Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Cloud Essentials CLO-002 Certification Exam Prep Lab
Cloud Principles
Cloud Service Models-1 (1:52)
Cloud Service Models-2 (3:25)
Accountability and Shared Responsibility Model (2:35)
Cloud Characteristics and Terms (6:23)
Cloud Deployment Models and Services (11:29)
Advanced Cloud Services (4:52)
Quiz
Cloud Design
Planning & Needs analysis (6:21)
Designing a Solution (8:27)
Selection (2:08)
Deployment Plan (3:28)
Approval-Implementation (1:03)
Service Model Solutions (5:15)
Cloud Deployment Solutions (3:49)
Deploying Virtual Systems (5:48)
Network Deployment (4:30)
Virtual Private Cloud (2:04)
Containers (4:15)
Recovery Sites (5:52)
Site Mirroring (3:09)
High Availability (5:55)
Backup (15:14)
Backup Schedules (8:55)
Restoration Methods (3:01)
Disaster Recovery Methods (12:41)
LAB-Create VPC in AWS (15:06)
Quiz
Cloud Networking
Network Topologies (3:41)
Network Types (4:15)
Routing and Switching (2:57)
NAT and PAT (7:41)
Network Seperation (3:15)
Firewalls (8:56)
Remote Access Tools (6:17)
Using VPNs for Remote Access (3:51)
Multipathing-Load Balancing (4:13)
Quiz
Cloud Storage
Storage Technologies (9:29)
Storage Types and Technologies (6:41)
Storage Access Protocols (5:50)
Storage Provision (8:54)
Provisioning Model (6:22)
Storage Protection (4:39)
Quiz
Cloud Vendors Relationships
Statement of Work (3:28)
Finding and Evaluating Cloud Vendors (14:11)
Conducting Evaluations (4:11)
Negotiating Contracts and Billing (9:50)
Licensing Models (5:54)
Human Capital (2:28)
Professional Services (3:56)
Quiz
Cloud Financial Concepts
Financial Planning of Cloud Resources (11:25)
Capital and Operating Expenditures (6:06)
Chargebacks (12:41)
Licensing Types (10:17)
Laws, Regulations And Safety Standards (3:19)
Cloud Service Provider Compatibility (4:51)
Quiz
Cloud Advising
Key Stakeholders (2:45)
Using Cloud Assessments (1:50)
Using Baselines (3:10)
Conducting Feasibility Study (2:21)
Making GAP Analysis (2:50)
Using Reporting (1:30)
Understanding Benchmarks (3:38)
Documentation and Diagramming (1:30)
Quiz
Cloud Migration
Storage Migration (1:06)
Virtual Machines Migration (10:08)
Cloud Provider Migrations (6:30)
Databases & Database Migrations (8:41)
Quiz
Management and Technical Operations
Principles and procedures (11:16)
System Administration Best Practices (8:59)
Reporting According to Company Policies (12:25)
Code Updates (12:43)
Patch Management (2:53)
Server Upgrades and Patches (6:47)
N-1 (4:32)
Virtual Machine Updates (3:14)
Other Components (2:50)
Maintenance Automation (3:37)
Management tools (2:11)
Quiz
Loggin & Monitoring & Incident Response
Log Analysis (8:58)
Event Types (3:29)
Monitoring Techniques (6:03)
Incident Response (6:39)
Incident Response Procedures (6:59)
Automatic Incident Responses (8:15)
Quiz
DevOps
Application Lifecycle (16:00)
Lifecycle management (7:42)
Secure Coding (2:22)
Service Account Best Practices (3:09)
DevOps Cloud Transformation (9:16)
Quiz
Cloud Security
Storage Security (3:43)
Data security (1:00)
Network security (2:49)
Cloud Access Security Agent (3:30)
Quiz
Governance and Risk
Risk Management (2:45)
Risk Assessment (13:06)
Risk Registers (5:52)
Change and Configuration Management (14:38)
Configuration management (5:43)
Resource Management (2:17)
Exploring Security Policies (1:11)
Personnel Management Policies (10:40)
Policy Violations and Adverse Actions (1:36)
Responding to Incidents (2:33)
Quiz
Cloud Access & Authorization Models
3 A Rule (Authentication, Authorization and Accounting) (3:52)
Single Sign-On (11:03)
Comparing Access Control Models (2:19)
Role-Based Access Control (3:13)
Rule Based and Discretionary Access Control (5:40)
Mandatory Access Control (2:48)
Attribute-Based Access Control (4:14)
Establishing Access and Establishing Access with Group-Based Privileges (6:07)
Quiz
Cloud Security Consecpt
Introducing Cryptography Concepts (3:09)
Symmetric-Asymmetric Encryption (10:06)
Certificates (11:40)
Using Cryptographic Protocols (1:47)
Exploring PKI Components (9:11)
Antivirus and Anti-Malware Software (8:08)
Data Loss Prevention (5:32)
Hardening (6:16)
Vulnerability Management (2:51)
Test Methods (2:59)
Vulnerability Scanning (11:08)
Penetration Tests (2:45)
Passive & Active Reconnaissance (2:01)
Initial Exploitation (3:45)
Intrusive and Non-Intrusive Testing (1:18)
Passive Versus Active Tools (11:30)
Quiz
Recovery Sites
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock