change management
- Asset management
- Patching
- Impacts of process improvements on systems
- Upgrade methods
- Dashboard and reporting
- Right-sizing
- Compute
- Storage
- Network
- Placement
- Device drivers and firmware
- Infrastructure as code
- Continuous integration/continuous deployment (CI/CD)
- Version control
- Configuration management
- Containers
- Automation activities
- Secure scripting
- Orchestration sequencing
- Backup types
- Backup objects
- Backup targets
- Backup and restore policies
- Restoration methods
- Failovers
- Failback
- Restore backups
- Replication
- Network configurations
- On-premises and cloud sites
- Requirements
- Documentation
- Geographical datacenter requirements
- Always consider corporate policies, procedures, and impacts before implementing changes.
- Identify the problem
- Establish a theory of probable
- Test the theory to determine cause
- Establish a plan of action to resolve the problem and implement the solution
- Verify full system functionality and, if applicable, implement preventive measures
- Document the findings, actions, and outcomes throughout the process.
- Given a scenario, troubleshoot security issues.
- Privilege
- Authentication
- Authorization
- Security groups
- Keys and certificates
- Misconfigured or misapplied policies
- Data security issues
- Exposed endpoints
- Misconfigured or failed security appliances
- Unsupported protocols
- External/internal attacks
- Connectivity issues
- Performance degradation
- Configurations
- Applications in containers
- Misconfigured templates
- Missing or incorrect tags
- Insufficient capacity
- Licensing issues
- Vendor-related issues
- Network security group misconfigurations
- Common networking configuration issues
- Network troubleshooting tools
- Resource utilization
- Application
- Incorrectly configured or failed load balancing
- Account mismatches
- Change management failures
- Server name changes
- IP address changes
- Location changes
- Version/feature mismatch
- Automation tool incompatibility
- Job validation issue
- Patching failure
- Deployment models
- Service models
- Advanced cloud services
- Shared responsibility model
- Requirements
- Standard templates
- Licensing
- User density
- System load
- Trend analysis
- Performance capacity planning
- Hypervisors
- Oversubscription
- Regions and zones
- Applications
- Containers
- Clusters
- High availability of network functions
- Avoid single points of failure
- Scalability
- Requirement analysis
- Environments
- Testing techniques
- Identification and authorization
- Directory services
- Federation
- Certificate management
- Multifactor authentication (MFA)
- Single sign-on (SSO)
- Public key infrastructure (PKI)
- Secret management
- Key management
- Network segmentation
- Protocols
- Network services
- Log and event monitoring
- Network flows
- Hardening and configuration changes
- Policies
- User permissions
- Antivirus/anti-malware/endpoint detection and response (EDR)
- Host-based IDS (HIDS)/Host-based IPS (HIPS)
- Hardened baselines
- File integrity
- Log and event monitoring
- Configuration management
- Builds
- Operating system (OS) upgrades
- Encryption
- Mandatory access control
- Software firewall
- Encryption
- Integrity
- Classification
- Segmentation
- Access control
- Impact of laws and regulations
- Records management
- Data loss prevention (DLP)
- Cloud access security broker (CASB)
- Tools
- Vulnerability assessment
- Security patches
- Risk register
- Prioritization of patch application
- Deactivate default accounts
- Impacts of security tools on systems and services
- Effects of cloud service models on security implementation
- Preparation
- Incident response procedures
- Subscription services
- Provisioning resources
- Application
- Deploying virtual machines (VMs) and custom images
- Templates
- Identity management
- Containers
- Auto-scaling
- Post-deployment validation
- Types
- Tiers
- Input/output operations per second (IOPS) and read/write
- Protocols
- Redundant array of inexpensive disks (RAID)
- Storage system features
- User quotas
- Hyperconverged
- Software-defined storage (SDS)
- Services
- Virtual private networks (VPNs)
- Virtual routing
- Network appliances
- Virtual private cloud (VPC)
- VLAN/VXLAN/GENEVE
- Single root input/output virtualization (SR-IOV)
- Software-defined network (SDN)
- Virtualization
- Central processing unit (CPU)/ virtual CPU (vCPU)
- Graphics processing unit (GPU)
- Clock speed/Instructions per cycle (IPC)
- Hyperconverged
- Memory
- Physical to virtual (P2V)
- Virtual to virtual (V2V)
- Cloud-to-cloud migrations
- Storage migrations
- Database migrations
- Logging
- Monitoring
- Alerting
- Confirm completion of backups
- Life-cycle management
- Change management
- Asset management
- Patching
- Impacts of process improvements on systems
- Upgrade methods
- Dashboard and reporting
- Right-sizing
- Compute
- Storage
- Network
- Placement
- Device drivers and firmware
- Infrastructure as code
- Continuous integration/continuous deployment (CI/CD)
- Version control
- Configuration management
- Containers
- Automation activities
- Secure scripting
- Orchestration sequencing
- Backup types
- Backup objects
- Backup targets
- Backup and restore policies
- Restoration methods
- Failovers
- Failback
- Restore backups
- Replication
- Network configurations
- On-premises and cloud sites
- Requirements
- Documentation
- Geographical datacenter requirements
- Always consider corporate policies, procedures, and impacts before implementing changes.
- Identify the problem
- Establish a theory of probable
- Test the theory to determine cause
- Establish a plan of action to resolve the problem and implement the solution
- Verify full system functionality and, if applicable, implement preventive measures
- Document the findings, actions, and outcomes throughout the process.
- Given a scenario, troubleshoot security issues.
- Privilege
- Authentication
- Authorization
- Security groups
- Keys and certificates
- Misconfigured or misapplied policies
- Data security issues
- Exposed endpoints
- Misconfigured or failed security appliances
- Unsupported protocols
- External/internal attacks
- Connectivity issues
- Performance degradation
- Configurations
- Applications in containers
- Misconfigured templates
- Missing or incorrect tags
- Insufficient capacity
- Licensing issues
- Vendor-related issues
- Network security group misconfigurations
- Common networking configuration issues
- Network troubleshooting tools
- Resource utilization
- Application
- Incorrectly configured or failed load balancing
- Account mismatches
- Change management failures
- Server name changes
- IP address changes
- Location changes
- Version/feature mismatch
- Automation tool incompatibility
- Job validation issue
- Patching failure
€690
ex. BTW
Aangeboden door

Master it Training
Onderwerp
CompTIA A+ / Network+ / Security+
Cloud Computing
Engels
Niveau
Duur
0 dagen
Looptijd
40 dagen
Taal
en
Type product
training
Lesvorm
E-Learning
Aantal deelnemers
Min: 1
Max: 9
Keurmerken aanbieder
Microsoft Learning Partner
NRTO