Program Length | Total Contact Hours | Program Cost | |||
Clock Hours | 180 | Theory Hours | 80 | ||
Weeks | 16 | Lab Hours | 100 | ||
Externship Hours | |||||
Total Hours | 180 |
Course Number | Course Title | Theory Hours | Lab Hours |
CLOUD+ CV0-003 | Cloud and Cloud Security Management | 50 | |
Total theory Hours | 50 | ||
CLOUD+ CV0-003 | Cloud and Cloud Security Management | 40 | |
Lab Hours Breakdown | 40 | ||
Total of Course Hours | 90 | ||
CLOUD+ CV0-003 | Cloud and Cloud Security Management | 50 | |
Total theory Hours | 50 | ||
CLOUD+ CV0-003 | Cloud and Cloud Security Management | 40 | |
Lab Hours Breakdown | 40 | ||
Total of Course Hours | 90 | ||
Total Hours | 180 | ||
This Course is also offered Online and On-grounds. |
Program Objective
The student will be able to install, configure and troubleshoot computer networks. Student will understand some basic/advanced cloud terminologies and concepts, and have likely worked with public cloud or Software-as-a-Service solutions, the ability to analyze, evaluate, design, and test cloud computing solutions are hard skills to find, and are in high demand. In this course, you will apply the skills required to evaluate and implement standard deployments. You will implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. You will manage workload migrations, manage cloud vendors to control costs, use automation and orchestration to bring business value from cloud solutions, and ensure security of cloud implementations through the use of cybersecurity best practices
Program Description
Lesson 1: Preparing to Deploy Cloud Solutions
Topic A: Describe Interaction of Cloud Components and Services
Topic B: Describe Interaction of Non-cloud Components and Services
Topic C: Evaluate Existing Components and Services for Cloud Deployment
Topic D: Evaluate Automation and Orchestration Options
Topic E: Prepare for Cloud Deployment
Lesson 2: Deploying a Pilot Project
Topic A: Manage Change in a Pilot Project
Topic B: Execute Cloud Deployment Workflow
Topic C: Complete Post-Deployment Configuration
Lesson 3: Testing Pilot Project Deployments
Topic A: Identify Cloud Service Components for Testing
Topic B: Test for High Availability and Accessibility
Topic C: Perform Deployment Load Testing
Topic D: Analyze Test Results
Lesson 4: Designing a Secure and Compliant Cloud Infrastructure
Topic A: Design Cloud Infrastructure for Security
Topic B: Determine Organizational Compliance Needs
Lesson 5: Designing and Implementing a Secure Cloud Environment
Topic A: Design Virtual Network for Cloud Deployment
Topic B: Determine Network Access Requirements
Topic C: Secure Networks for Cloud Interaction
Topic D: Manage Cloud Component Security
Topic E: Implement Security Technologies
Lesson 6: Planning Identity and Access Management for Cloud Deployments
Topic A: Determine Identity Management and Authentication Technologies
Topic B: Plan Account Management Policies for the Network and Systems
Topic C: Control Access to Cloud Objects
Topic D: Provision Accounts
Lesson 7: Determining CPU and Memory Sizing for Cloud Deployments
Topic A: Determine CPU Size for Cloud Deployment
Topic B: Determine Memory Size for Cloud Deployment
Lesson 8: Determining Storage Requirements for Cloud Deployments
Topic A: Determine Storage Technology Requirements
Topic B: Select Storage Options for Deployment
Topic C: Determine Storage Access and Provisioning Requirements
Topic D: Determine Storage Security Options
Lesson 9: Analyzing Workload Characteristics to Ensure Successful Migration
Topic A: Determine the Type of Cloud Deployment to Perform
Topic B: Manage Virtual Machine and Container Migration
Topic C: Manage Network, Storage, and Data Migration
Lesson 10: Maintaining Cloud Systems
Topic A: Patch Cloud Systems
Topic B: Design and Implement Automation and Orchestration for Maintenance
Lesson 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures
Topic A: Back Up and Restore Cloud Data
Topic B: Implement Disaster Recovery Plans
Topic C: Implement Business Continuity Plans
Lesson 12: Analyzing Cloud Systems for Performance
Topic A: Monitor Cloud Systems to Measure Performance
Topic B: Optimize Cloud Systems to Meet Performance Criteria
Lesson 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting
Topic A: Monitor for Anomalies and Resource Needs
Topic B: Plan for Capacity
Topic C: Create Reports on Cloud System Metrics
Lesson 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues
Topic A: Troubleshoot Deployment Issues
Topic B: Troubleshoot Capacity Issues
Topic C: Troubleshoot Automation and Orchestration Issues
Lesson 15: Troubleshooting Connectivity Issues
Topic A: Identify Connectivity Issues
Topic B: Troubleshoot Connectivity Issues
Lesson 16: Troubleshooting Security Issues
Topic A: Troubleshoot Identity and Access Issues
Topic B: Troubleshoot Attacks
Topic C: Troubleshoot Other Security Issues
- Networking Concepts
- Explain the purposes and uses of ports and protocols
- Explain devices, applications, protocols and services at their appropriate OSI layers.
- Explain the concepts and characteristics of routing and switching
- Given a scenario, configure the appropriate IP addressing components.
- Compare and contrast the characteristics of network topologies, types and technologies.
- Given a scenario, implement the appropriate wireless technologies and configurations.
- Summarize cloud concepts and their purposes
- Explain the functions of network services.
- Infrastructure
- Given a scenario, deploy the appropriate cabling solution.
- Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
- Explain the purposes and use cases for advanced networking devices
- Explain the purposes of virtualization and network storage technologies.
- Compare and contrast WAN technologies.
- Network Operations
- Given a scenario, use appropriate documentation and diagrams to manage the network.
- Compare and contrast business continuity and disaster recovery concepts.
- Explain common scanning, monitoring and patching processes and summarize their expected outputs.
- Given a scenario, use remote access methods
- Identify policies and best practices.
- Network Security
- Summarize the purposes of physical security devices
- Explain authentication and access controls
- Given a scenario, secure a basic wireless network.
- Summarize common networking attacks
- Given a scenario, implement network device hardening.
- Explain common mitigation techniques and their purposes.
- Network Troubleshooting and Tools
- Explain the network troubleshooting methodology
- Given a scenario, use the appropriate tool.
- Given a scenario, troubleshoot common wired connectivity and performance issues.
- Given a scenario, troubleshoot common wireless connectivity and performance issues.
- Given a scenario, troubleshoot common network service issues