وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cloud+ Online Training

سرفصل های دوره

This foundational CompTIA Cloud+ training prepares cloud specialists to take the CV0-003 exam, which is the one required exam to earn the Cloud+ certification.

With vendor-neutral training you may not know a certain cloud provider's deepest, darkest UI shortcuts, but you have a wide understanding of what's possible in the cloud and how to accomplish it. No matter what service or manufacturer you find yourself on.


1. Get Started with CompTIA Cloud+
  • 1. Get Started with CompTIA Cloud+
  • 2. Why Get Cloud Certified
  • 3. Why Get a CompTIA Certification
  • 4. Is Cloud+ Right For Me
  • 5. CompTIA Resources
  • 6. How to Use the Course Ahead

  • 2. Explain Cloud Principles
  • 1. Explaining Cloud Principles
  • 2. Cloud Characteristics
  • 3. Shared Responsibility
  • 4. Infrastructure-as-a-Service
  • 5. Platform-as-a-Service
  • 6. Software-as-a-Service
  • 7. Deployment Models

  • 3. Identify Benefits of Utilizing Cloud Services
  • 1. Benefits of Utilizing Cloud Services
  • 2. Big Data, Machine Learning, and Artificial Intelligence
  • 3. Marketing Campagins
  • 4. Service Subscriptions
  • 5. Self-Service Catalogs
  • 6. Collaboration Tools

  • 4. Plan for Advanced Cloud Deployment Models
  • 1. Planning for Advanced Cloud Models
  • 2. Understanding Multitenancy
  • 3. Hybrid versus Multi-Cloud
  • 4. Cloud within a Cloud
  • 5. Internet of Things
  • 6. Serverless Applications

  • 5. Identify Cloud Survivability Patterns
  • 1. Identifying Cloud Survivability Patterns
  • 2. Recovery Time Objective
  • 3. Recovery Point Objective
  • 4. Redundant Redundancy
  • 5. High Availability
  • 6. Disaster Recovery
  • 7. Hybrid Cloud Disaster Recovery Patterns

  • 6. Perform Cloud Assessments
  • 1. Performing Cloud Project Assessments
  • 2. Gap Analysis
  • 3. Gather Requirements
  • 4. Working with Stakeholders
  • 5. Baselines, Benchmarks, and Reporting
  • 6. Documentation and Diagrams
  • 7. Feasibility Study

  • 7. Plan for Cloud Security and Compliance
  • 1. Cloud Security and Compliance
  • 2. Threats and Vulnerabilities
  • 3. Proactive Security Scanning
  • 4. Data Security
  • 5. Application and Infrastructure Security
  • 6. Compliance Standards and Certifications

  • 8. Plan for Cybersecurity in the Cloud
  • 1. Plan for Cloud Cybersecurity
  • 2. Security Patterns and Controls
  • 3. Cloud Storage Security
  • 4. Cloud Network Security
  • 5. Cloud Compute Security
  • 6. Cloud Security Solutions

  • 9. Certificates and the PKI
  • 1. Intro to Digital Certificates and the PKI
  • 2. Symmetrical vs Asymmetrical Encryption
  • 3. Digital Certificates Overview - CompTIA Cloud+ (CV0-003) CBT Nuggets
  • 4. Digital Signatures
  • 5. Creating an HTTPS Session Key
  • 6. Public Key Infrastructure
  • 7. Quiz and Review

  • 10. Secure Network Design
  • 1. Intro to Secure Network Design
  • 2. Network Segmentation
  • 3. Network Firewalls
  • 4. ACL Case Study
  • 5. Load Balancing
  • 6. Virtual private network (VPN)
  • 7. Layer 2 Security
  • 8. Network-based IDSIPS
  • 9. Quiz and Review -3

  • 11. Secure Protocols
  • 1. Intro to Secure Protocols
  • 2. IPsec and VPNs
  • 3. Secure Shell (SSH)
  • 4. Domain Name System (DNS)
  • 5. HTTPS
  • 6. Weak Protocols
  • 7. IP Addressing and Routing
  • 8. Email Protocols
  • 9. LDAP
  • 10. SNMP, NTP, & SRTP
  • 11. Quiz and Review

  • 12. Host and Application Security
  • 1. Intro to Host and App Security
  • 2. Device Hardening
  • 3. Boot integrity
  • 4. Local Endpoint Protection
  • 5. Network Based Protection
  • 6. Secure Applications
  • 7. Quiz and Review

  • 13. Scanning, Monitoring, and Patching
  • 1. Scanning, Monitoring & Patching Scanning Overview
  • 2. Scanning, Monitoring & Patching Network Scanning Methodology
  • 3. Scanning, Monitoring & Patching Port Scanning and Discovery
  • 4. Scanning, Monitoring & Patching OS Discovery and Fingerprinting
  • 5. Scanning, Monitoring & Patching Motivators for Vulnerability Management
  • 6. Scanning, Monitoring & Patching Vulnerability Scanning
  • 7. Scanning, Monitoring & Patching Logging and Review
  • 8. Scanning, Monitoring & Patching Packet and Traffic Analysis
  • 9. Scanning, Monitoring & Patching Packet Capture and Analysis Lab
  • 10. Scanning, Monitoring & Patching Remediation and Patch Management
  • 11. Scanning, Monitoring & Patching Network Scanning with NMAP and Zenmap Lab
  • 12. Scanning, Monitoring & Patching Baselines

  • 14. Plan for Cloud Policies, Procedures, and Risk Management
  • 1. Plan for Cloud Governance
  • 2. Risk Management
  • 3. Resource Management
  • 4. Vendor Lock-In and Data Portability
  • 5. Documentation
  • 6. Policies and Procedures

  • 15. Regulatory and Policy-Based Incident Response
  • 1. Dealing with Prohibited Activities
  • 2. Incident Response
  • 3. The Chain of Custody
  • 4. Software Licensing
  • 5. Sensitive Data

  • 16. Incident Response and Forensic Data Collection
  • 1. Identifying an Incident
  • 2. Containing and Mitigating an Outbreak
  • 3. Forensic Data Collection
  • 4. Forensics In the Cloud
  • 5. Forensic Evidence Management

  • 17. Identify Cloud Service Architectures
  • 1. Cloud Service Architectures and Patterns
  • 2. Identity and Access Management
  • 3. Microservices and Containers
  • 4. Event-driven Behavior
  • 5. Blockchain
  • 6. Virtual Desktop Infrastructure

  • 18. Identify Cloud Storage Technologies
  • 1. Identifying Cloud Storage Technologies
  • 2. Cloud Storage Features
  • 3. Cloud Storage Characteristics
  • 4. Block Storage
  • 5. File Storage
  • 6. Object Storage
  • 7. Software-Defined Storage
  • 8. Content Distribution Networks

  • 19. Provision Cloud and Virtualized Storage
  • 1. Plan for Virtual Storage
  • 2. Types of Storage
  • 3. SAN vs NAS Comparison
  • 4. File Storage Protocols
  • 5. Block Storage Protocols
  • 6. Plan for Tiered Storage
  • 7. Redundant Array of Independent Disks
  • 8. Hyper-Converged Storage

  • 20. Identify Cloud Networking Concepts
  • 1. Identifying Cloud Networking Concepts
  • 2. Connectivity Types
  • 3. Access Types
  • 4. Software Defined Networks
  • 5. Load Balancers
  • 6. Name Resolution and Domain Name System
  • 7. Filtering Network Traffic with Firewalls

  • 21. Plan for Capacity, High Availability, and Scaling
  • 1. Plan for Capacity Management
  • 2. Determine Baselines
  • 3. Virtual Host Capacity Planning
  • 4. Resource Oversubscription
  • 5. Hypervisor Affinity
  • 6. Automated Scaling
  • 7. Cloud Bursting

  • 22. Plan for Cloud Migration and Vendor Relations
  • 1. Cloud Migrations and Vendor Relations
  • 2. Evaluate Cloud Solutions
  • 3. Training and Up-Skilling
  • 4. Professional Services
  • 5. Statement of Work
  • 6. Service Level Agreements
  • 7. Open Source vs Proprietary Software
  • 8. Migration Approaches

  • 23. Plan for Cloud Workload Migration
  • 1. Migrating to Virtualized Workloads
  • 2. Virtualization Suitability Assessment
  • 3. Migrate Physical-to-Virtual Workloads
  • 4. Migrate Virtual-to-Virtual Workloads
  • 5. Migrate Cloud-to-Cloud Workloads
  • 6. Storage Migration
  • 7. Database Migration

  • 24. Plan for Cloud DevOps
  • 1. Planning for Cloud DevOps
  • 2. Defining DevOps
  • 3. Provisioning Cloud Resources
  • 4. Continuous Integration, Deployment, and Delivery
  • 5. Testing and Configuration Management
  • 6. API Integration

  • 25. Plan for Cloud Deployment Finances and Reporting
  • 1. Cloud Finances and Reporting
  • 2. Service Usage & Plans
  • 3. Budgeting
  • 4. Bills and Billing
  • 5. Licensing and License Management
  • 6. Maintenance and Optimization
  • 7. Cloud Account Management

  • 26. Plan for Backup, Restore, and Disaster Recovery
  • 1. Plan for Backup and Recovery
  • 2. Backup Sources
  • 3. Types of Backups
  • 4. Backup Destinations and Media
  • 5. Plan to Restore
  • 6. Disaster Recovery Sites

  • 27. Use a Best Practice Troubleshooting Methodology
  • 1. Methodical Troubleshooting
  • 2. Troubleshooting Step One Identifying the Problem
  • 3. Troubleshooting Step Two Establishing a Theory of Probable Cause
  • 4. Troubleshooting Step Three Testing the Theory
  • 5. Troubleshooting Step Four Establishing a Plan of Action
  • 6. Troubleshooting Step Five Verifying Full System Functionality
  • 7. Troubleshooting Step Six Documenting Findings, Actions, and Outcomes
  • 8. Troubleshooting in the Wild

  • 28. Cloud Architecture and Design Exam Review
  • 1. Cloud+ Domain 1 Exam Objectives
  • 2. Cloud Models Review
  • 3. Capacity Planning Review
  • 4. Scaling and High Availability Review
  • 5. Designing for Business Requirements Review
  • 6. Capacity Planning Scenario Challenge

  • 29. Cloud Security Exam Review
  • 1. Cloud+ Domain 2 Exam Objectives
  • 2. Identity & Access Management Review
  • 3. Network Security Review
  • 4. OS and Application Security Controls Review
  • 5. Data Security & Compliance Review
  • 6. Security Requirements Review
  • 7. Incident Response Review
  • 8. Network Security Scenario

  • 30. Cloud Deployment Exam Review
  • 1. Cloud+ Domain 3 Exam Objectives
  • 2. Integrating Cloud Components Review
  • 3. Provisioning Cloud Storage Review
  • 4. Deploying Cloud Networks Review
  • 5. Compute Sizing Review
  • 6. Cloud Migrations Review

  • 31. Cloud Operations & Support Exam Review
  • 1. Cloud+ Domain 4 Exam Objectives
  • 2. Logging, Monitoring, and Alerting Review
  • 3. Cloud Operations Review
  • 4. Cloud Optimization Review
  • 5. Automation and Orchestration Review
  • 6. Backup and Restore Review
  • 7. Disaster Recovery Review
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 10717
    حجم: 49414 مگابایت
    مدت زمان: 2120 دقیقه
    تاریخ انتشار: 8 اردیبهشت 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید