وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
5

Cloud+ Online Training

سرفصل های دوره

This foundational CompTIA Cloud+ training prepares cloud specialists to take the CV0-003 exam, which is the one required exam to earn the Cloud+ certification.

With vendor-neutral training you may not know a certain cloud provider's deepest, darkest UI shortcuts, but you have a wide understanding of what's possible in the cloud and how to accomplish it. No matter what service or manufacturer you find yourself on.


1. Get Started with CompTIA Cloud+
  • 1. Get Started with CompTIA Cloud+
  • 2. Why Get Cloud Certified
  • 3. Why Get a CompTIA Certification
  • 4. Is Cloud+ Right For Me
  • 5. CompTIA Resources
  • 6. How to Use the Course Ahead

  • 2. Explain Cloud Principles
  • 1. Explaining Cloud Principles
  • 2. Cloud Characteristics
  • 3. Shared Responsibility
  • 4. Infrastructure-as-a-Service
  • 5. Platform-as-a-Service
  • 6. Software-as-a-Service
  • 7. Deployment Models

  • 3. Identify Benefits of Utilizing Cloud Services
  • 1. Benefits of Utilizing Cloud Services
  • 2. Big Data, Machine Learning, and Artificial Intelligence
  • 3. Marketing Campagins
  • 4. Service Subscriptions
  • 5. Self-Service Catalogs
  • 6. Collaboration Tools

  • 4. Plan for Advanced Cloud Deployment Models
  • 1. Planning for Advanced Cloud Models
  • 2. Understanding Multitenancy
  • 3. Hybrid versus Multi-Cloud
  • 4. Cloud within a Cloud
  • 5. Internet of Things
  • 6. Serverless Applications

  • 5. Identify Cloud Survivability Patterns
  • 1. Identifying Cloud Survivability Patterns
  • 2. Recovery Time Objective
  • 3. Recovery Point Objective
  • 4. Redundant Redundancy
  • 5. High Availability
  • 6. Disaster Recovery
  • 7. Hybrid Cloud Disaster Recovery Patterns

  • 6. Perform Cloud Assessments
  • 1. Performing Cloud Project Assessments
  • 2. Gap Analysis
  • 3. Gather Requirements
  • 4. Working with Stakeholders
  • 5. Baselines, Benchmarks, and Reporting
  • 6. Documentation and Diagrams
  • 7. Feasibility Study

  • 7. Plan for Cloud Security and Compliance
  • 1. Cloud Security and Compliance
  • 2. Threats and Vulnerabilities
  • 3. Proactive Security Scanning
  • 4. Data Security
  • 5. Application and Infrastructure Security
  • 6. Compliance Standards and Certifications

  • 8. Plan for Cybersecurity in the Cloud
  • 1. Plan for Cloud Cybersecurity
  • 2. Security Patterns and Controls
  • 3. Cloud Storage Security
  • 4. Cloud Network Security
  • 5. Cloud Compute Security
  • 6. Cloud Security Solutions

  • 9. Certificates and the PKI
  • 1. Intro to Digital Certificates and the PKI
  • 2. Symmetrical vs Asymmetrical Encryption
  • 3. Digital Certificates Overview - CompTIA Cloud+ (CV0-003) CBT Nuggets
  • 4. Digital Signatures
  • 5. Creating an HTTPS Session Key
  • 6. Public Key Infrastructure
  • 7. Quiz and Review

  • 10. Secure Network Design
  • 1. Intro to Secure Network Design
  • 2. Network Segmentation
  • 3. Network Firewalls
  • 4. ACL Case Study
  • 5. Load Balancing
  • 6. Virtual private network (VPN)
  • 7. Layer 2 Security
  • 8. Network-based IDSIPS
  • 9. Quiz and Review -3

  • 11. Secure Protocols
  • 1. Intro to Secure Protocols
  • 2. IPsec and VPNs
  • 3. Secure Shell (SSH)
  • 4. Domain Name System (DNS)
  • 5. HTTPS
  • 6. Weak Protocols
  • 7. IP Addressing and Routing
  • 8. Email Protocols
  • 9. LDAP
  • 10. SNMP, NTP, & SRTP
  • 11. Quiz and Review

  • 12. Host and Application Security
  • 1. Intro to Host and App Security
  • 2. Device Hardening
  • 3. Boot integrity
  • 4. Local Endpoint Protection
  • 5. Network Based Protection
  • 6. Secure Applications
  • 7. Quiz and Review

  • 13. Scanning, Monitoring, and Patching
  • 1. Scanning, Monitoring & Patching Scanning Overview
  • 2. Scanning, Monitoring & Patching Network Scanning Methodology
  • 3. Scanning, Monitoring & Patching Port Scanning and Discovery
  • 4. Scanning, Monitoring & Patching OS Discovery and Fingerprinting
  • 5. Scanning, Monitoring & Patching Motivators for Vulnerability Management
  • 6. Scanning, Monitoring & Patching Vulnerability Scanning
  • 7. Scanning, Monitoring & Patching Logging and Review
  • 8. Scanning, Monitoring & Patching Packet and Traffic Analysis
  • 9. Scanning, Monitoring & Patching Packet Capture and Analysis Lab
  • 10. Scanning, Monitoring & Patching Remediation and Patch Management
  • 11. Scanning, Monitoring & Patching Network Scanning with NMAP and Zenmap Lab
  • 12. Scanning, Monitoring & Patching Baselines

  • 14. Plan for Cloud Policies, Procedures, and Risk Management
  • 1. Plan for Cloud Governance
  • 2. Risk Management
  • 3. Resource Management
  • 4. Vendor Lock-In and Data Portability
  • 5. Documentation
  • 6. Policies and Procedures

  • 15. Regulatory and Policy-Based Incident Response
  • 1. Dealing with Prohibited Activities
  • 2. Incident Response
  • 3. The Chain of Custody
  • 4. Software Licensing
  • 5. Sensitive Data

  • 16. Incident Response and Forensic Data Collection
  • 1. Identifying an Incident
  • 2. Containing and Mitigating an Outbreak
  • 3. Forensic Data Collection
  • 4. Forensics In the Cloud
  • 5. Forensic Evidence Management

  • 17. Identify Cloud Service Architectures
  • 1. Cloud Service Architectures and Patterns
  • 2. Identity and Access Management
  • 3. Microservices and Containers
  • 4. Event-driven Behavior
  • 5. Blockchain
  • 6. Virtual Desktop Infrastructure

  • 18. Identify Cloud Storage Technologies
  • 1. Identifying Cloud Storage Technologies
  • 2. Cloud Storage Features
  • 3. Cloud Storage Characteristics
  • 4. Block Storage
  • 5. File Storage
  • 6. Object Storage
  • 7. Software-Defined Storage
  • 8. Content Distribution Networks

  • 19. Provision Cloud and Virtualized Storage
  • 1. Plan for Virtual Storage
  • 2. Types of Storage
  • 3. SAN vs NAS Comparison
  • 4. File Storage Protocols
  • 5. Block Storage Protocols
  • 6. Plan for Tiered Storage
  • 7. Redundant Array of Independent Disks
  • 8. Hyper-Converged Storage

  • 20. Identify Cloud Networking Concepts
  • 1. Identifying Cloud Networking Concepts
  • 2. Connectivity Types
  • 3. Access Types
  • 4. Software Defined Networks
  • 5. Load Balancers
  • 6. Name Resolution and Domain Name System
  • 7. Filtering Network Traffic with Firewalls

  • 21. Plan for Capacity, High Availability, and Scaling
  • 1. Plan for Capacity Management
  • 2. Determine Baselines
  • 3. Virtual Host Capacity Planning
  • 4. Resource Oversubscription
  • 5. Hypervisor Affinity
  • 6. Automated Scaling
  • 7. Cloud Bursting

  • 22. Plan for Cloud Migration and Vendor Relations
  • 1. Cloud Migrations and Vendor Relations
  • 2. Evaluate Cloud Solutions
  • 3. Training and Up-Skilling
  • 4. Professional Services
  • 5. Statement of Work
  • 6. Service Level Agreements
  • 7. Open Source vs Proprietary Software
  • 8. Migration Approaches

  • 23. Plan for Cloud Workload Migration
  • 1. Migrating to Virtualized Workloads
  • 2. Virtualization Suitability Assessment
  • 3. Migrate Physical-to-Virtual Workloads
  • 4. Migrate Virtual-to-Virtual Workloads
  • 5. Migrate Cloud-to-Cloud Workloads
  • 6. Storage Migration
  • 7. Database Migration

  • 24. Plan for Cloud DevOps
  • 1. Planning for Cloud DevOps
  • 2. Defining DevOps
  • 3. Provisioning Cloud Resources
  • 4. Continuous Integration, Deployment, and Delivery
  • 5. Testing and Configuration Management
  • 6. API Integration

  • 25. Plan for Cloud Deployment Finances and Reporting
  • 1. Cloud Finances and Reporting
  • 2. Service Usage & Plans
  • 3. Budgeting
  • 4. Bills and Billing
  • 5. Licensing and License Management
  • 6. Maintenance and Optimization
  • 7. Cloud Account Management

  • 26. Plan for Backup, Restore, and Disaster Recovery
  • 1. Plan for Backup and Recovery
  • 2. Backup Sources
  • 3. Types of Backups
  • 4. Backup Destinations and Media
  • 5. Plan to Restore
  • 6. Disaster Recovery Sites

  • 27. Use a Best Practice Troubleshooting Methodology
  • 1. Methodical Troubleshooting
  • 2. Troubleshooting Step One Identifying the Problem
  • 3. Troubleshooting Step Two Establishing a Theory of Probable Cause
  • 4. Troubleshooting Step Three Testing the Theory
  • 5. Troubleshooting Step Four Establishing a Plan of Action
  • 6. Troubleshooting Step Five Verifying Full System Functionality
  • 7. Troubleshooting Step Six Documenting Findings, Actions, and Outcomes
  • 8. Troubleshooting in the Wild

  • 28. Cloud Architecture and Design Exam Review
  • 1. Cloud+ Domain 1 Exam Objectives
  • 2. Cloud Models Review
  • 3. Capacity Planning Review
  • 4. Scaling and High Availability Review
  • 5. Designing for Business Requirements Review
  • 6. Capacity Planning Scenario Challenge

  • 29. Cloud Security Exam Review
  • 1. Cloud+ Domain 2 Exam Objectives
  • 2. Identity & Access Management Review
  • 3. Network Security Review
  • 4. OS and Application Security Controls Review
  • 5. Data Security & Compliance Review
  • 6. Security Requirements Review
  • 7. Incident Response Review
  • 8. Network Security Scenario

  • 30. Cloud Deployment Exam Review
  • 1. Cloud+ Domain 3 Exam Objectives
  • 2. Integrating Cloud Components Review
  • 3. Provisioning Cloud Storage Review
  • 4. Deploying Cloud Networks Review
  • 5. Compute Sizing Review
  • 6. Cloud Migrations Review

  • 31. Cloud Operations & Support Exam Review
  • 1. Cloud+ Domain 4 Exam Objectives
  • 2. Logging, Monitoring, and Alerting Review
  • 3. Cloud Operations Review
  • 4. Cloud Optimization Review
  • 5. Automation and Orchestration Review
  • 6. Backup and Restore Review
  • 7. Disaster Recovery Review
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 10717
    حجم: 49414 مگابایت
    مدت زمان: 2120 دقیقه
    تاریخ انتشار: ۸ اردیبهشت ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید