Course Content
1.0 Cloud Concepts and Models
1.1 Compare and contrast cloud services.
- SaaS (according to NIST)
- IaaS (according to NIST)
- CaaS (according to NIST)
- PaaS (according to NIST)
- XaaS (according to NIST)
- DaaS (according to NIST)
- BPaaS
- Accountability and responsibility based on service models
– See fewer details
1.2 Compare and contrast cloud delivery models and services.
- Private
- Public
- Hybrid
- Community
- On-premise vs. Off-premise hosting
- Accountability and resp
- onsibility based on delivery models
- Security differences between models
- Multitenancy issues
- Data segregation
- Network isolation
- Check laws and regulations
- Functionality and performance validation based on chosen delivery model
- Orchestration platforms
+ See more details
1.3 Summarize cloud characteristics and terms.
- Elasticity
- On-demand self serve/just in time service
- Pay-as-you-grow
- Chargeback
- Ubiquitous access
- Metering resource pooling
- Multitenancy
- Cloud bursting
- Rapid deployment
- Automation
+ See more details
1.4 Explain object storage concepts.
- Object ID
- Metadata
- Data/blob
- Extended metadata
- Policies
- Replicas
- Access control
+ See more details
2.0 Virtualization
2.1 Explain the differences between hypervisor types.
- Type I and Type II
- Bare metal vs. OS dependant
- Performance and overhead considerations
- Hypervisor specific system requirements
- Proprietary vs. open source
- Consumer vs. enterprise use
- Workstation vs. infrastructure
+ See more details
2.2 Install, configure, and manage virtual machines and devices.
- Creating, importing, and exporting template and virtual machines
- Install guest tools
- Drives
- Management tools
- Snapshots and cloning
- Image backups vs. file backups
- Virtual NIC
- Virtual network
- IP address
- Default gateway
- Netmask
- Bridging
- Virtual disks
- Limits
- SCSI/ATA ID
- Virtual switches
- VLAN
- Interface configuration
- VLAN
- Assign IDs
- Bind interfaces
- VSAN
- Assign IDs
+ See more details
2.3 Given a scenario, perform virtual resource migration.
- Establish requirements
- Maintenance scheduling
- Reasons
- Performance issues
- Testing
- Upgrading
- Utilization
- Storage migration
- Virtual vs. physical
- Online vs. offline migrations
- Physical to Virtual (P2V)
- Virtual to Virtual (V2V)
- Virtual to Physical (V2P)
+ See more details
2.4 Explain the benefits of virtualization in a cloud environment.
- Shared resources
- Elasticity
- Time to service/mean time to implement
- Resource pooling
- Scalable
- Available
- Portable
- Network and application isolation
- Infrastructure consolidation
- Virtual datacenter creation
+ See more details
2.5 Compare and contrast virtual components used to construct a cloud environment.
- Virtual network components
- Virtual NIC
- Virtual HBA
- Virtual router
- Shared memory
- Virtual CPU
- Storage Virtualization
- Shared storage
- Clustered storage
- NPIV
+ See more details
3.0 Infrastructure
3.1 Compare and contrast various storage technologies.
- Network Attached Storage (NAS)
- File level access
- Shared storage
- Direct Attached Storage (DAS)
- Block level access
- Dedicated storage
- Storage Area Network (SAN)
- Block level access
- Shared storage
- HBAs
- LUN masking
- Zoning
- WWN
- Fiber channel protocols
- Different access protocols
- FCoE
- FC
- Ethernet
- iSCSI
- Protocols and applications
- IP
- FCP
- iSCSI
- Management differences
+ See more details
3.2 Explain storage configuration concepts.
- Disk types
- SSD vs. spinning
- Interfaces types
- Access speed
- Tiering
- Performance levels of each tier
- Policies
- RAID levels
- RAID 1
- RAID 0
- RAID 1+0
- RAID 0+1
- RAID 5
- RAID 6
- File system types
- UFS
- EXT
- NTFS
- FAT
- VMFS
- ZFS
+ See more details
3.3 Execute storage provisioning.
- Creating LUNs
- Creating network shares
- Zoning and LUN masking
- Multipathing
- Implications of adding capacity to a NAS and SAN
- Impact to operations
- Downtime
- Best practices
+ See more details
3.4 Given a scenario, implement appropriate network configurations.
- NAT
- PAT
- Subnetting/Supernetting
- VLAN and VLAN tagging
- Network port configurations
- Switching and routing in physical and virtual environments
- Routing tables
+ See more details
3.5 Explain the importance of network optimization.
- WAN
- LAN
- MAN
- Bandwidth
- Latency
- Compression
- Caching
- Load balancing
- Devices on the same subnet
+ See more details
3.6 Given a scenario, troubleshoot basic network connectivity issues.
- Tools
- ping
- tracer
- t/traceroute
- telnet
- netstat
- nslookup/dig
- ipconfig/ifconfig
- route
- arp
- Review documentation and device configuration settings
- Review system logs
+ See more details
3.7 Explain common network protocols, ports, and topologies.
- Truck ports
- Port binding/aggregation
- Common ports
- 80
- 21
- 22
- 25
- 53
- 443
- 68
- Common protocols
- HTTP
- FTP
- HTTPS
- FTPS
- SFTP
- SSH
- DNS
- DHCP
- SMTP
- Types of networks
- intranet
- extranet
- internet
+ See more details
3.8 Explain common hardware resources and features used to enable virtual environments.
- BIOS/firmware configurations
- Minimum memory capacity and configuration
- Number of CPUs
- Number of Cores
- NICs quantity, speeds, and configurations
- Internal hardware compatibility
- HBAs
- Storage media
- Tape
- SSD
- USB
- Disk
+ See more details
4.0 Network Management
4.1 Given a scenario, implement and use proper resource monitoring techniques.
- Protocols
- SNMP
- WMI
- IPMI
- Syslog service
- Alert methods
- SMTP
- SMS
- SNMP
- Web services
- Syslog
- Establish baselines and thresholds
- Automated responses to specific events
- Examine processes usage / resource usage
+ See more details
4.2 Given a scenario, appropriately allocate physical (host) resources using best practices.
- Memory
- CPU
- Storage and network allocation
- Entitlement/quotas (shares)
- Hard limit
- Soft limit
- Reservations
- Licensing
- Resource pooling
+ See more details
4.3 Given a scenario, appropriately allocate virtual (guest) resources using best practices.
- Virtual CPU
- Memory
- Storage and network allocation
- Entitlement/quotas (shares)
- Hard limit, soft limit
- Reservations, licensing
- Dynamic resource allocation
- Resource pooling
- CPU affinity
- Physical resource redirection and mapping to virtual resources
- Serial
- USB
- Parallel port mapping
+ See more details
4.4 Given a scenario, use appropriate tools for remote access.
- Remote hypervisor access
- RDP
- SSH
- Console port
- HTTP
+ See more details
5.0 Security
5.1 Explain network security concepts, tools, and best practices.
- ACLs
- VPNs
- IDS/IPS hardware/software-based firewalls
- DMZ
- Review / audit logs
- Attacks
- DDoS
- Ping of death
- Ping flood
+ See more details
5.2 Explain storage security concepts, methods, and best practices.
- Obfuscation
- Access Control Lists
- Zoning
- LUN masking
- User and host authentication
- Review/audit logs
+ See more details
5.3 Compare contrast different encryption technologies and methods.
- PKI
- IPSEC
- SSL/TLS
- Ciphers
- AES
- 3DES
- RSA
- DSA
- RC4
- RC5
- Encryption for data in transit and encryption for data at rest
+ See more details
5.4 Identify access control methods.
- Role-based administration
- Mandatory access controls
- Discretionary access controls
- Multifactor authentication
- Single sign-on
- Federation
+ See more details
5.5 Implement guest and host hardening techniques.
- Disabling unneeded ports and services
- User credentials
- Changing default passwords
- Host-based/software firewalls
- Antivirus software
- Patching
- Deactivating default accounts
+ See more details
6.0 Systems Management
6.1 Explain policies and procedures as they relate to a cloud environment.
- Network and IP planning/documentation
- Configuration standardization and documentation
- Change management best practices
- Documentation
- Configuration control
- Asset accountability
- Approval process
- Back-out plan
- Configuration management
- CMDB
- Approval process
- Configuration control
- Capacity management
- Monitoring for changes
- Trending
- Systems life cycle management
- Maintenance windows
- Server upgrades and patches
+ See more details
6.2 Given a scenario, diagnose, remediate and optimize physical host performance.
- Disk performance
- Disk tuning
- Disk latency
- Swap disk space
- I/O tuning
- Performance management and monitoring tools
- Establish baseline and create documentation with appropriate tools
- Hypervisor configuration best practices
- Memory ballooning
- I/O throttling
- CPU wait time
- Impact of configuration changes to the virtual environment
- Common issues
- Disk failure
- HBA failure
- Memory failure
- NIC failure
- CPU failure
+ See more details
6.3 Explain common performance concepts as they relate to the host and the guest.
- IOPS
- Read vs. write files
- File system performance
- Metadata performance
- Caching
- Bandwidth
- Throughput (bonding/teaming)
- Jumbo frames
- Network latency
- Hop counts
- QoS
- Multpathing
- Load balancing
- Scaling
- Vertical vs. horizontal vs. diagonal
+ See more details
6.4 Implement appropriate testing techniques when deploying cloud services.
- Test replication
- Test latency
- Test bandwidth
- Test load balancing
- Test application servers
- Test storage
- Test application delivery
- Service performance testing and application performance testing
- Penetration testing
- Vulnerability assessment
- Separation of duties during testing
+ See more details
7.0 Business Continuity in the Cloud
7.1 Compare and contrast disaster recovery methods and concepts.
- Redundancy
- Failover
- Geographical diversity
- Failback
- Replication
- Site mirroring
- Hot site
- Cold site
- Warm site
- Backup and recovery
- Archiving and offsite storage
- Replication types
- Synchronous
- Asynchronous
- RTO
- RPO
- MTBF
- MTTR
- Mission critical requirements
+ See more details
7.2 Deploy solutions to meet availability requirements.
- Fault tolerance
- High availability
- Local clustering /geoclustering
- Non-high availability resources
- Multipathing
- Load balancing
+ See more details