Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Comptia Cloud+ | Comptia Cloud+ CV0-004 Certification Prep
Introduction
Introduction Comptia Cloud+ (2:53)
What is cloud computing? (2:04)
Cloud Computing Concepts, Models, and Terminology
Cloud Service Models 2 (3:22)
Cloud Service Models 1 (1:52)
Accountability and Shared Responsibility Model (2:35)
Cloud Deployment Models and Services (11:29)
Cloud Characteristics and Terms (6:23)
Advanced Cloud Services (Advanced Cloud Services) (4:52)
Disk Storage Systems
Disk Types and Configurations (4:54)
Interface Types (2:36)
Tiering (3:15)
File System Types (7:10)
Storage Networking
Storage Technologies (9:29)
Storage Types (6:41)
Storage Access Protocols (5:50)
Storage Protection (4:39)
Network Infrastructure
Network Types (4:15)
Network Optimization (2:40)
Network Topologies (3:41)
Bandwidth and Latency (5:07)
Proxy Servers (7:06)
Routing and Switching (2:57)
NAT and PAT (7:41)
Network Seperation (3:15)
What is the port? How does it work? (5:10)
Most Use Network Ports and Protocols (4:09)
Domain Name Services(DNS) (9:38)
Dynamic Host Configuration Protocol – DHCP (2:54)
Network Time Protocol (2:26)
Virtualization Components
What is Virtualization? (3:39)
Virtualization Technologies (2:56)
Virtualization Host (8:27)
VM Sizing Considerations (9:53)
GPU (3:37)
Memory (6:21)
NIC (2:40)
Virtual machine (2:40)
Virtual Disks (3:14)
vNIC&Virtual Switch (5:01)
Memory (4:16)
Virtualized Infrastructure Service Items (11:18)
Virtualization and the Cloud
Benefits of Virtualization in the Cloud (7:41)
Migrating Virtual Machines (10:08)
Storage Migration - Storage Migration (1:06)
Host Clustering and HA/DR- Host Clustering and HA/DR (3:43)
Cloud Provider Migrations (6:30)
Considerations Regarding Transport (17:16)
Databases & Database Migrations (8:41)
Software Defined (3:37)
Cloud Architecture and Design
Planning & Needs analysis (6:21)
Designing a Solution (8:27)
Selection (2:08)
DEPLOYMENT PLAN (3:28)
Approval-Implementation (1:03)
Service Model Solutions (5:15)
Cloud Solutions (3:49)
Deploying Virtual Systems (5:48)
Network (4:30)
Virtual Private Cloud (2:04)
Containers (4:15)
Remote Access Tools (6:17)
Monolithic vs. Microservices (10:37)
Serverless Architecture (8:57)
Hybrid & Multi-Cloud Connectivity (10:49)
DevOps Fundamentals
Lifecycle management (7:42)
Application Life Cycle (16:00)
Secure Coding (2:22)
Service Account Best Practices (3:09)
DevOps Cloud Transformation (9:16)
Continuous Integration vs Continuous Delivery (CI/CD) (5:18)
Infrastructure as Code (IaC) Concepts (8:00)
Version Control Fundamentals (8:11)
Container Orchestration (4:16)
Performance Tuning
Guest Resource Allocation (8:14)
Host Resource Allocation (6:32)
Configuration Best Practices (11:23)
Scalability (1:42)
Performance Concepts (7:27)
Performance Automation (5:14)
Common Performance Issues (7:11)
System Management
Principles and procedures (11:16)
System Administration Best Practices (8:59)
Reporting According to Company Policies (12:25)
Code Updates (12:43)
Patch Management (2:52)
Server Upgrades and Patches (6:47)
N-1 (4:32)
Virtual Machine Updates (3:14)
Other Components (2:50)
Maintenance Automation (3:37)
Monitoring Techniques (6:03)
Log Analysis (8:58)
Automatic Incident Responses (8:15)
Management tools (2:11)
Security in the Cloud
Introducing Cryptography Concepts (3:09)
Data security in cloud (1:00)
Hashing (11:18)
Hashing Files (10:22)
Providing Confidentiality with Encryption (8:04)
Certificates (11:40)
Using Cryptographic Protocols (1:47)
Encryption Protocols (2:18)
Tunneling Protocols (6:11)
Storage Security (3:43)
Network security (2:48)
Firewalls (8:56)
Network Access Control (9:21)
Understanding IDSs and IPSs (4:43)
Cloud Access Security Agent (3:30)
Antivirus and Anti-Malware Software (8:08)
Data Loss Prevention (5:32)
Hardening (6:16)
Application Whitelist (1:49)
Encryption and Access Control (2:53)
3 A Rule (Authentication, Authorization and Accounting) (3:52)
Single Sign-On (11:03)
KERBEROS & NTLM&LDAP (7:34)
Comparing Access Control Models (2:19)
Role-Based Access Control (3:13)
Establishing Access with Group-Based Privileges (4:39)
Rule Based and Discretionary Access Control (5:40)
Mandatory Access Control (2:48)
Establishing Access (6:07)
Dual-Factor and Multifactor Authentication (1:37)
Zero Trust Architecture (11:00)
Secure Access Service Edge (SASE) (10:33)
CASB (Cloud Access Security Broker) (15:40)
Security Best Practices
Cloud Security Engineering (11:35)
Security Governance and Strategy (6:41)
Account Management 1 (11:45)
Account Management 2 (9:19)
Passwords (9:19)
Password Policy (9:01)
Documentation of Security Procedures (6:12)
Enforcement of Platform-Specific Security Standards (2:32)
Tagging (3:38)
Vulnerability Management (2:51)
Test Methods (2:59)
Vulnerability Scanning (11:07)
Penetration Tests (2:45)
Passive & Active Reconnaissance (2:01)
Initial Exploitation (3:45)
Intrusive and Non-Intrusive Testing (1:18)
Passive Versus Active Tools (11:30)
Scope (7:49)
Incident Response (6:39)
Event Types (3:29)
Incident Response Procedures (6:59)
Business Continuity and Disaster Recovery
Business Continuity (2:29)
Recovery Sites (5:52)
Site Mirroring (3:09)
High Availability (5:55)
Multipathing (4:13)
High Availability Network Functions (7:02)
Disaster Recovery Methods (12:41)
Backup (15:14)
3-2-1 Rule (5:52)
Backup Schedules (8:55)
Restoration Methods (3:01)
Testing, Automation, and Changes
Key Comparisons (9:10)
Test Techniques (1:20)
Performance test (3:00)
Configuration Test (9:35)
SLA Comparisons (2:37)
Automation and Orchestration (6:01)
Automation Activities (3:21)
Change and Configuration Management (14:38)
Configuration management (5:43)
Troubleshooting
Troubleshooting Methodology (8:35)
Troubleshooting Steps (4:28)
Troubleshooting Steps Exam-1: Privilege Issues (5:16)
Troubleshooting Steps Exam-2: Malware (4:00)
Troubleshooting Steps Exam-3: Key and Certificate Issues (2:59)
Misconfigured or Misapplied Policies (4:41)
Script Misconfiguration (2:09)
Misconfiguration (3:44)
Template Misconfiguration (4:12)
CSP/ISP Outage (10:33)
Network Security Group Misconfiguration (15:56)
Performance issues (12:28)
Automation and Editing Issues (5:59)
Job Verification Issue (2:33)
Documentation and Analysis (3:46)
Log Files (3:56)
Troubleshooting Tools (6:54)
Job Verification Issue
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock