spaces

CompTIA Cloud+


Course Contents

  1. 1.0 Cloud Concepts and Models
  2. 1.1 Compare and contrast cloud services.
    1. • SaaS (according to NIST)
    2. • IaaS (according to NIST)
    3. • CaaS (according to NIST)
    4. • PaaS (according to NIST)
    5. • XaaS (according to NIST)
    6. • DaaS (according to NIST)
    7. • BPaaS
    8. • Accountability and responsibility based on service models
  1. 1.2 Compare and contrast cloud delivery models and services.
    1. • Private
    2. • Public
    3. • Hybrid
    4. • Community
    5. • On-premise vs. Off-premise hosting
    6. • Accountability and responsibility based on delivery models
    7. • Security differences between models
      1. • Multitenancy issues
      2. • Data segregation
      3. • Network isolation
      4. • Check laws and regulations
    8. • Functionality and performance validation based on chosen delivery model
    9. • Orchestration platforms
  1. 1.3 Summarize cloud characteristics and terms.
    1. • Elasticity
    2. • On-demand self serve/just in time service
    3. • Pay-as-you-grow
    4. • Chargeback
    5. • Ubiquitous access
    6. • Metering resource pooling
    7. • Multitenancy
    8. • Cloud bursting
    9. • Rapid deployment
    10. • Automation
  1. 1.4 Explain object storage concepts.
    1. • Object ID
    2. • Metadata
    3. • Data/blob
    4. • Extended metadata
    5. • Policies
    6. • Replicas
    7. • Access control
  1. 2.0 Virtualization
  2. 2.1 Explain the differences between hypervisor types.
    1. • Type I and Type II
      1. • Bare metal vs. OS dependant
      2. • Performance and overhead considerations
    2. • Proprietary vs. open source
    3. • Consumer vs. enterprise use
      1. • Workstation vs. infrastructure
  1. 2.2 Install, configure, and manage virtual machines and devices.
    1. • Creating, importing, and exporting template and virtual machines
    2. • Install guest tools
      1. • Drives
      2. • Management tools
    3. • Snapshots and cloning
    4. • Image backups vs. file backups
    5. • Virtual NIC
      1. • Virtual network
      2. • IP address
      3. • Default gateway
      4. • Netmask
      5. • Bridging
    6. • Virtual disks
      1. • Limits
      2. • SCSI/ATA ID
    7. • Virtual switches
      1. • VLAN
      2. • Interface configuration
    8. • VLAN
      1. • Assign IDs
      2. • Bind interfaces
    9. • VSAN
      1. •Assign IDs
  1. 2.3 Given a scenario, perform virtual resource migration.
    1. • Establish requirements
    2. • Maintenance scheduling
    3. • Reasons
      1. • Performance issues
      2. • Upgrading
      3. • Utilization
    4. • Storage migration
      1. • Virtual vs. physical
    5. • Online vs. offline migrations
    6. • Physical to Virtual (P2V)
    7. • Virtual to Virtual (V2V)
    8. • Virtual to Physical (V2P)
  1. 2.4 Explain the benefits of virtualization in a cloud environment.
    1. • Shared resources
    2. • Elasticity
      1. • Time to service/mean time to implement
      2. • Resource pooling
      3. • Scalable
      4. • Available
      5. • Portable
    3. • Network and application isolation
    4. • Infrastructure consolidation
    5. • Virtual datacenter creation
  1. 2.5 Compare and contrast virtual components used to construct a cloud environment.
    1. • Virtual network components
      1. • Virtual NIC
      2. • Virtual HBA
      3. • Virtual router
    2. •Shared memory
    3. • Virtual CPU
    4. • Storage Virtualization
      1. • Shared storage
      2. • Clustered storage
      3. • NPIV
  1. 3.0 Infrastructure
  2. 3.1 Compare and contrast various storage technologies.
    1. • Network Attached Storage (NAS)
      1. • File level access
      2. • Shared storage
    2. • Direct Attached Storage (DAS)
      1. • Block level access
      2. • Dedicated storage
    3. • Storage Area Network (SAN)
      1. • Block level access
      2. •Shared storage
      3. • HBAs
      4. • LUN masking
      5. • Zoning
      6. •WWN
      7. • Fiber channel protocols
    4. • Different access protocols
      1. • FCoE
      2. •FC
      3. •Ethernet
      4. •iSCSI
    5. • Protocols and applications
      1. • IP
      2. •FCP
      3. • iSCSI
    6. • Management differences
  1. 3.2 Explain storage configuration concepts.
    1. • Disk types
      1. • SSD vs. spinning
      2. • Interfaces types
      3. • Access speed
    2. • Tiering
      1. • Performance levels of each tier
      2. • Policies
    3. • RAID levels
      1. • RAID 1
      2. • RAID 0
      3. • RAID 1+0
      4. • RAID 0+1
      5. • RAID 5
      6. • RAID 6
    4. • File system types
      1. • UFS
      2. • EXT
      3. • NTFS
      4. • FAT
      5. • VMFS
      6. • ZFS
  1. 3.3 Execute storage provisioning.
    1. • Creating LUNs
    2. • Creating network shares
    3. • Zoning and LUN masking
    4. • Multipathing
    5. • Implications of adding capacity to a NAS and SAN
      1. •o Impact to operations
      2. • Downtime
      3. • Best practices
  1. 3.4 Given a scenario, implement appropriate network configurations.
    1. • NAT
    2. • PAT
    3. • Subnetting/Supernetting
    4. • VLAN and VLAN tagging
    5. • Network port configurations
    6. •Switching and routing in physical and virtual environments
      1. Routing tables
  1. 3.5 Explain the importance of network optimization.
    1. • WAN
    2. • LAN
    3. • MAN
    4. • Bandwidth
    5. • Latency
    6. • Compression
    7. • Caching
    8. • Load balancing
    9. • Devices on the same subnet
  1. 3.6 Given a scenario, troubleshoot basic network connectivity issues.
    1. • Tools
      1. • ping
      2. • tracert/traceroute
      3. • telnet
      4. • netstat
      5. • nslookup/dig
      6. • ipconfig/ifconfig
    2. • route
    3. • arp
  1. 3.7 Explain common network protocols, ports, and topologies.
    1. • Trunk ports
    2. • Port binding/aggregation
    3. • Common ports
      1. • 80
      2. • 21
      3. • 22
      4. • 25
      5. • 53
      6. • 443
      7. • 68
    4. • Common protocols
      1. • HTTP
      2. • FTP
      3. • HTTPS
      4. • FTPS
      5. • SFTP
      6. • SSH
      7. • DNS
      8. • DHCP
      9. • SMTP
    5. • Types of networks
      1. • intranet
      2. • extranet
      3. • internet
  1. 3.8 Explain common hardware resources and features used to enable virtual environments.
    1. • BIOS/firmware configurations
    2. • Minimum memory capacity and configuration
    3. • Number of CPUs
    4. • Number of Cores
    5. • NICs quantity, speeds, and configurations
    6. • Internal hardware compatibility
    7. •HBAs
    8. • Storage media
      1. • Tape
      2. • SSD
      3. • USB
      4. • Disk
  1. 4.0 Network Management
  2. 4.1 Given a scenario, implement and use proper resource monitoring
    1. • Protocols
      1. • SNMP
      2. • WMI
      3. • IPMI
      4. • Syslog service
    2. •Alert methods
      1. •SMTP
      2. • SMS
      3. •SNMP
      4. • Web services
      5. • Syslog
    3. • Establish baselines and thresholds
    4. • Automated responses to specific events
    5. • Examine processes usage / resource usage
  1. 4.2 Given a scenario, appropriately allocate physical (host) resources using best practices.
    1. • Memory
    2. • CPU
    3. • Storage and network allocation
    4. • Entitlement/quotas (shares)
      1. • Hard limit
      2. • Soft limit
    5. • Reservations
    6. • Licensing
    7. • Resource pooling
  1. 4.3 Given a scenario, appropriately allocate virtual (guest) resources using best practices.
    1. • Virtual CPU
    2. • Memory
    3. • Storage and network allocation
    4. • Entitlement/quotas (shares)
    5. • Hard limit, soft limit
    6. • Reservations, licensing
    7. • Dynamic resource allocation
    8. • Resource pooling
    9. • CPU affinity
    10. • Physical resource redirection and mapping to virtual resources
      1. •Serial
      2. • USB
      3. • Parallel port mapping
  1. 4.4 Given a scenario, use appropriate tools for remote access.
    1. • Remote hypervisor access
    2. • RDP
    3. • SSH
    4. • Console port
    5. • HTTP
  1. 5.0 Security
  2. 5.1 Explain network security concepts, tools, and best practices.
    1. • ACLs
    2. • VPNs
    3. • IDS/IPS hardware/software-based firewalls
    4. • DMZ
    5. • Review / audit logs
    6. • Attacks
      1. • DDoS
      2. • Ping of death
      3. • Ping flood
  1. 5.2 Explain storage security concepts, methods, and best practices.
    1. • Obfuscation
    2. • Access Control Lists
    3. • Zoning
    4. • LUN masking
    5. • User and host authentication
    6. • Review/audit logs
  1. 5.3 Compare contrast different encryption technologies and methods.
    1. •PKI
    2. •IPSEC
    3. • SSL/TLS
    4. • Ciphers
      1. •AES
      2. • 3DES
      3. • RSA
      4. •DSA
      5. •RC4
      6. • RC5
    5. • Encryption for data in transit and encryption for data at rest
  1. 5.4 Identify access control methods.
    1. • Role-based administration
    2. • Mandatory access controls
    3. • Discretionary access controls
    4. • Multifactor authentication
    5. • Single sign-on
    6. • Federation
  1. 5.5 Implement guest and host hardening techniques.
    1. • Disabling unneeded ports and services
    2. • User credentials
      1. • Changing default passwords
    3. • Host-based/software firewalls
    4. • Antivirus software
    5. • Patching
    6. • Deactivating default accounts
  1. 6.0 Systems Management
  2. 6.1 Explain policies and procedures as they relate to a cloud environment.
    1. • Network and IP planning/documentation
    2. • Configuration standardization and documentation
    3. • Change management best practices
      1. • Documentation
      2. • Configuration control
      3. • Asset accountability
      4. • Approval process
      5. • Back-out plan
    4. • Configuration management
      1. •CMDB
      2. • Approval process
      3. • Configuration control
    5. • Capacity management
      1. • Monitoring for changes
      2. • Trending
    6. • Systems life cycle management
    7. • Maintenance windows
      1. • Server upgrades and patches
  1. 6.2 Given a scenario, diagnose, remediate and optimize physical host performance.
    1. • Disk performance
    2. • Disk tuning
    3. • Disk latency
    4. • Swap disk space
    5. • I/O tuning
    6. •Performance management and monitoring tools
    7. • Establish baseline and create documentation with appropriate tools
    8. • Hypervisor configuration best practices
      1. • Memory ballooning
      2. • I/O throttling
      3. • CPU wait time
    9. • Impact of configuration changes to the virtual environment
    10. • Common issues
      1. • Disk failure
      2. • HBA failure
      3. • Memory failure
      4. • NIC failure
      5. • CPU failure
    6.3 Explain common performance concepts as they relate to the host and the guest.
    1. • IOPS
    2. • Read vs. write files
    3. • File system performance
    4. • Metadata performance
    5. • Caching
    6. • Bandwidth
    7. • Throughput (bonding/teaming)
    8. • Jumbo frames
    9. • Network latency
    10. • Hop counts
    11. • QoS
    12. • Multpathing
    13. • Load balancing
    14. • Scaling
      1. • Vertical vs. horizontal vs. diagonal
  1. 6.4 Implement appropriate testing techniques when deploying cloud services.
    1. • Test replication
    2. • Test latency
    3. • Test bandwidth
    4. • Test load balancing
    5. • Test application servers
    6. • Test storage
    7. • Test application delivery
    8. • Service performance testing and application performance testing
    9. • Penetration testing
    10. • Vulnerability assessment
    11. • Separation of duties during testing
  1. 7.0 Business Continuity in the Cloud
  2. 7.1 Compare and contrast disaster recovery methods and concepts.
    1. • Redundancy
    2. • Failover
    3. • Geographical diversity
    4. • Failback
    5. • Replication
    6. • Site mirroring
    7. • Hot site
    8. • Cold site
    9. • Warm site
    10. • Backup and recovery
    11. • Archiving and offsite storage
    12. •Replication types
      1. • Synchronous
      2. • Asynchronous
    13. • RTO
    14. • RPO
    15. • MTBF
    16. • MTTR
    17. • Mission critical requirements
  1. 7.2 Deploy solutions to meet availability requirements.
    1. •* Fault tolerance
      1. • High availability
      2. • Local clustering /geoclustering
      3. • Non-high availability resources
    2. • Multipathing
    3. • Load balancing