Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Comptia Cloud+ | Comptia Cloud+ CV0-003 Certification Prep
Introduction
Introduction Comptia Cloud+ (2:53)
What is cloud computing? (2:04)
Cloud Computing Concepts, Models, and Terminology
Cloud Service Models 2 (3:22)
Cloud Service Models 1 (1:52)
Accountability and Shared Responsibility Model (2:35)
Cloud Deployment Models and Services (11:29)
Cloud Characteristics and Terms (6:23)
Advanced Cloud Services (Advanced Cloud Services) (4:52)
Disk Storage Systems
Disk Types and Configurations (4:54)
Interface Types (2:36)
Disk Redundancies (4:23)
Tiering (3:15)
File System Types (7:10)
Storage Networking
Storage Technologies (9:29)
Storage Types (6:41)
Storage Access Protocols (5:50)
Storage Provision (8:54)
Provisioning Model (6:22)
Storage Protection (4:39)
Network Infrastructure
Network Types (4:15)
Network Optimization (2:40)
Network Topologies (3:41)
Bandwidth and Latency (5:07)
Proxy Servers (7:06)
Routing and Switching (2:57)
NAT and PAT (7:41)
Network Seperation (3:15)
What is the port? How does it work? (5:10)
Most Use Network Ports and Protocols (4:09)
Domain Name Services(DNS) (9:38)
Dynamic Host Configuration Protocol – DHCP (2:54)
Network Time Protocol (2:26)
Virtualization Components
What is Virtualization? (3:39)
Virtualization Technologies (2:56)
Virtualization Host (8:27)
VM Sizing Considerations (9:53)
GPU (3:37)
Memory (6:21)
NIC (2:40)
Virtual machine (2:40)
Virtual Disks (3:14)
vNIC&Virtual Switch (5:01)
Memory (4:16)
Virtualized Infrastructure Service Items (11:18)
Virtualization and the Cloud
Benefits of Virtualization in the Cloud (7:41)
Migrating Virtual Machines (10:08)
Storage Migration - Storage Migration (1:06)
Host Clustering and HA/DR- Host Clustering and HA/DR (3:43)
Cloud Provider Migrations (6:30)
Considerations Regarding Transport (17:16)
Databases & Database Migrations (8:41)
Software Defined (3:37)
Embracing the Cloud
Planning & Needs analysis (6:21)
Designing a Solution (8:27)
Selection (2:08)
DEPLOYMENT PLAN (3:28)
Approval-Implementation (1:03)
Service Model Solutions (5:15)
Cloud Solutions (3:49)
Deploying Virtual Systems (5:48)
Network (4:30)
Virtual Private Cloud (2:04)
Containers (4:15)
Remote Access Tools (6:17)
DevOps
Lifecycle management (7:42)
Application Life Cycle (16:00)
Secure Coding (2:22)
Service Account Best Practices (3:09)
DevOps Cloud Transformation (9:16)
Performance Tuning
Guest Resource Allocation (8:14)
Host Resource Allocation (6:32)
Configuration Best Practices (11:23)
Scalability (1:42)
Performance Concepts (7:27)
Performance Automation (5:14)
Common Performance Issues (7:11)
System Management
Principles and procedures (11:16)
System Administration Best Practices (8:59)
Reporting According to Company Policies (12:25)
Code Updates (12:43)
Patch Management (2:52)
Server Upgrades and Patches (6:47)
N-1 (4:32)
Virtual Machine Updates (3:14)
Other Components (2:50)
Maintenance Automation (3:37)
Monitoring Techniques (6:03)
Log Analysis (8:58)
Automatic Incident Responses (8:15)
Management tools (2:11)
Security in the Cloud
Introducing Cryptography Concepts (3:09)
Data security in cloud (1:00)
Hashing (11:18)
Hashing Files (10:22)
Providing Confidentiality with Encryption (8:04)
Block Versus Stream Ciphers (4:07)
Symmetric Encryption (10:06)
Certificates (11:40)
Steganography And Obfuscation (2:39)
Using Cryptographic Protocols (1:47)
Cipher Suites (3:38)
Exploring PKI Components (9:11)
Encryption Protocols (2:18)
Tunneling Protocols (6:11)
Storage Security (3:43)
Network security (2:48)
Firewalls (8:56)
Network Access Control (9:21)
Understanding IDSs and IPSs (4:43)
Cloud Access Security Agent (3:30)
Antivirus and Anti-Malware Software (8:08)
Data Loss Prevention (5:32)
Hardening (6:16)
Application Whitelist (1:49)
Encryption and Access Control (2:53)
3 A Rule (Authentication, Authorization and Accounting) (3:52)
Single Sign-On (11:03)
KERBEROS & NTLM&LDAP (7:34)
Comparing Access Control Models (2:19)
Role-Based Access Control (3:13)
Establishing Access with Group-Based Privileges (4:39)
Rule Based and Discretionary Access Control (5:40)
Mandatory Access Control (2:48)
Establishing Access (6:07)
Dual-Factor and Multifactor Authentication (1:37)
Security Best Practices
Cloud Security Engineering (11:35)
Security Governance and Strategy (6:41)
Account Management 1 (11:45)
Account Management 2 (9:19)
Passwords (9:19)
Password Policy (9:01)
Documentation of Security Procedures (6:12)
Enforcement of Platform-Specific Security Standards (2:32)
Tagging (3:38)
Reporting According to Company Policies
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock