CompTIA Cloud+ Certification All-In-One Exam Guide (Exam CV0-003)

Detalles Bibliográficos
Autor principal: Vanderburg, Eric A. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York : McGraw-Hill Education 2021.
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631655706719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Acknowledgments
  • Introduction
  • Chapter 1 Cloud Computing Concepts, Models, and Terminology
  • Cloud Service Models
  • Infrastructure as a Service
  • Platform as a Service
  • Software as a Service
  • Database as a Service
  • Communications as a Service
  • Business Process as a Service
  • Anything as a Service
  • Accountability and the Shared Responsibility Model
  • Cloud Deployment Models and Services
  • Private Cloud
  • Public Cloud
  • Hybrid Cloud
  • Community Cloud
  • Cloud Within a Cloud
  • On-Premises vs. Off-Premises Hosting
  • Orchestration Platforms
  • Multicloud
  • Cloud Characteristics and Terms
  • Elasticity
  • Demand-Driven Service
  • Pay-as-You-Grow
  • Chargeback
  • Ubiquitous Access
  • Metering
  • Multitenancy
  • Cloud Bursting
  • Baselines
  • Source and Target Hosts
  • Existing Systems
  • Cloud Elements
  • Advanced Cloud Services
  • Machine Learning and Artificial Intelligence
  • Serverless
  • Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda
  • Internet of Things
  • Chapter Review
  • Questions
  • Answers
  • Chapter 2 Disk Storage Systems
  • Disk Types and Configurations
  • Rotational Media
  • Solid State Drive
  • USB Drive
  • Tape
  • Interface Types
  • Access Speed
  • Redundant Array of Independent Disks (RAID)
  • Write Once, Read Many (WORM)
  • Tiering
  • Performance Levels of Each Tier
  • Policies
  • File System Types
  • Unix File System
  • Extended File System
  • File Allocation Table File System
  • New Technology File System
  • Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows
  • Resilient File System
  • Virtual Machine File System
  • Z File System
  • Chapter Review
  • Questions
  • Answers
  • Chapter 3 Storage Networking
  • Storage Types and Technologies
  • Direct Attached Storage
  • Storage Area Network.
  • Network Attached Storage
  • Object Storage
  • Exercise 3-1: Creating Object Storage
  • Deduplication Technologies
  • Compression Technologies
  • Data BLOB
  • Storage Access Protocols
  • Fibre Channel
  • Fibre Channel Protocol
  • Fibre Channel over Ethernet
  • Ethernet
  • TCP/IP
  • Internet Fibre Channel Protocol
  • Internet Small Computer System Interface
  • Nonvolatile Memory Express Over Fabrics
  • Storage Provisioning
  • Performance
  • Logical Unit Numbers
  • Network Shares
  • Zoning and LUN Masking
  • Multipathing
  • Provisioning Model
  • Encryption Requirements
  • Tokenization
  • Storage Protection
  • High Availability
  • Storage Replication
  • Chapter Review
  • Questions
  • Answers
  • Chapter 4 Network Infrastructure
  • Network Types
  • Intranet
  • Internet
  • Extranet
  • Network Optimization
  • Network Scope
  • Network Topologies
  • Bandwidth and Latency
  • Load Balancing
  • Network Service Tiers
  • Exercise 4-1: Configuring Network Service Tiers in Google Cloud
  • Proxy Servers
  • Content Delivery Network
  • Routing and Switching
  • Network Address Translation
  • Port Address Translation
  • Subnetting and Supernetting
  • Routing Tables
  • Network Segmentation and Micro-segmentation
  • Network Ports and Protocols
  • Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure
  • File Transfer Protocol and FTP over SSL
  • Secure Shell File Transfer Protocol
  • Domain Name System
  • Dynamic Host Configuration Protocol
  • IP Address Management
  • Simple Mail Transfer Protocol
  • Network Time Protocol
  • Well-Known Ports
  • Chapter Review
  • Questions
  • Answers
  • Chapter 5 Virtualization Components
  • Hypervisor
  • Type 1
  • Type 2
  • Proprietary
  • Open Source
  • Consumer vs. Enterprise
  • Virtualization Host
  • Hardware-Assisted Virtualization
  • Single Root Input/Output Virtualization
  • BIOS
  • UEFI
  • Firmware Configurations.
  • Hyperconverged Systems and Infrastructure
  • VM Sizing Considerations
  • CPU
  • GPU
  • Memory
  • NIC
  • Exercise 5-1: Creating a Virtual Switch in Hyper-V
  • Virtual Machine
  • Virtual Disks
  • vNIC
  • Virtual Switches
  • Memory
  • Storage Virtualization
  • Guest Tools
  • Exercise 5-2: Creating a Virtual Machine in Hyper-V
  • Virtualized Infrastructure Service Elements
  • DNS
  • DHCP
  • Certificate Services
  • Local Agents
  • Antivirus
  • Load Balancing
  • Multifactor Authentication
  • Firewall
  • IDS/IPS
  • Chapter Review
  • Questions
  • Answers
  • Chapter 6 Virtualization and the Cloud
  • Benefits of Virtualization in a Cloud Environment
  • Shared Resources
  • Elasticity
  • Network and Application Isolation
  • Infrastructure Consolidation
  • Virtual Data Center Creation
  • Virtual Resource Migrations
  • Virtual Machine Templates
  • Physical to Virtual
  • Virtual to Virtual
  • Virtual to Physical
  • Physical to Physical
  • Virtual Machine Cloning
  • Virtual Machine Snapshots
  • Clones vs. Snapshots
  • Storage Migration
  • Host Clustering and HA/DR
  • Cloud Provider Migrations
  • Exercise 6-1: Creating a Cloud Firewall on Azure
  • Migration Considerations
  • Requirements Gathering
  • Migration Scheduling
  • Upgrading
  • Testing
  • Databases
  • Software Defined
  • Software Defined Network
  • Software Defined Storage
  • Software Defined Data Center
  • Chapter Review
  • Questions
  • Answers
  • Chapter 7 Cloud Adoption
  • Planning
  • Requirement Analysis
  • Designing a Solution
  • Selection
  • Deployment Plan
  • Approval
  • Implementation
  • Service Model Solutions
  • Solutions
  • Deploying Virtual Systems
  • Networking
  • Exercise 7-1: Creating a Virtual Network in Azure
  • Exercise 7-2: Creating a Default Route on Azure
  • Containers
  • Post-Deployment Validation
  • Remote Access Tools
  • Remote Hypervisor Access
  • RDP
  • Console Port
  • SSH
  • HTTP.
  • Chapter Review
  • Questions
  • Answers
  • Chapter 8 DevOps
  • Application Life Cycle
  • Phase 1: Specifications
  • Phase 2: Development
  • Phase 3: Testing
  • Phase 4: Deployment
  • Phase 5: Maintenance
  • Life Cycle Management
  • Ending Applications
  • Application Replacement
  • Application Retirement
  • Application Migration
  • Application Feature Use (Increase/Decrease)
  • Secure Coding
  • Avoid Hardcoded Passwords
  • Service Account Best Practices
  • Password Vaults
  • Key-Based Authentication
  • Exercise 8-1: Setting Up SSH Keys for Key-Based Authentication
  • DevOps Cloud Transformation
  • Business Needs Change
  • Continuous Integration/Continuous Delivery
  • Infrastructure as Code
  • Chapter Review
  • Questions
  • Answers
  • Chapter 9 Performance Tuning
  • Host Resource Allocation
  • Compute Resources
  • Quotas and Limits
  • Licensing
  • Reservations
  • Resource Pools
  • Guest Resource Allocation
  • Compute Resources
  • Quotas and Limits
  • Licensing
  • Physical Resource Redirection
  • Resource Pools
  • Dynamic Resource Allocation
  • Optimizing Performance
  • Configuration Best Practices
  • Exercise 9-1: Setting CPU Affinity and Anti-Affinity Rules in VMWare Cloud
  • Scalability
  • Performance Concepts
  • Performance Automation
  • Common Performance Issues
  • Common Disk Issues
  • Common Memory Issues
  • Network Issues
  • Physical Processor Issues
  • Chapter Review
  • Questions
  • Answers
  • Chapter 10 Systems Management
  • Policies and Procedures
  • Standard Operating Procedures
  • Workflow
  • Capacity Management
  • Records Management
  • Systems Management Best Practices
  • Documentation
  • Standardization
  • Metrics
  • Dashboards
  • Planning
  • Systems Maintenance
  • Code Updates
  • Deployment Landscapes
  • Deployment Methodologies
  • Patch Management
  • Exercise 10-1: Configuring Group Policy for Automatic Updates
  • Component Updates.
  • Maintenance Automation
  • Monitoring Techniques
  • Collector Protocols and Methods
  • Tagging
  • Log Analysis
  • Baselines
  • Thresholds
  • Trending
  • Automated Event Responses
  • Log Scrubbing
  • Verification of Continuous Monitoring Activities
  • Management Tools
  • Chapter Review
  • Questions
  • Answers
  • Chapter 11 Security in the Cloud
  • Data Security
  • Encryption
  • Public Key Infrastructure
  • Encryption Protocols
  • Tunneling Protocols
  • Ciphers
  • Storage Security
  • Protected Backups
  • Network Security
  • Segmentation
  • Firewall
  • DDoS Protection
  • Packet Capture
  • Network Flow
  • IDS/IPS
  • Packet Broker
  • APIs
  • Effects of Cloud Service Models on Security Implementation
  • Endpoint Protection
  • Host-Based Firewall
  • Antivirus/Antimalware
  • Endpoint Detection and Response
  • Data Loss Prevention
  • Exercise 11-1: Creating a DLP Policy for Office 365
  • NAC
  • Hardening
  • Application Whitelisting
  • Impact of Security Tools to Systems and Services
  • Access Control
  • Identification
  • Authentication
  • Authorization
  • Single Sign-On
  • Federation
  • Access Control Protocols
  • Access Control Methodologies
  • Multifactor Authentication
  • Chapter Review
  • Questions
  • Answers
  • Chapter 12 Security Best Practices
  • Cloud Security Engineering
  • Implementing Layered Security
  • Protecting Against Availability Attacks
  • Least Privilege
  • Separation of Duties
  • Security Automation
  • Security Governance and Strategy
  • Developing Company Security Policies
  • Account Management Policies
  • Documenting Security Procedures
  • Assessment and Auditing
  • Leveraging Established Industry Standards and Regulations
  • Applying Platform-Specific Security Standards
  • Data Classification
  • Legal Holds
  • Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365
  • Keeping Employees and Tools Up to Date.
  • Roles and Responsibilities.