Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
Course setup
Chapter 1: Virtualization requirements
- Module A: Requirements and planning for successful system deployment
- Module B: Virtual network considerations
- Module C: Computer resources
Chapter 2: Deployment and migration
- Module A: Environment testing techniques
- Module B: Cloud integration and migration
Chapter 3: Security policies and compliance
- Module A: Security controls
- Module B: Cryptography and the cloud
- Module C: Applying cryptography
Chapter 4: Data and environment security
- Module A: Data security
- Module B: Security automation
Chapter 5: Environment maintenance
- Module A: Cloud updates and patching
- Module B: Cloud backup
- Module C: Cloud environment maintenance
Chapter 6: Disaster recovery and business continuity
- Module A: Business continuity
Chapter 7: Managing virtual environments
- Module A: Cloud resource provisioning
- Module B: Performance analysis
Chapter 8: Managing compute resources
- Module A: Allocating compute resources
- Module B: Monitoring resource usage
Chapter 9: Deployment troubleshooting
- Module A: The troubleshooting process
- Module B: Deployment and capacity troubleshooting
- Module C: Automation troubleshooting
Chapter 10: Infrastructure troubleshooting
- Module A: Network troubleshooting
- Module B: Security troubleshooting
Lab Topics Include:
- Creating VMs and virtual networks
- Demonstrating network isolation
- Migrating VMs from a cloud provider
- Enabling authentication and authorization controls
- Encrypting virtual disks and storage containers
- Configuring backup and recovery options
- Setting up redundancy and high availability options
- Creating and configuring web applications
Requirements
- This course is designed for students who possess a basic understanding of computers, networks, and cybersecurity principles. While prior knowledge equivalent to the CompTIA Security+ certification is advantageous, it is not a requirement.
35 Hours
Testimonials (2)
The practical exercises
Hamed Almarzooqi - Telecommunications and Digital Government Regulatory Authority
Course - CompTIA A+
Issues related to WAN from the provider's side and dividing the network into subnets and routing
Paweł - Icotera
Course - CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
Machine Translated