Course Summary

This CompTIA Cloud+ course prepares you for the CV0-003 exam by introducing you to cloud architecture and design, security, deployment, operations and support, and troubleshooting. This exam focuses on all the critical information students need to know to score higher on the updated Cloud+ exam.

The goal of this course is to provide you with all the tools you need to prepare for the CV0-003 CompTIA Cloud+ exam — including text explanations, video demos, lab activities, self-assessment questions, and a practice exam— to increase your chances of passing the exam on your first try.

Methodology:


180-day access to:

  • Lessons
  • Video learning
  • MeasureUp Practice Test for CompTIA Cloud+ (CV0–003). Practice Mode with remediation and Certification mode to simulate the test day experience.


Duration:  32 hours of primary content. Each learner will learn at their own pace.

Prerequisites: None

Course Outline:


Upon successful completion of this course, students should be able to:

  • Understand Cloud architecture and design.
  • Secure a network in a Cloud environment.
  • Apply data security and compliance controls and implement measures to meet security requirements.
  • Deploy Cloud networking solutions.
  • Perform Cloud migrations.
  • Optimize and maintain efficient operation of a Cloud environment.
  • Understand disaster recovery tasks.
  • Troubleshoot security, deployment, connectivity, and other performance issues

 

Lesson 1: Different Types of Cloud Models (2 hours and 36 minutes)

  • Cloud Deployment Models (1 hour and 24 minutes)
    • Public Cloud
    • Private Cloud
    • Hybrid Cloud
    • Community Cloud
    • Cloud Within a Cloud
    • Multicloud
    • Multitenancy
  • Cloud Service Models (36 minutes)
    • Infrastructure as a Service (IaaS)
    • Platform as a Service (PaaS)
    • Software as a Service (SaaS)
  • Advanced Cloud Services (36 minutes)
    • Internet of Things (IoT)
    • Serverless
    • Machine Learning/Artificial Intelligence (AI)


Lesson 2: Capacity Planning (3 hours and 12 minutes)

  • Requirements (48 minutes)
    • Hardware Requirements
    • Software Requirements
    • Budgetary Requirements
    • Business Need Analysis
  • Standard Templates (12 minutes)
  • Licensing (1 hour)
    • Per – user
    • Socket – based
    • Volume – based
    • Core – based
    • Subscription
  • User Density (12 minutes)
  • System Load (12 minutes)
  • Trend Analysis (36 minutes)
    • Baselines
    • Patterns
    • Anomalies
  • Performance Capacity Planning (12 minutes)


Lesson 3: High Availability and Scaling in Cloud Environments (3 hours and 36 minutes)

  • Hypervisors (24 minutes)
    • Affinity
    • Anti – affinity
  • Oversubscription (36 minutes)
    • Compute
    • Network
    • Storage
  • Regions and Zones (12 minutes)
  • Applications (12 minutes)
  • Containers (12 minutes)
  • Clusters (12 minutes)
  • High Availability of Network Functions (48 minutes)
    • Switches
    • Routers
    • Load Balancers
    • Firewalls
  • Avoid Single Points of Failure (1 hour)
    • Scalability
    • Auto – scaling
    • Horizontal Scaling
    • Vertical Scaling
    • Cloud Bursting


Lesson 4: Solution Design in Support of the Business Requirements (4 hours and 12 minutes)

  • Requirement Analysis (1 hour and 48 minutes)
    • Software
    • Hardware
    • Integration
    • Budgetary
    • Compliance
    • Service – Level Agreement (SLA)
    • User and Business Needs
    • Security
    • Network Requirements
  • Environments (1 hour and 12 minutes)
    • Development
    • Quality Assurance (QA)
    • Staging
    • Blue – Green
    • Production
    • Disaster Recovery (DR)
  • Testing Techniques (1 hour and 12 minutes)
    • Vulnerability Testing
    • Penetration Testing
    • Performance Testing
    • Regression Testing
    • Functional Testing
    • Usability Testing


Lesson 5: Identity and Access Management (2 hour and 24 minutes)

  • Identification and Authorization (48 minutes)
    • Privileged Access Management (PAM)
    • Logical Access Management
    • Account Lifecycle Management
    • Access Controls
  • Directory Services (12 minutes)
    • Lightweight Directory Access Protocol (LDAP)
  • Federation (12 minutes)
  • Certificate Management (12 minutes)
  • Multifactor Authentication (MFA) (12 minutes)
  • Single Sign – On (SSO) (12 minutes)
    • Security Assertion Markup Language (SAML)
  • Public Key Infrastructure (PKI) (12 minutes)
  • Secret Management (12 minutes)
  • Key Management (12 minutes)


Lesson 6: Secure Network in a Clous Environment (4 hours and 24 minutes)

  • Network Segmentation (36 minutes)
    • Virtual LAN (VLAN)/Virtual Extensible LAN (VxLAN)/ Generic Network Virtualization Encapsulation (GENEVE)
    • Microsegmentation
    • Tiering
  • Protocols (1 hour)
    • Domain Name Service (DNS)
    • Network Time Protocol (NTP)
    • Network Time Security (NTS)
    • Encryption
    • Tunneling
  • Network Services (1 hour and 24 minutes)
    • Firewalls
    • Web Application Firewall (WAF)
    • Application Delivery Controller (ADC)
    • Intrusion Protection System (IPS)/Intrusion Detection System (IDS)
    • Data Loss Prevention (DLP)
    • Network Access Control (NAC)
    • Packet Brokers
  • Log and Event Monitoring (12 minutes)
  • Network Flows (12 minutes)
  • Hardening and Configuration Changes (1 hour)
    • Disabling Unnecessary Ports and Services
    • Disabling Weak Protocols and Ciphers
    • Firmware Upgrades
    • Control Ingress and Egress Traffic
    • Distributed Denial – of – Service (DDoS) Protection


Lesson 7: OS and Application Security Controls (4 hours and 48 minutes)

  • Policies (1 hour)
    • Password Complexity
    • Account Lockout
    • Application Whitelisting
    • Software Feature
    • User/Group
  • User Permissions (12 minutes)
  • Antivirus/Antimalware/Endpoint Detection and Response (EDR) (12 minutes)
  • Host – Based IDS (HIDS)/Host – Based IPS (HIPS) (12 minutes)
  • Hardened Baselines (12 minutes)
    • Single Function
  • File Integrity (12 minutes)
  • Log and Event Monitoring (12 minutes)
  • Configuration Management (12 minutes)
  • Builds (48 minutes)
    • Stable
    • Long – Term Support (LTS)
    • Beta
    • Canary
  • Operating System (OS) Upgrades (12 minutes)
  • Encryption (1 hour)
    • Application Programming Interface (API) Endpoint
    • Application
    • OS
    • Storage
    • Filesystem
  • Mandatory Access Control (12 minutes)
  • Firewall Software (12 minutes)


Lesson 8: Data Security and Compliance Controls in Cloud Environments (2 hours and 48 minutes)

  • Encryption (12 minutes)
  • Integrity (36 minutes)
    • Hashing Algorithms
    • Digital Signatures
    • File Integrity Monitoring (FIM)
  • Classification (12 minutes)
  • Segmentation (12 minutes)
  • Access Control (12 minutes)
  • Impact of Laws and Regulations (12 minutes)
    • Legal Hold
  • Records Management (48 minutes)
    • Versioning
    • Retention
    • Destruction
    • Write Once Read Many
  • Data Loss Prevention (DLP) (12 minutes)
  • Cloud Access Security Broker (CASB) (12 minutes)


Lesson 9: Security Requirements (3 hours and 12 minutes)

  • Tools (24 minutes)
  • Vulnerability Scanners
    • Port Scanners
  • Vulnerability Assessment (1 hour)
    • Default and Common Credential Scans
    • Credentialed Scans
    • Network – Based Scans
    • Agent – Based Scans
    • Service Availabilities Scans



  • Security Patches (1 hour)
    • Hot Fixes
    • Scheduled Updates
    • Virtual Patches
    • Signature Updates
    • Rollups
  • Risk Register (12 minutes)
  • Prioritization of Patch Applications (12 minutes)
  • Deactivate Default Accounts (12 minutes)
  • Impacts of Security Tools on Systems and Services (12 minutes)


Lesson 10: Incident Response Procedures (1 hour and 48 minutes)

  • Preparation (1 hour and 12 minutes)
    • Documentation
    • Call Trees
    • Training
    • Tabletops
    • Documented Incident Types/Categories
    • Roles and Responsibilities
  • Incident Response Procedures (36 minutes)
    • Identification
    • Containment, Eradication, and Recovery
    • Post-incident and Lessons Learned


Lesson 11: Integrate Components into a Cloud Solution (4 hours and 24 minutes)

  • Subscription Services (1 hour and 48 minutes)
    • File Subscriptions
    • Communications
    • Collaboration
    • Virtual Desktop Infrastructure (VDI)
    • Directory and Identity Services
    • Cloud Resources
    • IaaS
    • PaaS
    • SaaS
  • Provisioning Resources (36 minutes)
    • Compute
    • Storage
    • Network
  • Application (12 minutes)
    • Serverless
  • Deploying Virtual Machines (VMs) and Custom Images (12 minutes)
  • Templates (24 minutes)
    • OS Templates
    • Solution Templates
  • Identity Management (12 minutes)
  • Containers (36 minutes)
    • Configure Variables
    • Configure Secrets
    • Persistent Storage
  • Auto – scaling (12 minutes)
  • Post-deployment Validation (12 minutes)


Lesson 12: Storage in Cloud Environments (5 hours and 12 minutes)

  • Types (36 minutes)
    • Block
    • File
    • Object
  • Tiers (48 minutes)
    • Flash
    • Hybrid
    • Spinning Disks
    • Long – Term
  • Input/Output Operations per Second (IOPS) and Read/Write (12 minutes)
  • Protocols (1 hour)
    • Network File System (NFS)
    • Common Internet File System (CIFS)
    • Internet Small Computer System Interface (iSCSI)
    • Fibre Channel (FC)
    • Non – Volatile Memory Express over Fabrics (NVMe – oF)
  • Redundant Array of Inexpensive Disks (RAID) (1 hour)
    • 0
    • 1
    • 5
    • 6
    • 10
  • Storage System Features (1 hour)
    • Compression
    • Deduplication
    • Thin Provisioning
    • Thick Provisioning
    • Replication
  • User Quotas (12 minutes)
  • Hyperconverged (12 minutes)
  • Software – Defined Storage (SDS) (12 minutes)


Lesson 13: Cloud Networking Solutions (4 hours)

  • Services (1 hour)
    • Dynamic Host Configuration Protocol (DHCP)
    • Network Time Protocol (NTP)
    • Domain Name Service (DNS)
    • Content Delivery Network (CDN)
    • IP Address Management (IPAM)
  • Virtual Private Networks (VPNs) (1 hour)
    • Site – to – site
    • Point – to – Point
    • Point – to – Site
    • IPsec
    • Multiprotocol Label Switching (MPLS)
  • Virtual Routing (36 minutes)
    • Dynamic and Static Routing
    • Virtual Network Interface Controller (vNIC)
    • Subnetting
  • Network Appliances (24 minutes)
    • Load Balancers
    • Firewalls
  • Virtual Private Cloud (VPC) (24 minutes)
    • Hub and Spoke
    • Peering
  • VLAN/VxLAN/GENEVE (12 minutes)
  • Single Root Input/Output Virtualization (SR – IOV) (12 minutes)
  • Software – Defined Network (SDN) (12 minutes)


Lesson 14: Compute Sizing for a Deployment (2 hours and 12 minutes)

  • Virtualization (48 minutes)
    • Hypervisors
    • Simultaneous Multithreading (SMT)
    • Dynamic Allocations
    • Oversubscription
  • Central Processing Unit (CPU)/Virtual CPU (vCPU) (12 minutes)
  • Graphics Processing Unit (GPU) (24 minutes)
    • Virtual
    • Pass – through
  • Clock Speed/Instructions per Cycle (IPC) (12 minutes)
  • Hyperconverged (12 minutes)
  • Memory (24 minutes)
    • Dynamic Allocation
    • Ballooning


Lesson 15: Cloud Migrations (1 hour and 48 minutes)

  • Physical to Virtual (P2V) (12 minutes)
  • Virtual to Virtual (V2V) (12 minutes)
  • Cloud – to – Cloud Migrations (24 minutes)
    • Vendor Lock – in
    • PaaS or SaaS Migrations
  • Storage Migrations (36 minutes)
    • Block
    • File
    • Object
  • Database Migrations (24 minutes)
    • Relational
    • Nonrelational


Lesson 16: Logging, Monitoring, And Alerting (4 hours)

  • Logging (1 hour and 24 minutes)
    • Collectors
    • Analysis
    • Severity Categorization
    • Audits
    • Types
    • Automation
    • Trending
  • Monitoring (1 hour and 48 minutes)
    • Baselines
    • Thresholds
    • Tagging
    • Log Scrubbing
    • Performance Monitoring
    • Resource Utilization
    • Availability
    • Verification of Continuous Monitoring Activities
    • Service Management Tool Integration
  • Alerting (48 minutes)
    • Common Messaging Methods
    • Enable/Disable Alerts
    • Appropriate Responses
    • Policies for Categorizing and Communicating Alerts


Lesson 17: Operation of a Cloud Environment (5 hours and 48 minutes)

  • Confirm Completion of Backups (12 minutes)
  • Lifecycle Management (48 minutes)
    • Roadmaps
    • Old/Current/New Versions
    • Upgrading and Migrating Systems
    • Deprecations or End of Life
  • Change Management (12 minutes)
  • Asset Management (12 minutes)
    • Configuration Management Data base (CMDB)
  • Patching (1 hour and 12 minutes)
    • Features or Enhancements
    • Fixes for Broken or Critical Infrastructure or Applications
    • Scope of Cloud Elements to Be Patched
    • Software
    • Policies
    • Rollbacks
  • Impacts of Process Improvements on Systems (12 minutes)
  • Upgrade Methods (1 hour)
    • Rolling Upgrades
    • Blue – Green
    • Canary
    • Active – Passive
    • Development/QA/Production/DR
  • Dashboard and Reporting (2 hours)
    • Tagging
    • Costs
    • Elasticity Usage
    • Connectivity
    • Latency
    • Capacity
    • Incidents
    • Health
    • Overall Utilization
    • Availability


Lesson 18: Optimize Cloud Environments (2 hours and 48 minutes)

  • Right – sizing (12 minutes)
  • Compute and Storage (12 minutes)
  • Network (1 hour)
    • Bandwidth
    • Network Interface Controllers (NICs)
    • Latency
    • Software – Defined Networks (SDNs)
    • Edge Computing
  • Placement (48 minutes)
    • Geographical
    • Cluster Placement
    • Redundancy
    • Colocation
  • Device Drivers and Firmware (36 minutes)
    • Generic
    • Vendor
    • Open Source


Lesson 19: Automation and Orchestration Techniques (3 hours and 12 minutes)

  • Infrastructure as Code (IaC) (12 minutes)
    • Infrastructure Components and Their Integration
  • Continuous Integration/Continuous Deployment (CI/CD) (12 minutes)
  • Version Control (12 minutes)
  • Configuration Management (12 minutes)
    • Playbook
  • Containers (12 minutes)
  • Automation Activities (1 hour and 12 minutes)
    • Routine Operations
    • Updates
    • Scaling
    • Shutdowns
    • Restarts
    • Create Internal APIs
  • Secure Scripting (48 minutes)
    • No Hardcoded Passwords
    • Use of Individual Service Accounts
    • Password Vaults
    • Key – Based Authentication
  • Orchestration Sequencing (12 minutes)


Lesson 20: Backup and Restore Operations (4 hours and 48 minutes)

  • Backup Types (1 hour)
    • Incremental
    • Differential
    • Full
    • Synthetic Full
    • Snapshot
  • Backup Objects (48 minutes)
    • Application – Level Backup
    • File – System Backup
    • Database Dumps
    • Configuration Files
  • Backup Targets (36 minutes)
    • Tape
    • Disk
    • Object
  • Backup and Restore Policies (1 hour and 36 minutes)
    • Retention
    • Schedules
    • Location
    • Service – Level Agreements (SLAs)
    • Recovery Time Objective (RTO)
    • Recovery Point Objective (RPO)
    • Mean Time to Recovery (MTTR)
    • 3 – 2 – 1 Rule
  • Restoration Methods (48 minutes)
    • In Place
    • Alternate Location
    • Restore Files
    • Snapshot


Lesson 21: Disaster Recovery Tasks (2 hours and 24 minutes)

  • Failovers (12 minutes)
  • Failback (12 minutes)
  • Restore Backups (12 minutes)
  • Replication (12 minutes)
  • On – Premises and Cloud Sites (36 minutes)
    • Hot
    • Warm
    • Cold
  • Requirements (12 minutes)
    • Corporate Guidelines
  • Documentation (36 minutes)
    • DR Kit
    • Playbook
    • Network Diagram
  • Geographical Data Center Requirements (12 minutes)


Lesson 22: Troubleshooting Methodology (1 hour and 24 minutes)

  • Always Consider Corporate Policies, Procedures, and Impacts Before Implementing Changes (12 minutes)
  • Identify the Problem (12 minutes)
  • Establish a Theory of Probable Cause (Question the Obvious) (12 minutes)
  • Test the Theory to Determine Cause (12 minutes)
  • Establish a Plan of Action to Resolve the Problem and Implement the Solution (12 minutes)
  • Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12 minutes)
  • Document the Findings, Actions, and Outcomes Throughout the Process (12 minutes)


Lesson 23: Troubleshoot Security Issues (4 hours and 36 minutes)

  • Privilege (48 minutes)
    • Missing
    • Incomplete
    • Escalation
    • Keys
  • Authentication (12 minutes)
  • Authorization (12 minutes)
  • Security Groups (24 minutes)
    • Network Security Groups
    • Directory Security Groups
  • Keys and Certificates (1 hour)
    • Expired
    • Revoked
    • Trust
    • Compromised
    • Misconfigured

  • Misconfigured or Misapplied Policies (12 minutes)
  • Data Security Issues (1 hour)
    • Unencrypted Data
    • Data Breaches
    • Misclassification
    • Lack of Encryption in Protocols
    • Insecure Ciphers
  • Exposed Endpoints (12 minutes)
  • Misconfigured or Failed Security Appliances (12 minutes)
  • Unsupported Protocols (12 minutes)
  • External/Internal Attacks (12 minutes)


Lesson 24: Troubleshoot Deployment, Automation, and Orchestration Issues (4 hours and 24 minutes)

  • Connectivity Issues (12 minutes)
    • Cloud Service Provider (CSP) or Internet Service Provider (ISP) Outages
  • Performance Degradation (12 minutes)
    • Latency
  • Configurations (12 minutes)
    • Scripts
  • Applications in Containers (12 minutes)
  • Misconfigured Templates (12 minutes)
  • Missing or Incorrect Tags (12 minutes)
  • Insufficient Capacity (12 minutes)
  • Licensing Issues (12 minutes)
  • Vendor – Related Issues (48 minutes)
    • Migrations of Vendors or Platforms
    • Integration of Vendors or Platforms
    • API Request Limits
    • Cost or Billing Issues
  • Account Mismatches (12 minutes)
  • Change Management Failures (12 minutes)
  • Server Name Changes (12 minutes)
  • IP Address Changes (12 minutes)
  • Location Changes (12 minutes)
  • Version/Feature Mismatch (12 minutes)
  • Automation Tool Incompatibility (24 minutes)
    • Deprecated Features
    • API Version Incompatibility
  • Job Validation Issue (12 minutes)
  • Patching Failure (12 minutes)


Lesson 25: Troubleshooting Connectivity Issues and Common Performance Issues (5 hours and 36 minutes)

  • Network Security Group Misconfigurations (24 minutes)
    • Access Control Lists (ACLs)
    • Inheritance
  • Common Networking Configuration Issues (2 hours)
    • Peering
    • Incorrect Subnet, IP Address, and IP Space
    • Routes
    • Firewall
    • Network Address Translation (NAT)
    • Load Balancers and DNS Records
    • VLAN/VxLAN/GENEVE and Proxy
    • Maximum Transmission Unit (MTU)
    • Quality of Service (QoS)
    • Time Synchronization Issues
  • Network Troubleshooting Tools (2 hours and 24 minutes)
    • ping
    • tracert/traceroute
    • flushdns
    • ipconfig/ifconfig/ip
    • nslookup/dig
    • netstat/ss
    • route
    • arp
    • curl
    • Packet Capture
    • Packet Analyzer
    • OpenSSL Client
  • Resource Utilization (12 minutes)
  • Application (24 minutes)
    • Memory Management
    • Service Overload
  • Incorrectly Configured or Failed Load Balancing (12 minutes)