Loading...
Login / Register

CompTIA Cloud+

The CompTIA Cloud+ exam certifies that the successful candidate has the knowledge and skills required to understand standard cloud terminologies and methodologies to implement, maintain, and deliver cloud technologies an... Show More
Course Prerequisites:
Recommended experience includes at least 24-36 months of work experience in IT networking, storage, or data ce... Show More
Add to Cart Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Course Price (ILT)
R7,827.82

* incl. VAT

Duration
5 Days

Course Content

1.0 Cloud Concepts and Models

1.1 Compare and contrast cloud services.

  • SaaS (according to NIST)
  • IaaS (according to NIST)
  • CaaS (according to NIST)
  • PaaS (according to NIST)
  • XaaS (according to NIST)
  • DaaS (according to NIST)
  • BPaaS
  • Accountability and responsibility based on service models

See fewer details

1.2 Compare and contrast cloud delivery models and services.

  • Private
  • Public
  • Hybrid
  • Community
  • On-premise vs. Off-premise hosting
  • Accountability and resp
  • onsibility based on delivery models
  • Security differences between models
  • Multitenancy issues
  • Data segregation
  • Network isolation
  • Check laws and regulations
  • Functionality and performance validation based on chosen delivery model
  • Orchestration platforms

+ See more details

1.3 Summarize cloud characteristics and terms.

  • Elasticity
  • On-demand self serve/just in time service
  • Pay-as-you-grow
  • Chargeback
  • Ubiquitous access
  • Metering resource pooling
  • Multitenancy
  • Cloud bursting
  • Rapid deployment
  • Automation

+ See more details

1.4 Explain object storage concepts.

  • Object ID
  • Metadata
  • Data/blob
  • Extended metadata
  • Policies
  • Replicas
  • Access control

+ See more details

2.0 Virtualization

2.1 Explain the differences between hypervisor types.

  • Type I and Type II
  • Bare metal vs. OS dependant
  • Performance and overhead considerations
  • Hypervisor specific system requirements
  • Proprietary vs. open source
  • Consumer vs. enterprise use
  • Workstation vs. infrastructure

+ See more details

2.2 Install, configure, and manage virtual machines and devices.

  • Creating, importing, and exporting template and virtual machines
  • Install guest tools
  • Drives
  • Management tools
  • Snapshots and cloning
  • Image backups vs. file backups
  • Virtual NIC
  • Virtual network
  • IP address
  • Default gateway
  • Netmask
  • Bridging
  • Virtual disks
  • Limits
  • SCSI/ATA ID
  • Virtual switches
  • VLAN
  • Interface configuration
  • VLAN
  • Assign IDs
  • Bind interfaces
  • VSAN
  • Assign IDs

+ See more details

2.3 Given a scenario, perform virtual resource migration.

  • Establish requirements
  • Maintenance scheduling
  • Reasons
  • Performance issues
  • Testing
  • Upgrading
  • Utilization
  • Storage migration
  • Virtual vs. physical
  • Online vs. offline migrations
  • Physical to Virtual (P2V)
  • Virtual to Virtual (V2V)
  • Virtual to Physical (V2P)

+ See more details

2.4 Explain the benefits of virtualization in a cloud environment.

  • Shared resources
  • Elasticity
  • Time to service/mean time to implement
  • Resource pooling
  • Scalable
  • Available
  • Portable
  • Network and application isolation
  • Infrastructure consolidation
  • Virtual datacenter creation

+ See more details

2.5 Compare and contrast virtual components used to construct a cloud environment.

  • Virtual network components
  • Virtual NIC
  • Virtual HBA
  • Virtual router
  • Shared memory
  • Virtual CPU
  • Storage Virtualization
  • Shared storage
  • Clustered storage
  • NPIV

+ See more details

3.0 Infrastructure

3.1 Compare and contrast various storage technologies.

  • Network Attached Storage (NAS)
  • File level access
  • Shared storage
  • Direct Attached Storage (DAS)
  • Block level access
  • Dedicated storage
  • Storage Area Network (SAN)
  • Block level access
  • Shared storage
  • HBAs
  • LUN masking
  • Zoning
  • WWN
  • Fiber channel protocols
  • Different access protocols
  • FCoE
  • FC
  • Ethernet
  • iSCSI
  • Protocols and applications
  • IP
  • FCP
  • iSCSI
  • Management differences

+ See more details

3.2 Explain storage configuration concepts.

  • Disk types
  • SSD vs. spinning
  • Interfaces types
  • Access speed
  • Tiering
  • Performance levels of each tier
  • Policies
  • RAID levels
  • RAID 1
  • RAID 0
  • RAID 1+0
  • RAID 0+1
  • RAID 5
  • RAID 6
  • File system types
  • UFS
  • EXT
  • NTFS
  • FAT
  • VMFS
  • ZFS

+ See more details

3.3 Execute storage provisioning.

  • Creating LUNs
  • Creating network shares
  • Zoning and LUN masking
  • Multipathing
  • Implications of adding capacity to a NAS and SAN
  • Impact to operations
  • Downtime
  • Best practices

+ See more details

3.4 Given a scenario, implement appropriate network configurations.

  • NAT
  • PAT
  • Subnetting/Supernetting
  • VLAN and VLAN tagging
  • Network port configurations
  • Switching and routing in physical and virtual environments
  • Routing tables

+ See more details

3.5 Explain the importance of network optimization.

  • WAN
  • LAN
  • MAN
  • Bandwidth
  • Latency
  • Compression
  • Caching
  • Load balancing
  • Devices on the same subnet

+ See more details

3.6 Given a scenario, troubleshoot basic network connectivity issues.

  • Tools
  • ping
  • tracer
  • t/traceroute
  • telnet
  • netstat
  • nslookup/dig
  • ipconfig/ifconfig
  • route
  • arp
  • Review documentation and device configuration settings
  • Review system logs

+ See more details

3.7 Explain common network protocols, ports, and topologies.

  • Truck ports
  • Port binding/aggregation
  • Common ports
  • 80
  • 21
  • 22
  • 25
  • 53
  • 443
  • 68
  • Common protocols
  • HTTP
  • FTP
  • HTTPS
  • FTPS
  • SFTP
  • SSH
  • DNS
  • DHCP
  • SMTP
  • Types of networks
  • intranet
  • extranet
  • internet

+ See more details

3.8 Explain common hardware resources and features used to enable virtual environments.

  • BIOS/firmware configurations
  • Minimum memory capacity and configuration
  • Number of CPUs
  • Number of Cores
  • NICs quantity, speeds, and configurations
  • Internal hardware compatibility
  • HBAs
  • Storage media
  • Tape
  • SSD
  • USB
  • Disk

+ See more details

4.0 Network Management

4.1 Given a scenario, implement and use proper resource monitoring techniques.

  • Protocols
  • SNMP
  • WMI
  • IPMI
  • Syslog service
  • Alert methods
  • SMTP
  • SMS
  • SNMP
  • Web services
  • Syslog
  • Establish baselines and thresholds
  • Automated responses to specific events
  • Examine processes usage / resource usage
  • + See more details

    4.2 Given a scenario, appropriately allocate physical (host) resources using best practices.

    • Memory
    • CPU
    • Storage and network allocation
    • Entitlement/quotas (shares)
    • Hard limit
    • Soft limit
    • Reservations
    • Licensing
    • Resource pooling

    + See more details

    4.3 Given a scenario, appropriately allocate virtual (guest) resources using best practices.

    • Virtual CPU
    • Memory
    • Storage and network allocation
    • Entitlement/quotas (shares)
    • Hard limit, soft limit
    • Reservations, licensing
    • Dynamic resource allocation
    • Resource pooling
    • CPU affinity
    • Physical resource redirection and mapping to virtual resources
    • Serial
    • USB
    • Parallel port mapping

    + See more details

    4.4 Given a scenario, use appropriate tools for remote access.

    • Remote hypervisor access
    • RDP
    • SSH
    • Console port
    • HTTP

    + See more details

    5.0 Security

    5.1 Explain network security concepts, tools, and best practices.

    • ACLs
    • VPNs
    • IDS/IPS hardware/software-based firewalls
    • DMZ
    • Review / audit logs
    • Attacks
    • DDoS
    • Ping of death
    • Ping flood

    + See more details

    5.2 Explain storage security concepts, methods, and best practices.

    • Obfuscation
    • Access Control Lists
    • Zoning
    • LUN masking
    • User and host authentication
    • Review/audit logs

    + See more details

    5.3 Compare contrast different encryption technologies and methods.

    • PKI
    • IPSEC
    • SSL/TLS
    • Ciphers
    • AES
    • 3DES
    • RSA
    • DSA
    • RC4
    • RC5
    • Encryption for data in transit and encryption for data at rest

    + See more details

    5.4 Identify access control methods.

    • Role-based administration
    • Mandatory access controls
    • Discretionary access controls
    • Multifactor authentication
    • Single sign-on
    • Federation

    + See more details

    5.5 Implement guest and host hardening techniques.

    • Disabling unneeded ports and services
    • User credentials
    • Changing default passwords
    • Host-based/software firewalls
    • Antivirus software
    • Patching
    • Deactivating default accounts

    + See more details

    6.0 Systems Management

    6.1 Explain policies and procedures as they relate to a cloud environment.

    • Network and IP planning/documentation
    • Configuration standardization and documentation
    • Change management best practices
    • Documentation
    • Configuration control
    • Asset accountability
    • Approval process
    • Back-out plan
    • Configuration management
    • CMDB
    • Approval process
    • Configuration control
    • Capacity management
    • Monitoring for changes
    • Trending
    • Systems life cycle management
    • Maintenance windows
    • Server upgrades and patches

    + See more details

    6.2 Given a scenario, diagnose, remediate and optimize physical host performance.

    • Disk performance
    • Disk tuning
    • Disk latency
    • Swap disk space
    • I/O tuning
    • Performance management and monitoring tools
    • Establish baseline and create documentation with appropriate tools
    • Hypervisor configuration best practices
    • Memory ballooning
    • I/O throttling
    • CPU wait time
    • Impact of configuration changes to the virtual environment
    • Common issues
    • Disk failure
    • HBA failure
    • Memory failure
    • NIC failure
    • CPU failure

    + See more details

    6.3 Explain common performance concepts as they relate to the host and the guest.

    • IOPS
    • Read vs. write files
    • File system performance
    • Metadata performance
    • Caching
    • Bandwidth
    • Throughput (bonding/teaming)
    • Jumbo frames
    • Network latency
    • Hop counts
    • QoS
    • Multpathing
    • Load balancing
    • Scaling
    • Vertical vs. horizontal vs. diagonal

    + See more details

    6.4 Implement appropriate testing techniques when deploying cloud services.

    • Test replication
    • Test latency
    • Test bandwidth
    • Test load balancing
    • Test application servers
    • Test storage
    • Test application delivery
    • Service performance testing and application performance testing
    • Penetration testing
    • Vulnerability assessment
    • Separation of duties during testing

    + See more details

    7.0 Business Continuity in the Cloud

    7.1 Compare and contrast disaster recovery methods and concepts.

    • Redundancy
    • Failover
    • Geographical diversity
    • Failback
    • Replication
    • Site mirroring
    • Hot site
    • Cold site
    • Warm site
    • Backup and recovery
    • Archiving and offsite storage
    • Replication types
    • Synchronous
    • Asynchronous
    • RTO
    • RPO
    • MTBF
    • MTTR
    • Mission critical requirements

    + See more details

    7.2 Deploy solutions to meet availability requirements.

    • Fault tolerance
    • High availability
    • Local clustering /geoclustering
    • Non-high availability resources
    • Multipathing
    • Load balancing

    + See more details

    CTU Training Solutions , Updated: May 7th, 2018

    Share with friends

    Request a Quote



    Your Name

    Your Surname

    Contact Number

    Your Email

    Company

    Which campus would you like to study at?

    Your job title

    Will your training be sponsored?

    Message

    The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

    Join the CTU community

    Join the CTU Community Portal and gain access to superior resources.

    Join for Free

    Thank you for printing this page.
    Logo
    0861 100 395
    [email protected]
    www.ctutraining.ac.za

    X

    Call me Back

    Leave your details and we'll contact you back!

    Your Name:

    Your Email:


    Contact Number:

    Choose a campus