CompTIA Cloud+ Study Guide

CompTIA Cloud+ Study Guide
Авторы книги: id книги: 2135438     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 4225,16 руб.     (46,04$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Зарубежная компьютерная литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119810957 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

In the newly revised Third Edition of  CompTIA Cloud+ Study Guide: Exam CVO-003 , expert IT Ben Piper delivers an industry leading resource for anyone preparing for the CompTIA Cloud+ certification and a career in cloud services. The book introduces candidates to the skills and the competencies critical for success in the field and on the exam. The book breaks down challenging cloud management concepts into intuitive and manageable topics, including cloud architecture and design, cloud security, deployment, operations and support, and cloud troubleshooting. It also offers practical study features, like Exam Essentials and challenging chapter review questions. Written in a concise and straightforward style that will be immediately familiar to the hundreds of thousands of readers who have successfully use other CompTIA study guides to further their careers in IT, the book offers: Efficient and effective training for a powerful certification that opens new and lucrative career opportunities Fully updated coverage for the new Cloud+ CV0-003 Exam that includes the latest in cloud architecture and design Access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for everyone preparing for the CompTIA Cloud+ Exam CV0-003 certification, this book is an ideal resource for current and aspiring cloud services professionals seeking an efficient and up-to-date resource that will dramatically improve their ability to maintain, secure, and optimize cloud environments.

Оглавление

Ben Piper. CompTIA Cloud+ Study Guide

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

CompTIA® Cloud+® Study Guide. Exam CV0-003

Acknowledgments

About the Author

About the Technical Editor

Introduction

Why Should You Become Certified in Cloud Technologies?

What Does This Book Cover?

Interactive Online Learning Environment and Test Bank

How to Use This Book

How Do You Go About Taking the Exam?

Certification Exam Policies

Tips for Taking Your Cloud+ Exam

Cloud+ Exam Renewal

CompTIA Cloud+ Study Guide: Exam CV0-003 Objective Map

1.0 Cloud Architecture and Design

2.0 Security

3.0 Deployment

4.0 Operations and Support

5.0 Troubleshooting

Reader Support for This Book

Assessment Test

Answers to Assessment Test

Chapter 1 Introducing Cloud Computing Configurations and Deployments

Introducing Cloud Computing

Virtualization

Machine Virtualization

Network Virtualization

Cloud Service Models

Software as a Service

Infrastructure as a Service

Platform as a Service

Communications as a Service

Database as a Service

Desktop as a Service

Business Process as a Service

Anything as a Service

Cloud Reference Designs and Delivery Models

Public Cloud

Private Cloud

Community Cloud

Hybrid Cloud

Introducing Cloud Concepts and Components

Applications

Automation

Compute

Networking

Security

Storage

Connecting the Cloud to the Outside World

Deciding Whether to Move to the Cloud

Selecting Cloud Compute Resources

Hypervisor Affinity Rules

Validating and Preparing for the Move to the Cloud

Choosing Elements and Objects in the Cloud

Internet of Things

Machine Learning/Artificial Intelligence (AI)

Supervised Learning

Unsupervised Learning

Creating and Validating a Cloud Deployment

The Cloud Shared Resource Pooling Model

Compute Pools

Network Pools

Storage Pools

Organizational Uses of the Cloud

Production

Quality Assurance/Test

Staging

Development

Scaling and Architecting Cloud Systems Based on Requirements

Understanding Cloud Performance

Delivering High Availability Operations

Managing and Connecting to Your Cloud Resources

Managing Your Cloud Resources

Web Management Interface

Command-Line Interface, APIs, and SDKs

Connecting to Your Cloud Resources

Internet

VPN Access

Dedicated Private Connections

Is My Data Safe? (Replication and Synchronization)

Understanding Load Balancers

Cloud Testing

Vulnerability Testing

Penetration Testing

Performance Testing

Regression Testing

Functional Testing

Usability Testing

Verifying System Requirements

Correct Scaling for Your Requirements

Making Sure the Cloud Is Always Available

Regions

Availability Zones

Cluster Placement

Remote Management of VMs

Monitoring Your Cloud Resources

Writing It All Down (Documentation)

Creating Baselines

Shared Responsibility Model

IaaS

PaaS

SaaS

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 2 Cloud Deployments

Executing a Cloud Deployment

Cloud vs. Data Center Operations

Understanding Deployment and Change Management

Change Management

Obtaining Buy-In from All Involved Parties

Setting a Realistic Migration Timeline

Documenting and Following Procedures

What Is a Cloud Workflow?

Setting Up Your Cloud for Automation

What Are Cloud Tools and Management Systems?

Cloud Deployment Models

Public

Private

Hybrid

Community

Network Deployment Considerations

Network Protocols

Network Ports

Network Configurations

Virtual Private Networks

Firewalls and Microsegmentation

Web Application Firewalls

Application Delivery Controllers

Watching Out for the Bad Guys: Understanding IDSs/IPSs

Demilitarized Zone

VXLAN Deployments

GENEVE

IP Address Management

Network Packet Brokers

Content Delivery Networks

Service Level Agreements

Matching Data Center Resources to Cloud Resources

What Are Available and Proposed Hardware Resources?

Physical and Virtual Processors

Physical and Virtual Memory

Overcommitting Your Memory Resources

Bursting and Ballooning—How Memory Is Handled

Understanding Hyperthreading in a CPU

Hypervisor CPU Optimization with AMD-V and Intel VT-x

CPU Overcommitment Ratios

Single Root I/O Virtualization

Templates and Images

Physical Resource High Availability

Introducing Disaster Recovery

Physical Hardware Performance Benchmarks

Cost Savings When Using the Cloud

Energy Savings in the Cloud

Shared vs. Dedicated Hardware Resources in a Cloud Data Center

Microservices

Containers

Working with Containers

Secrets

Configuring and Deploying Storage

Identifying Storage Configurations

Network-Attached Storage

Direct-Attached Storage

Storage Area Networks

Object/File Storage

Software-Defined Storage

Storage Provisioning

Thick Provisioning

Thin Provisioning

Storage Overcommitment

Physical to Physical

Encrypting Your Data at Rest

Token Models

Input/Output Operations per Second

Compression and Deduplication

Storage Priorities: Understanding Storage Tiers

Tier 1

Tier 2

Tier 3

Managing and Protecting Your Stored Data

High Availability and Failover

Cross-Region Replication

Replication Types: Understanding Synchronous and Asynchronous Replications

Using Mirrors in Cloud-Based Storage Systems

Cloning Your Stored Data

Using RAID for Redundancy

RAID 0

RAID 1

RAID 1+0

RAID 0+1

RAID 5

RAID 6

Quotas and Expiration

Storage Security Considerations

Access Control for Your Cloud-Based Storage

Understanding Obfuscation

Storage Area Networking, Zoning, and LUN Masking

Hyperconverged Appliances

Data Loss Prevention

Accessing Your Storage in the Cloud

Performing a Server Migration

Different Types of Server Migrations

Physical to Virtual

Virtual to Virtual

Virtual to Physical

Online or Offline

Migrating Your Storage Data

Addressing Application Portability

Workload Migration Common Procedures

Examining Infrastructure Capable of Supporting a Migration

Available Network Capacity

Downtime During the Migration

Legal Questions About Migrating to the Cloud

Local Time Zones and Follow-the-Sun Migration Constraints

Managing User Identities and Roles

RBAC: Identifying Users and What Their Roles Are

What Happens When You Authenticate?

Understanding Federation

Single Sign-On Systems

Understanding Infrastructure Services

Domain Name System

Dynamic Host Configuration Protocol

Certificate Services

Load Balancing

Multifactor Authentication

Firewall Security

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 3 Security in the Cloud

Cloud Security Compliance and Configurations

Establishing Your Company's Security Policies

Selecting and Applying the Security Policies to Your Cloud Operations

Some Common Regulatory Requirements

Protecting Your Data

Performing Compliance Audits

Vulnerability Assessments

Encrypting Your Data

IP Security

Transport Layer Security

Other Common Ciphers

File Integrity

Understanding Public Key Infrastructure

Remote Access Protocols

Generic Routing Encapsulation

Layer 2 Tunneling Protocol

Point-to-Point Tunneling Protocol

Automating Cloud Security

Log and Event Monitoring

Distributed Denial-of-Service Protection

Security Best Practices

Securing Accounts

Disabling Unused Accounts

Disabling Unused Services

Disable/Rename Default Accounts

Host-Based Firewall Security

Antivirus Protection

Keeping Your Servers Up-to-Date by Applying the Latest Patches

Proxies

Access Control

Accessing Cloud-Based Objects

The Authentication and Authorization Processes

User Accounts

User Groups

Network-Based Access Control

Cloud Service Models and Security

Cloud Deployment Models and Security

Role-Based Access Control

Mandatory Access Control

Discretionary Access Control

Multifactor Authentication

Single Sign-On

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 4 Implementing Cloud Security

Implementing Security in the Cloud

Data Classification

Segmenting Your Deployment

Storage Segmentation

Computing Segmentation

Implementing Encryption

Applying Multifactor Authentication

Regulatory and Compliance Issues During Implementation

Cloud Access Security Broker

Automating Cloud Security

Automation Tools

Application Programming Interfaces

Command Line

Portals and Dashboards

Techniques for Implementing Cloud Security

Orchestration Systems

Script-Based Services

Customized Security Implementation Approaches

Security Services

Firewalls

Antivirus and Malware Prevention

Endpoint Detection and Response

Intrusion Detection and Prevention

Host-Based Intrusion Detection Systems

Physical Security of Cloud Systems

Automation's Impact on Critical Systems

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 5 Maintaining Cloud Operations

Applying Security Patches

Patching Cloud Resources

Hypervisors

Virtual Machines

Virtual Appliances

Applications

Storage Systems

Clusters

Patching Methodologies

Production Systems

Development Systems

Quality Assurance

Rolling Updates

Blue-Green

Canary

Clustering and Failover

Patching Order of Operations and Dependencies

Updating Cloud Elements

Hotfix

Patch

Version Update

Rollback

Workflow Automation

Runbooks

Orchestration

Continuous Integration and Continuous Deployment

Virtualization Automation Tools and Activities

Snapshots

Cloning Virtual Devices

Patching Automation

Restarting Systems

Shutting Down Systems

Enabling Maintenance Mode

Enabling/Disabling System Alerts

Storage Operations

Types of Backups

Image Backups

LUN Cloning

File Backups

Snapshots

Database Backups

Application-Level Backups

Full Backups

Differential Backups

Incremental Backups

Synthetic Full Backup

Backup Targets

Replicas

Local Backups

Remote Backups

Backup and Restore Operations

Backup Service Level Agreements

Scheduling

Backup Configurations

Dependencies

Online vs. Offline

Retention

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 6 Disaster Recovery, Business Continuity, and Ongoing Maintenance

Implementing a Disaster Recovery and Business Continuity Plan

Service Provider Responsibilities and Capabilities

Recovery Point Objective

Recovery Time Objective

Corporate Policies and Guidelines

Cloud Service Provider Policies and Guidelines

Disaster Recovery Network Capacity

Disaster Recovery ISP Limitations

Disaster Recovery Models and Techniques

Site Mirroring

Replications

Archiving Data

Third-Party Offerings

Business Continuity

Establishing a Business Continuity Plan

Determine Alternate Sites

Define Continuity of Operations

Addressing Network Connectivity

Deploying Edge Sites

Procuring Backup Equipment

Recovery Site Availability

Third-Party Disaster Recovery Vendors

Establishing Service Level Agreements

Cloud Maintenance

Establishing Maintenance Windows

Maintenance Interruptions to Operations

Maintenance Automation Impact and Scope

Common Maintenance Automation Tasks

Log Files Archive and Clearing

Compressing Storage on Drives

Managing and Removing Inactive Accounts

Stale DNS Entries

Orphaned Resources

Outdated Firewall and Security Rules

Reclaiming Resources

Maintaining Access Control Lists

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 7 Cloud Management

Cloud Metrics

Monitoring Your Deployment

Baselines

Anomalies

Alert Methods

Alert Triggers

Event Correlation

Forecasting Required Resources

Event Collection Policies

Event Dissemination Policies

Cloud Support Agreements

Standard Cloud Maintenance Responsibilities

Configuration Management Applications and Tools

Change Management Processes

Change Advisory Board

Document Action and Backout Plans

Adding and Removing Cloud Resources

Determining Usage Patterns

Bursting

Migrating Between Cloud Providers

Scaling Resources to Meet Requirements

Vertical and Horizontal Scaling

Auto-Scaling

Community Cloud Scaling

Scaling the Public Cloud

Elasticity

Extending the Scope of the Cloud

Understanding Application Life Cycles

Deployments

Upgrades

Migrations

Feature Additions or Deletions

Replacements

Retirements

Organizational Changes

Mergers, Acquisitions, and Divestitures

Cloud Service Requirement Changes

Regulatory and Law Changes

Managing Account Provisioning

Account Identification

Authentication

Federations and Single Sign-On

Authorization

Lockout Policies

Password Complexity

Account Automation and Orchestration

User Account Creation

Resource-Based and User-Based Policies

Removing Accounts

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 8 Cloud Management Baselines, Performance, and SLAs

Measuring Your Deployment Against the Baseline

Object Tracking for Baseline Validation

Application Versions

CPU Usage

Enabling the Audit Process

Management Tool Compliance

Network Utilization

Patch Versions

RAM Usage

Storage Utilization

Baseline Validation

Applying Changes to the Cloud to Meet Baseline Requirements

Performance Trending

Service Level Agreement Attainment

Compute Tuning

Network Changes

Storage Tuning

Service/Application Changes

Changing Operations to Meet Expected Performance/Capacity Requirements

Vertical Scaling

Horizontal Scaling

Cloud Accounting, Chargeback, and Reporting

Company Policy Reporting

Reporting Based on SLAs

Using the Cloud Dashboard

Tags

Costs

Elasticity Usage

Connectivity

Latency

Capacity and Utilization

Incident and Health Reports

Uptime and Downtime Reporting

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 9 Troubleshooting

Incident Management

Incident Types

Automation

Cloud Interoperability

Interconnections

Licensing

Networking

Resource Contention and Starvation

Service Outages

Logging Incidents

Prioritizing Incidents

Preparation

Documentation

Call Trees

Tabletops

Documented Incident Types

Templates

Time Synchronization

Workflow

Troubleshooting Cloud Capacity Issues

Capacity Boundaries in the Cloud

API Request Capacity

Bandwidth

Cloud Batch Job Scheduling

Compute Resources

Network Addressing

Storage Capacity

Variance in Number of Users

Troubleshooting Automation and Orchestration

Process and Workflow Issues

Account Mismatch

Change Management Breakdowns

DNS and Server Name Changes

Version Incompatibility

IP Address Changes

Location Changes

Deployment Model Change

Summary

Exam Essentials

Written Lab

Review Questions

Chapter 10 Troubleshooting Networking and Security Issues and Understanding Methodologies

Troubleshooting Cloud Networking Issues

Identifying the Common Networking Issues in the Cloud

Incorrect Subnet Issues

Incorrect IP Addressing

Incorrect Default Gateways and Routing

Network Infrastructure Troubleshooting

Network Latency Troubleshooting

Domain Name System

Quality of Service

Maximum Transmission Units

Available Bandwidth

Validating Firewall and Proxy Configurations

VLAN and VXLAN Issues

Network Troubleshooting and Connectivity Tools

ARP

ipconfig/ifconfig

Netstat

nslookup/dig

Ping

route

SSH

Telnet

tcpdump

tracert/traceroute

Remote Access Tools

Console Port

HTTP

RDP

SSH

Troubleshooting Security Issues

Account Privilege Escalation

Network Access Issues

Authentication

Authorization

Federations

Certificate Configuration Issues

Device-Hardening Settings

External Attacks

Internal Attacks

Maintain Sufficient Security Controls and Processes

Network Access Tunneling and Encryption

Troubleshooting Methodology

Identifying the Problem

Establishing a Theory

Testing the Theory

Creating and Implementing a Plan of Action

Verifying the Resolution

Documenting the Ordeal

Summary

Exam Essentials

Written Lab

Review Questions

Appendix A Answers to Review Questions

Chapter 1: Introducing Cloud Computing Configurations and Deployments

Chapter 2: Cloud Deployments

Chapter 3: Security in the Cloud

Chapter 4: Implementing Cloud Security

Chapter 5: Maintaining Cloud Operations

Chapter 6: Disaster Recovery, Business Continuity, and Ongoing Maintenance

Chapter 7: Cloud Management

Chapter 8: Cloud Management Baselines, Performance, and SLAs

Chapter 9: Troubleshooting

Chapter 10: Troubleshooting Networking and Security Issues and Understanding Methodologies

Appendix B Answers to Written Labs

Chapter 1: Introducing Cloud Computing Configurations and Deployments

Chapter 2: Cloud Deployments

Chapter 3: Security in the Cloud

Chapter 4: Implementing Cloud Security

Chapter 5: Maintaining Cloud Operations

Chapter 6: Disaster Recovery, Business Continuity, and Ongoing Maintenance

Chapter 7: Cloud Management

Chapter 8: Cloud Management Baselines, Performance, and SLAs

Chapter 9: Troubleshooting

Chapter 10: Troubleshooting Networking and Security Issues and Understanding Methodologies

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Third Edition

.....

Every cloud service depends on resource pooling. Resource pooling is when the cloud service provider virtualizes physical resources into a group, or pool, and makes these pooled resources available to customers. The underlying physical resources are then dynamically allocated and reallocated as the demand requires. Recall the NIST definition of cloud computing as “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources …” Resource pooling is a defining feature of the cloud.

Resource pooling hides the physical hardware from the customer and allows many customers to share resources such as storage, compute power, and network bandwidth. This concept is also called multitenancy. We'll look at some examples of these pooled resources in the following sections.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу CompTIA Cloud+ Study Guide
Подняться наверх