課程名稱:CompTIA Cloud+ 國際認可證書課程 - 簡稱:CompTIA Cloud+ Training Course |
CV0-003 CompTIA Cloud+
1.0 Cloud Architecture and Design
1.1 Compare and contrast the different types of cloud models
- Deployment models
- Service models
- Advanced cloud services
- Shared responsibility model
1.2 Explain the factors that contribute to capacity planning
- Requirements
- Standard templates
- Licensing
- User density
- System load
- Trend analysis
- Performance capacity planning
1.3 Explain the importance of high availability and scaling in cloud environments
- Hypervisors
- Oversubscription
- Regions and zones
- Applications
- Containers
- Clusters
- High availability of network functions
- Avoid single points of failure
- Scalability
1.4 Given a scenario, analyze the solution design in support of the business requirements
- Requirement analysis
- Environments
- Testing techniques
2.0 Security
2.1 Given a scenario, configure identity and access management
- Identification and authorization
- Directory services
- Federation
- Certificate management
- Multifactor authentication (MFA)
- Single sign-on (SSO)
- Public key infrastructure (PKI)
- Secret management
- Key management
2.2 Given a scenario, secure a network in a cloud environment
- Network segmentation
- Protocols
- Tunneling
- Network services
- Log and event monitoring
- Network flows
- Hardening and configuration changes
2.3 Given a scenario, apply the appropriate OS and application security controls.
- Policies
- User permissions
- Antivirus/anti-malware/endpoint detection and response (EDR)
- Host-based IDS (HIDS) / Host-based IPS (HIPS)
- Hardened baselines
- File integrity
- Log and event monitoring
- Configuration management
- Builds
- Operating system (OS) upgrades
- Encryption
- Mandatory access control
- Software firewall
2.4 Given a scenario, apply data security and compliance controls in cloud environments
- Encryption
- Integrity
- Classification
- Segmentation
- Access control
- Impact of laws and regulations
- Records management
- Data loss prevention (DLP)
- Cloud access security broker (CASB)
2.5 Given a scenario, implement measures to meet security requirements
- Tools
- Vulnerability assessment
- Security patches
- Risk register
- Prioritization of patch application
- Deactivate default accounts
- Impacts of security tools on systems and services
- Effects of cloud service models on security implementation
2.6 Explain the importance of incident response procedures
- Preparation
- Incident response procedures
3.0 Deployment
3.1 Given a scenario, integrate components into a cloud solution
- Subscription services
- Provisioning resources
- Application
- Deploying virtual machines (VMs) and custom images
- Templates
- Identity management
- Containers
- Auto-scaling
- Post-deployment validation
3.2 Given a scenario, provision storage in cloud environments
- Disk types
- Tiering
- Protocols
- Redundant array of inexpensive disks (RAID)
- Storage system features
- User quotas
- Hyperconverged
- Software-defined storage (SDS)
3.3 Given a scenario, deploy cloud networking solutions
- Services
- Virtual private networks (VPNs)
- Virtual routing
- Network appliances
- Virtual private cloud (VPC)
- VLAN/VXLAN/GENEVE
- Single root input/output virtualization (SR-IOV)
- Software-defined network (SDN)
3.4 Given a scenario, configure the appropriate compute sizing for a deployment
- Virtualization
- Central processing unit (CPU)/virtual CPU (vCPU)
- Graphics processing unit (GPU)
- Clock speed/Instructions per cycle (IPC)
- Hyperconverged
- Memory
3.5 Given a scenario, perform cloud migrations
- Physical to virtual (P2V)
- Virtual to virtual (V2V)
- Cloud-to-cloud migrations
- Storage migrations
- Database migrations
4.0 Operations and Support
4.1 Given a scenario, configure logging, monitoring, and alerting to maintain operational status
- Logging
- Monitoring
- Alerting
4.2 Given a scenario, appropriately allocate physical (host) resources using best practices.
- Confirm completion of backups
- Life-cycle management
- Change management
- Asset management
- Patching
- Impacts of process improvements on systems
- Upgrade methods
- Dashboard and reporting
4.3 Given a scenario, optimize cloud environments
- Right-sizing
- Compute
- Storage
- Network
- Placement
- Device drivers and firmware
4.4 Given a scenario, apply proper automation and orchestration techniques
- Infrastructure as code
- Continuous integration/continuous deployment (CI/CD)
- Version control
- Configuration management
- Containers
- Automation activities
- Secure scripting
- Orchestration sequencing
4.5 Given a scenario, perform appropriate backup and restore operations
- Backup types
- Backup objects
- Backup targets
- Backup and restore policies
- Restoration methods
4.6 Given a scenario, perform disaster recovery tasks
- Failovers
- Failback
- Restore backups
- Replication
- Network configurations
- On-premises and cloud sites
- Requirements
- Documentation
- Geographical datacenter requirements
5.0 Troubleshooting
5.1 Given a scenario, use the troubleshooting methodology to resolve cloud-related issues
- Always consider corporate policies, procedures, and impacts before implementing changes
- Identify the problem
- Establish a theory of probable cause (question the obvious)
- Test the theory to determine cause
- Establish a plan of action to resolve the problem and implement the solution
- Verify full system functionality and, if applicable, implement preventive measures
- Document the findings, actions, and outcomes throughout the process
5.2 Explain storage security concepts, methods, and best practices.
- Privilege
- Authentication
- Authorization
- Security groups
- Keys and certificates
- Misconfigured or misapplied policies
- Data security issues
- Exposed endpoints
- Misconfigured or failed security appliances
- Unsupported protocols
- External/internal attacks
5.3 Given a scenario, troubleshoot deployment issues
- Connectivity issues
- Performance degradation
- Configurations
- Applications in containers
- Misconfigured templates
- Missing or incorrect tags
- Insufficient capacity
- Licensing issues
- Vendor-related issues
5.4 Given a scenario, troubleshoot connectivity issues
- Network security group misconfigurations
- Common networking configuration issues
- Network troubleshooting tools
5.5 Given a scenario, troubleshoot common performance issues
- Resource utilization
- Application
- Incorrectly configured or failed load balancing
5.6 Given a scenario, troubleshoot automation or orchestration issues
- Account mismatches
- Change management failures
- Server name changes
- IP address changes
- Location changes
- Version/feature mismatch
- Automation tool incompatibility
- Job validation issue
- Patching failure
The course content above may change at any time without notice in order to better reflect the content of the examination.
|