CONTENTS

Acknowledgments

Introduction

Chapter 1     Cloud Computing Concepts, Models, and Terminology

Cloud Service Models

Infrastructure as a Service

Platform as a Service

Software as a Service

Database as a Service

Communications as a Service

Business Process as a Service

Anything as a Service

Accountability and the Shared Responsibility Model

Cloud Deployment Models and Services

Private Cloud

Public Cloud

Hybrid Cloud

Community Cloud

Cloud Within a Cloud

On-Premises vs. Off-Premises Hosting

Orchestration Platforms

Multicloud

Cloud Characteristics and Terms

Elasticity

Demand-Driven Service

Pay-as-You-Grow

Chargeback

Ubiquitous Access

Metering

Multitenancy

Cloud Bursting

Baselines

Source and Target Hosts

Existing Systems

Cloud Elements

Advanced Cloud Services

Machine Learning and Artificial Intelligence

Serverless

Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda

Internet of Things

Chapter Review

Questions

Answers

Chapter 2     Disk Storage Systems

Disk Types and Configurations

Rotational Media

Solid State Drive

USB Drive

Tape

Interface Types

Access Speed

Redundant Array of Independent Disks (RAID)

Write Once, Read Many (WORM)

Tiering

Performance Levels of Each Tier

Policies

File System Types

Unix File System

Extended File System

File Allocation Table File System

New Technology File System

Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows

Resilient File System

Virtual Machine File System

Z File System

Chapter Review

Questions

Answers

Chapter 3     Storage Networking

Storage Types and Technologies

Direct Attached Storage

Storage Area Network

Network Attached Storage

Object Storage

Exercise 3-1: Creating Object Storage

Deduplication Technologies

Compression Technologies

Data BLOB

Storage Access Protocols

Fibre Channel

Fibre Channel Protocol

Fibre Channel over Ethernet

Ethernet

TCP/IP

Internet Fibre Channel Protocol

Internet Small Computer System Interface

Nonvolatile Memory Express Over Fabrics

Storage Provisioning

Performance

Logical Unit Numbers

Network Shares

Zoning and LUN Masking

Multipathing

Provisioning Model

Encryption Requirements

Tokenization

Storage Protection

High Availability

Storage Replication

Chapter Review

Questions

Answers

Chapter 4     Network Infrastructure

Network Types

Intranet

Internet

Extranet

Network Optimization

Network Scope

Network Topologies

Bandwidth and Latency

Load Balancing

Network Service Tiers

Exercise 4-1: Configuring Network Service Tiers in Google Cloud

Proxy Servers

Content Delivery Network

Routing and Switching

Network Address Translation

Port Address Translation

Subnetting and Supernetting

Routing Tables

Network Segmentation and Micro-segmentation

Network Ports and Protocols

Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure

File Transfer Protocol and FTP over SSL

Secure Shell File Transfer Protocol

Domain Name System

Dynamic Host Configuration Protocol

IP Address Management

Simple Mail Transfer Protocol

Network Time Protocol

Well-Known Ports

Chapter Review

Questions

Answers

Chapter 5     Virtualization Components

Hypervisor

Type 1

Type 2

Proprietary

Open Source

Consumer vs. Enterprise

Virtualization Host

Hardware-Assisted Virtualization

Single Root Input/Output Virtualization

BIOS

UEFI

Firmware Configurations

Hyperconverged Systems and Infrastructure

VM Sizing Considerations

CPU

GPU

Memory

NIC

Exercise 5-1: Creating a Virtual Switch in Hyper-V

Virtual Machine

Virtual Disks

vNIC

Virtual Switches

Memory

Storage Virtualization

Guest Tools

Exercise 5-2: Creating a Virtual Machine in Hyper-V

Virtualized Infrastructure Service Elements

DNS

DHCP

Certificate Services

Local Agents

Antivirus

Load Balancing

Multifactor Authentication

Firewall

IDS/IPS

Chapter Review

Questions

Answers

Chapter 6     Virtualization and the Cloud

Benefits of Virtualization in a Cloud Environment

Shared Resources

Elasticity

Network and Application Isolation

Infrastructure Consolidation

Virtual Data Center Creation

Virtual Resource Migrations

Virtual Machine Templates

Physical to Virtual

Virtual to Virtual

Virtual to Physical

Physical to Physical

Virtual Machine Cloning

Virtual Machine Snapshots

Clones vs. Snapshots

Storage Migration

Host Clustering and HA/DR

Cloud Provider Migrations

Exercise 6-1: Creating a Cloud Firewall on Azure

Migration Considerations

Requirements Gathering

Migration Scheduling

Upgrading

Testing

Databases

Software Defined

Software Defined Network

Software Defined Storage

Software Defined Data Center

Chapter Review

Questions

Answers

Chapter 7     Cloud Adoption

Planning

Requirement Analysis

Designing a Solution

Selection

Deployment Plan

Approval

Implementation

Service Model Solutions

Solutions

Deploying Virtual Systems

Networking

Exercise 7-1: Creating a Virtual Network in Azure

Exercise 7-2: Creating a Default Route on Azure

Containers

Post-Deployment Validation

Remote Access Tools

Remote Hypervisor Access

RDP

Console Port

SSH

HTTP

Chapter Review

Questions

Answers

Chapter 8     DevOps

Application Life Cycle

Phase 1: Specifications

Phase 2: Development

Phase 3: Testing

Phase 4: Deployment

Phase 5: Maintenance

Life Cycle Management

Ending Applications

Application Replacement

Application Retirement

Application Migration

Application Feature Use (Increase/Decrease)

Secure Coding

Avoid Hardcoded Passwords

Service Account Best Practices

Password Vaults

Key-Based Authentication

Exercise 8-1: Setting Up SSH Keys for Key-Based Authentication

DevOps Cloud Transformation

Business Needs Change

Continuous Integration/Continuous Delivery

Infrastructure as Code

Chapter Review

Questions

Answers

Chapter 9     Performance Tuning

Host Resource Allocation

Compute Resources

Quotas and Limits

Licensing

Reservations

Resource Pools

Guest Resource Allocation

Compute Resources

Quotas and Limits

Licensing

Physical Resource Redirection

Resource Pools

Dynamic Resource Allocation

Optimizing Performance

Configuration Best Practices

Exercise 9-1: Setting CPU Affinity and Anti-Affinity Rules in VMWare Cloud

Scalability

Performance Concepts

Performance Automation

Common Performance Issues

Common Disk Issues

Common Memory Issues

Network Issues

Physical Processor Issues

Chapter Review

Questions

Answers

Chapter 10   Systems Management

Policies and Procedures

Standard Operating Procedures

Workflow

Capacity Management

Records Management

Systems Management Best Practices

Documentation

Standardization

Metrics

Dashboards

Planning

Systems Maintenance

Code Updates

Deployment Landscapes

Deployment Methodologies

Patch Management

Exercise 10-1: Configuring Group Policy for Automatic Updates

Component Updates

Maintenance Automation

Monitoring Techniques

Collector Protocols and Methods

Tagging

Log Analysis

Baselines

Thresholds

Trending

Automated Event Responses

Log Scrubbing

Verification of Continuous Monitoring Activities

Management Tools

Chapter Review

Questions

Answers

Chapter 11   Security in the Cloud

Data Security

Encryption

Public Key Infrastructure

Encryption Protocols

Tunneling Protocols

Ciphers

Storage Security

Protected Backups

Network Security

Segmentation

Firewall

DDoS Protection

Packet Capture

Network Flow

IDS/IPS

Packet Broker

APIs

Effects of Cloud Service Models on Security Implementation

Endpoint Protection

Host-Based Firewall

Antivirus/Antimalware

Endpoint Detection and Response

Data Loss Prevention

Exercise 11-1: Creating a DLP Policy for Office 365

NAC

Hardening

Application Whitelisting

Impact of Security Tools to Systems and Services

Access Control

Identification

Authentication

Authorization

Single Sign-On

Federation

Access Control Protocols

Access Control Methodologies

Multifactor Authentication

Chapter Review

Questions

Answers

Chapter 12   Security Best Practices

Cloud Security Engineering

Implementing Layered Security

Protecting Against Availability Attacks

Least Privilege

Separation of Duties

Security Automation

Security Governance and Strategy

Developing Company Security Policies

Account Management Policies

Documenting Security Procedures

Assessment and Auditing

Leveraging Established Industry Standards and Regulations

Applying Platform-Specific Security Standards

Data Classification

Legal Holds

Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365

Keeping Employees and Tools Up to Date

Roles and Responsibilities

Vulnerability Management

Testing Methods

Vulnerability Scanning

Penetration Testing

Roles and Responsibilities

Considerations Before You Scan or Test

Incident Response

Preparation

Incident Types

Incident Response Procedures

Chapter Review

Questions

Answers

Chapter 13   Business Continuity and Disaster Recovery

Business Continuity Methods

Business Continuity Plan

Contingency

Resiliency

High Availability

Service-Level Agreements for BCP and HA

Disaster Recovery Methods

Corporate Guidelines/Documentation

Replication

File Transfer

Service-Level Agreements for DR

Backup and Recovery

Backup Types

Backup Target

Exercise 13-1: Cross-Region Replication

Other Backup Considerations

Restoration Methods

Archiving

Chapter Review

Questions

Answers

Chapter 14   Testing, Automation, and Changes

Testing Techniques

Baseline Comparisons

Exercise 14-1: Collecting Windows Metrics with Performance Monitor

Performance Testing

Configuration Testing

Testing in the Cloud Landscape

Functional Testing

Regression Testing

Usability Testing

SLA Comparisons

Testing Sizing Changes

Testing High Availability

Testing Load Balancing

Testing Connectivity

Verifying Data Integrity

Evaluating Replication

Automation and Orchestration

Event Orchestration

Scripting

Custom Programming

Runbook Management for Single Nodes

Orchestration for Multiple Nodes and Runbooks

Automation Activities

Change and Configuration Management

Change Management

Configuration Management

Chapter Review

Questions

Answers

Chapter 15   Troubleshooting

Troubleshooting Methodology

Troubleshooting Steps

Security Issues

Exercise 15-1: Using the Google Cloud Policy Troubleshooter

Deployment Issues

Connectivity Issues

Performance Issues

Capacity Issues

Automation and Orchestration Issues

Documentation and Analysis

Documentation

Log Files

Troubleshooting Tools

Connectivity Tools

Configuration Tools

Query Tools

Remote Administration Tools

Chapter Review

Questions

Answers

Appendix A  Objective Map

Exam CV0-003

Appendix B  About the Online Content

System Requirements

Your Total Seminars Training Hub Account

Privacy Notice

Single User License Terms and Conditions

TotalTester Online

Performance-Based Questions

Technical Support

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.182.45