Ben Piper - CompTIA Cloud+ Study Guide

Здесь есть возможность читать онлайн «Ben Piper - CompTIA Cloud+ Study Guide» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

CompTIA Cloud+ Study Guide: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «CompTIA Cloud+ Study Guide»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

In the newly revised Third Edition of 
, expert IT Ben Piper delivers an industry leading resource for anyone preparing for the CompTIA Cloud+ certification and a career in cloud services. The book introduces candidates to the skills and the competencies critical for success in the field and on the exam.
The book breaks down challenging cloud management concepts into intuitive and manageable topics, including cloud architecture and design, cloud security, deployment, operations and support, and cloud troubleshooting. It also offers practical study features, like Exam Essentials and challenging chapter review questions.
Written in a concise and straightforward style that will be immediately familiar to the hundreds of thousands of readers who have successfully use other CompTIA study guides to further their careers in IT, the book offers:
Efficient and effective training for a powerful certification that opens new and lucrative career opportunities Fully updated coverage for the new Cloud+ CV0-003 Exam that includes the latest in cloud architecture and design Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for everyone preparing for the
certification, this book is an ideal resource for current and aspiring cloud services professionals seeking an efficient and up-to-date resource that will dramatically improve their ability to maintain, secure, and optimize cloud environments.

CompTIA Cloud+ Study Guide — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «CompTIA Cloud+ Study Guide», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать
Exam Objective Chapters
2.1 Given a scenario, configure identity and access management.Identification and authorizationPrivileged access managementLogical access managementAccount life-cycle managementProvision and deprovision accountsAccess controlsRole-basedDiscretionaryNon-discretionaryMandatoryDirectory servicesLightweight directory access protocol (LDAP)FederationCertificate managementMultifactor authentication (MFA)Single sign-on (SSO)Security assertion markup language (SAML)Public key infrastructure (PKI)Secret managementKey management 2, 3, 4
2.2 Given a scenario, secure a network in a cloud environmentNetwork segmentationVirtual LAN (VLAN)/Virtual extensible LAN (VXLAN)/Generic network virtualization encapsulation (GENEVE)Micro-segmentationTieringProtocolsDomain name service (DNS)DNS over HTTPS (DoH)DNS over TLS (DoT)DNS security (DNSSEC)Network time protocol (NTP)Network time security (NTS)EncryptionIPSecTransport layer security (TLS)Hypertext transfer protocol secure (HTTPS)TunnelingSecure Shell (SSH)Layer 2 tunneling protocol (L2TP)/Point-to-point tunneling protocol (PPTP)Generic routing encapsulation (GRE)Network servicesFirewallsStatefulStatelessWeb application firewall (WAF)Application delivery controller (ADC)Intrusion protection system (IPS)/Intrusion detection system (IDS)Data loss prevention (DLP)Network access control (NAC)Packet brokersLog and event monitoringNetwork flowsHardening and configuration changesDisabling unnecessary ports and servicesDisabling weak protocols and ciphersFirmware upgradesControl ingress and egress trafficWhitelisting or blacklistingProxy serversDistributed denial of service (DDoS) protection 2, 3
2.3 Given a scenario, apply the appropriate OS and application security controls.PoliciesPassword complexityAccount lockoutApplication whitelistingSoftware featureUser/groupUser permissionsAntivirus/anti-malware/endpoint detection and response (EDR)Host-based IDS (HIDS)/Host-based IPS (HIPS)Hardened baselinesSingle functionFile integrityLog and event monitoringConfiguration managementBuildsStableLong-term support (LTS)BetaCanaryOperating system (OS) upgradesEncryptionApplication programming interface (API) endpointApplicationOSStorageFilesystemMandatory access controlSoftware firewall 2, 3, 4, 5, 7
2.4 Given a scenario, apply data security and compliance controls in cloud environments.EncryptionIntegrityHashing algorithmsDigital signaturesFile integrity monitoring (FIM)ClassificationSegmentationAccess controlImpact of laws and regulationsLegal holdRecords managementVersioningRetentionDestructionWrite once read manyData loss prevention (DLP)Cloud access security broker (CASB) 3, 4, 5
2.5 Given a scenario, implement measures to meet security requirements.ToolsVulnerability scannersPort scannersVulnerability assessmentDefault and common credential scansCredentialed scansNetwork-based scansAgent-based scansService availabilitiesSecurity patchesHot fixesScheduled updatesVirtual patchesSignature updatesRollupsRisk registerPrioritization of patch applicationDeactivate default accountsImpacts of security tools on systems and servicesEffects of cloud service models on security implementation 3
2.6 Explain the importance of incident response procedures.PreparationDocumentationCall treesTrainingTabletopsDocumented incident types/categoriesRoles and responsibilitiesIncident response proceduresIdentificationScopeInvestigationContainment, eradication, and recoveryIsolationEvidence acquisitionChain of custodyPost-incident and lessons learnedRoot cause analysis 9

3.0 Deployment

Exam Objective Chapters
3.1 Given a scenario, integrate components into a cloud solution.Subscription servicesFile subscriptionsCommunicationsEmailVoice over IP (VoIP)MessagingCollaborationVirtual desktop infrastructure (VDI)Directory and identity servicesCloud resourcesIaaSPaaSSaaSProvisioning resourcesComputeStorageNetworkApplicationServerlessDeploying virtual machines (VMs) and custom imagesTemplatesOS templatesSolution templatesIdentity managementContainersConfigure variablesConfigure secretsPersistent storageAuto-scalingPost-deployment validation 1, 2, 7, 8
3.2 Given a scenario, provision storage in cloud environments.TypesBlockStorage area network (SAN)ZoningFileNetwork attached storage (NAS)ObjectTenantsBucketsTiersFlashHybridSpinning disksLong-termInput/output operations per second (IOPS) and read/writeProtocolsNetwork file system (NFS)Common Internet file system (CIFS)Internet small computer system interface (iSCSI)Fibre Channel (FC)Non-volatile memory express over fabrics (NVMe-oF)Redundant array of inexpensive disks (RAID)015610Storage system featuresCompressionDeduplicationThin provisioningThick provisioningReplicationUser quotasHyperconvergedSoftware-defined storage (SDS) 2
3.3 Given a scenario, deploy cloud networking solutions.ServicesDynamic host configuration protocol (DHCP)NTPDNSContent delivery network (CDN)IP address management (IPAM) 2
Virtual private networks (VPNs)Site-to-sitePoint-to-pointPoint-to-siteIPSecMultiprotocol label switching (MPLS)Virtual routingDynamic and static routingVirtual network interface controller (vNIC)SubnettingNetwork appliancesLoad balancersFirewallsVirtual private cloud (VPC)Hub and spokePeeringVLAN/VXLAN/GENEVESingle root input/output virtualization (SR-IOV)Software-defined network (SDN) 2
3.4 Given a scenario, configure the appropriate compute sizing for a deployment.VirtualizationHypervisorsType 1Type 2Simultaneous multi-threading (SMT)Dynamic allocationsOversubscriptionCentral processing unit (CPU)/virtual CPU (vCPU)Graphics processing unit (GPU)VirtualSharedPass-throughClock speed/Instructions per cycle (IPC)HyperconvergedMemoryDynamic allocationBallooning 2
3.5 Given a scenario, perform cloud migrations.Physical to virtual (P2V)Virtual to virtual (V2V)Cloud-to-cloud migrationsVendor lock-inPaaS or SaaS migrationsAccess control lists (ACLs)FirewallsStorage migrationsBlockFileObjectDatabase migrationsCross-service migrationsRelationalNon-relational 2

4.0 Operations and Support

Exam Objective Chapters
4.1 Given a scenario, configure logging, monitoring, and alerting to maintain operational status.LoggingCollectorsSimple network management protocol (SNMP)SyslogAnalysisSeverity categorizationAuditsTypesAccess/authenticationSystemApplicationAutomationTrendingMonitoringBaselinesThresholdsTaggingLog scrubbingPerformance monitoringApplicationInfrastructure componentsResource utilizationAvailabilitySLA-defined uptime requirementsVerification of continuous monitoring activitiesService management tool integrationAlertingCommon messaging methodsEnable/disable alertsMaintenance modeAppropriate responsesPolicies for categorizing and communicating alerts 1, 7, 8
4.2 Given a scenario, maintain efficient operation of a cloud environment.Confirm completion of backupsLife-cycle managementRoadmapsOld/current/new versionsUpgrading and migrating systemsDeprecations or end of lifeChange managementAsset managementConfiguration management database (CMDB)PatchingFeatures or enhancementsFixes for broken or critical infrastructure or applicationsScope of cloud elements to be patchedHypervisorsVMsVirtual appliancesNetworking componentsApplicationsStorage componentsFirmwareSoftwareOSPoliciesn-1RollbacksImpacts of process improvements on systemsUpgrade methodsRolling upgradesBlue-greenCanaryActive-passiveDevelopment/QA/production/DRDashboard and reportingTaggingCostsChargebacksShowbacksElasticity usageConnectivityLatencyCapacityIncidentsHealthOverall utilizationAvailability 4, 5, 7, 8
4.3 Given a scenario, optimize cloud environments.Right-sizingAuto-scalingHorizontal scalingVertical scalingCloud burstingComputeCPUsGPUsMemoryContainersStorageTiersAdaptive optimizationIOPSCapacityDeduplicationCompressionNetworkBandwidthNetwork interface controllers (NICs)LatencySDNEdge computingCDNPlacementGeographicalCluster placementRedundancyColocationDevice drivers and firmwareGenericVendorOpen source 1, 2, 7, 8
4.4 Given a scenario, apply proper automation and orchestration techniques.Infrastructure as codeInfrastructure components and their integrationContinuous integration/ continuous deployment (CI/CD)Version controlConfiguration managementPlaybookContainersAutomation activitiesRoutine operationsUpdatesScalingShutdownsRestartsCreate internal APIsSecure scriptingNo hardcoded passwordsUse of individual service accountsPassword vaultsKey-based authenticationOrchestration sequencing 1, 2, 4, 5, 7
4.5 Given a scenario, perform appropriate backup and restore operations.Backup typesIncrementalDifferentialFullSynthetic fullSnapshotBackup objectsApplication-level backupFilesystem backupDatabase dumpsConfiguration filesBackup targetsTapeDiskObjectBackup and restore policiesRetentionSchedulesLocationSLAsRecovery time objective (RTO)Recovery point objective (RPO)Mean time to recovery (MTTR)3-2-1 ruleThree copies of dataTwo different mediaOne copy off siteRestoration methodsIn placeAlternate locationRestore filesSnapshot 5
4.6 Given a scenario, perform disaster recovery tasks.FailoversFailbackRestore backupsReplicationNetwork configurationsOn-premises and cloud sitesHotWarmColdRequirementsRPORTOSLACorporate guidelinesDocumentationDR kitPlaybookNetwork diagramGeographical datacenter requirements 6

5.0 Troubleshooting

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «CompTIA Cloud+ Study Guide»

Представляем Вашему вниманию похожие книги на «CompTIA Cloud+ Study Guide» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «CompTIA Cloud+ Study Guide»

Обсуждение, отзывы о книге «CompTIA Cloud+ Study Guide» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x