CompTIA Cloud+ Certification All-In-One Exam Guide (Exam CV0-003)
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education
2021.
|
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631655706719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Acknowledgments
- Introduction
- Chapter 1 Cloud Computing Concepts, Models, and Terminology
- Cloud Service Models
- Infrastructure as a Service
- Platform as a Service
- Software as a Service
- Database as a Service
- Communications as a Service
- Business Process as a Service
- Anything as a Service
- Accountability and the Shared Responsibility Model
- Cloud Deployment Models and Services
- Private Cloud
- Public Cloud
- Hybrid Cloud
- Community Cloud
- Cloud Within a Cloud
- On-Premises vs. Off-Premises Hosting
- Orchestration Platforms
- Multicloud
- Cloud Characteristics and Terms
- Elasticity
- Demand-Driven Service
- Pay-as-You-Grow
- Chargeback
- Ubiquitous Access
- Metering
- Multitenancy
- Cloud Bursting
- Baselines
- Source and Target Hosts
- Existing Systems
- Cloud Elements
- Advanced Cloud Services
- Machine Learning and Artificial Intelligence
- Serverless
- Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda
- Internet of Things
- Chapter Review
- Questions
- Answers
- Chapter 2 Disk Storage Systems
- Disk Types and Configurations
- Rotational Media
- Solid State Drive
- USB Drive
- Tape
- Interface Types
- Access Speed
- Redundant Array of Independent Disks (RAID)
- Write Once, Read Many (WORM)
- Tiering
- Performance Levels of Each Tier
- Policies
- File System Types
- Unix File System
- Extended File System
- File Allocation Table File System
- New Technology File System
- Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows
- Resilient File System
- Virtual Machine File System
- Z File System
- Chapter Review
- Questions
- Answers
- Chapter 3 Storage Networking
- Storage Types and Technologies
- Direct Attached Storage
- Storage Area Network.
- Network Attached Storage
- Object Storage
- Exercise 3-1: Creating Object Storage
- Deduplication Technologies
- Compression Technologies
- Data BLOB
- Storage Access Protocols
- Fibre Channel
- Fibre Channel Protocol
- Fibre Channel over Ethernet
- Ethernet
- TCP/IP
- Internet Fibre Channel Protocol
- Internet Small Computer System Interface
- Nonvolatile Memory Express Over Fabrics
- Storage Provisioning
- Performance
- Logical Unit Numbers
- Network Shares
- Zoning and LUN Masking
- Multipathing
- Provisioning Model
- Encryption Requirements
- Tokenization
- Storage Protection
- High Availability
- Storage Replication
- Chapter Review
- Questions
- Answers
- Chapter 4 Network Infrastructure
- Network Types
- Intranet
- Internet
- Extranet
- Network Optimization
- Network Scope
- Network Topologies
- Bandwidth and Latency
- Load Balancing
- Network Service Tiers
- Exercise 4-1: Configuring Network Service Tiers in Google Cloud
- Proxy Servers
- Content Delivery Network
- Routing and Switching
- Network Address Translation
- Port Address Translation
- Subnetting and Supernetting
- Routing Tables
- Network Segmentation and Micro-segmentation
- Network Ports and Protocols
- Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure
- File Transfer Protocol and FTP over SSL
- Secure Shell File Transfer Protocol
- Domain Name System
- Dynamic Host Configuration Protocol
- IP Address Management
- Simple Mail Transfer Protocol
- Network Time Protocol
- Well-Known Ports
- Chapter Review
- Questions
- Answers
- Chapter 5 Virtualization Components
- Hypervisor
- Type 1
- Type 2
- Proprietary
- Open Source
- Consumer vs. Enterprise
- Virtualization Host
- Hardware-Assisted Virtualization
- Single Root Input/Output Virtualization
- BIOS
- UEFI
- Firmware Configurations.
- Hyperconverged Systems and Infrastructure
- VM Sizing Considerations
- CPU
- GPU
- Memory
- NIC
- Exercise 5-1: Creating a Virtual Switch in Hyper-V
- Virtual Machine
- Virtual Disks
- vNIC
- Virtual Switches
- Memory
- Storage Virtualization
- Guest Tools
- Exercise 5-2: Creating a Virtual Machine in Hyper-V
- Virtualized Infrastructure Service Elements
- DNS
- DHCP
- Certificate Services
- Local Agents
- Antivirus
- Load Balancing
- Multifactor Authentication
- Firewall
- IDS/IPS
- Chapter Review
- Questions
- Answers
- Chapter 6 Virtualization and the Cloud
- Benefits of Virtualization in a Cloud Environment
- Shared Resources
- Elasticity
- Network and Application Isolation
- Infrastructure Consolidation
- Virtual Data Center Creation
- Virtual Resource Migrations
- Virtual Machine Templates
- Physical to Virtual
- Virtual to Virtual
- Virtual to Physical
- Physical to Physical
- Virtual Machine Cloning
- Virtual Machine Snapshots
- Clones vs. Snapshots
- Storage Migration
- Host Clustering and HA/DR
- Cloud Provider Migrations
- Exercise 6-1: Creating a Cloud Firewall on Azure
- Migration Considerations
- Requirements Gathering
- Migration Scheduling
- Upgrading
- Testing
- Databases
- Software Defined
- Software Defined Network
- Software Defined Storage
- Software Defined Data Center
- Chapter Review
- Questions
- Answers
- Chapter 7 Cloud Adoption
- Planning
- Requirement Analysis
- Designing a Solution
- Selection
- Deployment Plan
- Approval
- Implementation
- Service Model Solutions
- Solutions
- Deploying Virtual Systems
- Networking
- Exercise 7-1: Creating a Virtual Network in Azure
- Exercise 7-2: Creating a Default Route on Azure
- Containers
- Post-Deployment Validation
- Remote Access Tools
- Remote Hypervisor Access
- RDP
- Console Port
- SSH
- HTTP.
- Chapter Review
- Questions
- Answers
- Chapter 8 DevOps
- Application Life Cycle
- Phase 1: Specifications
- Phase 2: Development
- Phase 3: Testing
- Phase 4: Deployment
- Phase 5: Maintenance
- Life Cycle Management
- Ending Applications
- Application Replacement
- Application Retirement
- Application Migration
- Application Feature Use (Increase/Decrease)
- Secure Coding
- Avoid Hardcoded Passwords
- Service Account Best Practices
- Password Vaults
- Key-Based Authentication
- Exercise 8-1: Setting Up SSH Keys for Key-Based Authentication
- DevOps Cloud Transformation
- Business Needs Change
- Continuous Integration/Continuous Delivery
- Infrastructure as Code
- Chapter Review
- Questions
- Answers
- Chapter 9 Performance Tuning
- Host Resource Allocation
- Compute Resources
- Quotas and Limits
- Licensing
- Reservations
- Resource Pools
- Guest Resource Allocation
- Compute Resources
- Quotas and Limits
- Licensing
- Physical Resource Redirection
- Resource Pools
- Dynamic Resource Allocation
- Optimizing Performance
- Configuration Best Practices
- Exercise 9-1: Setting CPU Affinity and Anti-Affinity Rules in VMWare Cloud
- Scalability
- Performance Concepts
- Performance Automation
- Common Performance Issues
- Common Disk Issues
- Common Memory Issues
- Network Issues
- Physical Processor Issues
- Chapter Review
- Questions
- Answers
- Chapter 10 Systems Management
- Policies and Procedures
- Standard Operating Procedures
- Workflow
- Capacity Management
- Records Management
- Systems Management Best Practices
- Documentation
- Standardization
- Metrics
- Dashboards
- Planning
- Systems Maintenance
- Code Updates
- Deployment Landscapes
- Deployment Methodologies
- Patch Management
- Exercise 10-1: Configuring Group Policy for Automatic Updates
- Component Updates.
- Maintenance Automation
- Monitoring Techniques
- Collector Protocols and Methods
- Tagging
- Log Analysis
- Baselines
- Thresholds
- Trending
- Automated Event Responses
- Log Scrubbing
- Verification of Continuous Monitoring Activities
- Management Tools
- Chapter Review
- Questions
- Answers
- Chapter 11 Security in the Cloud
- Data Security
- Encryption
- Public Key Infrastructure
- Encryption Protocols
- Tunneling Protocols
- Ciphers
- Storage Security
- Protected Backups
- Network Security
- Segmentation
- Firewall
- DDoS Protection
- Packet Capture
- Network Flow
- IDS/IPS
- Packet Broker
- APIs
- Effects of Cloud Service Models on Security Implementation
- Endpoint Protection
- Host-Based Firewall
- Antivirus/Antimalware
- Endpoint Detection and Response
- Data Loss Prevention
- Exercise 11-1: Creating a DLP Policy for Office 365
- NAC
- Hardening
- Application Whitelisting
- Impact of Security Tools to Systems and Services
- Access Control
- Identification
- Authentication
- Authorization
- Single Sign-On
- Federation
- Access Control Protocols
- Access Control Methodologies
- Multifactor Authentication
- Chapter Review
- Questions
- Answers
- Chapter 12 Security Best Practices
- Cloud Security Engineering
- Implementing Layered Security
- Protecting Against Availability Attacks
- Least Privilege
- Separation of Duties
- Security Automation
- Security Governance and Strategy
- Developing Company Security Policies
- Account Management Policies
- Documenting Security Procedures
- Assessment and Auditing
- Leveraging Established Industry Standards and Regulations
- Applying Platform-Specific Security Standards
- Data Classification
- Legal Holds
- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365
- Keeping Employees and Tools Up to Date.
- Roles and Responsibilities.