CompTIA’s Cloud+ Certification (CV0-002)
Curriculum Specialist in Business Development
About the Course
Hello everyone, and welcome to CompTIA's Cloud Plus certification. My name is Eric Frick and I’ll be your instructor. This class is designed to help you prepare for the CV0-002 certification exam. The exam is vendor agnostic, and concentrates on IT operations that support cloud-based systems. The class is divided into five major sections:- Configuration and Deployment - Security - Maintenance - Management - Troubleshooting
About the Author
Eric Frick's career in software development and IT operations spans over 30 years. He has worked as a Software Developer, Software Development Manager, Software Architect, an Operations Manager, and a Senior IT Manager. He has a degree in Industrial and Systems Engineering from The Ohio State University, and Master’s degree in Computer Science from The University of Dayton.For the last five years, he has taught classes in various IT related subjects at several universities in the Columbus, Ohio area. He has also authored a series of online courses and books that can provide practical information to students about several IT related topics, including software development, cloud computing, and personal productivity.
How to Use the Interactive Diagram
This class has been structured around an interactive diagram. In this video, I will explain some of the features and how to utilize it.
Other Course Features
In this video, I will demonstrate how to use all the supporting tools for this course.
Configuration and Deployment
Analyzing System Requirements
System requirements define the basic features and capabilities of a system. Prior to migrating a system to the cloud, you must thoroughly understand your existing system and how it operates. In this lesson, we will address the basic features and definitions of cloud computing so that you can understand the environment that you will be migrating existing applications into. In addition, we will describe some of the work that must be completed, from a requirements standpoint, prior to cloud migration.
Executing a Deployment Plan
Properly executing a deployment plan is one of the key factors for success in migrating to the cloud. In this lesson, we will look at the basic steps required to successfully execute a deployment plan. These steps include following the change management process, developing standard operating procedures, executing workflow scripts, configuring automation and orchestration, and using command line tools. The last step of the process is to document the results, and notifying the appropriate personnel and user community.
Analyzing the Test Plan
Establishing a complete test plan is a critical success factor in migrating a system to the cloud. In this lesson, we will look at all of the proper elements to include in a test plan.In the first part of the lesson, we will discuss the importance of including any shared components, such as storage and networks. Following this, we will talk about some things to consider with multiple environments, like development and quality assurance. We will also discuss the importance of proper sizing for cloud-based systems.In addition, we talk about how important the various network-based components are, such as storage capacity and verifying adequate response times. We have also included sections on verifying high-availability scenarios, connectivity, data integrity, and verifying basic functionality.The last part of the lesson describes testing and verifying some more advanced concepts such as replication, load balancing, and automation.
Analyzing Test Results
In order to determine if your cloud employment was successful, you will need to be able to analyze for test results. In this lesson, we will discuss the steps that are necessary to determine whether or not a deployment was successful.In the first part of the lesson, we will discuss the importance of establishing success factors. Afterward, we will examine documenting your results, and some of the details that you need to include in it. In conjunction with your documentation, it is important to have a well-established baseline, so you will have something to compare with after your migration is complete. We will also discuss the importance of being able to compare your performance against your service level agreement.In the last part of the discussion, we will see the importance of verifying that your system will perform under any anticipated usage scenarios.
Analyzing Virtual Network Settings
Since cloud-based systems are remote by definition, configuring the correct network settings for these systems is extremely important. In this lesson, we will discuss some of the basic network settings options for cloud-based systems.In order to frame this discussion properly, we will start with networking on the different cloud deployment models. Next, we will discuss some of the port and protocol considerations in a few of the ports that must be utilized in communicating with these types of systems.Finally, we will delve into some of the major components you'd likely see in a typical cloud-based network configuration, and some of the issues you are likely to face with IP addresses when migrating to a cloud-based system.
Analyzing CPU and Memory Settings
To establish proper performance, having the correct CPU and memory settings for virtual machines in cloud-based systems is very important. In this lesson, we will discuss CPU and memory settings. First, we will talk about available versus proposed resources for both CPU and RAM. Next, we will discuss memory technologies such as bursting, ballooning, and memory overcommitment ratios. Afterward, we will cover some of the important CPU technologies that support cloud systems, such as hyperthreading and CPU overcommitment ratio.In addition to this, we will examine some high availability and disaster recovery options, such as regions and availability zones. Toward the end of the lesson, we will look at some performance and cost considerations as they apply to cloud-based systems. And in the last part of this lesson, we will discuss dedicated versus shared computer environments, and some of the trade-offs.
Analyzing Storage Types
It is important to deploying a proper storage system for a cloud-based system. In this lesson, we will discuss some of the storage options available for deployment on cloud-based systems. In the first part of the lesson, we will cover basic storage configurations, such as network attached storage, storage area networks, and direct connect storage.Next, we will introduce some of the storage provisioning models, such as thick provisioning, thin provisioning, and storage of overcommitment. Then we will look at the tiered storage models offered by cloud service providers, and the definition of the three basic tiers. In the last part of the discussion, we will discuss basic security considerations, and protecting your data in the cloud.
Analyzing Workload Characteristics
Successful cloud migrations depend on several aspects of existing workloads. In this lesson, we will look at a number of these. First, we will discuss basic server migration types, such as virtual to virtual migrations and virtual to physical migrations. Next, we will discuss virtual image storage formats, and some of the issues that present with respective portability.Next, we will outline some issues regarding network connection and data transfer methodology. Following that, we will talk about the importance of developing and following standard operating procedures for your cloud system, and environmental constraints that you need to be aware of.
Extending the Infrastructure Into the Cloud
There are a number of additional elements that are necessary to complete a cloud based solution. In this lesson we will discuss some of these. They include addressing a general configuration for identity management, use of federation for identity, addressing any necessary appropriate protocols, and the configuration of any supporting elements.
Security and Compliance Controls
Security and compliance controls are some of the most important issues facing cloud-based systems today. In this lesson, we will look at applying security configuration and compliance controls to meet given cloud infrastructure requirements. Then we will examine encryption technologies, and using tunneling protocols for gaining remote access to your cloud-based system.We will also look at items to configure in your cloud-based system, and how using automation and orchestration can simplify and improve security maintenance. Finally, we'll look at the importance of a company security policy, and all of the issues that should be addressed within such a policy.
Applying the Appropriate ACL
Establishing an appropriate access control list for a cloud-based system is one of the most important aspects of cloud-based security. In this lesson we will discuss applying the appropriate ACL to target objects and meet access requirements, according to the needs of the system.First, we will look at the basic authorization for cloud objects. Next, we will examine the effects of the selected cloud service model on authorization. Afterward, we will discuss access control methods in general, and some things to consider for cloud-based systems. Finally, we will look at the effects that the selected cloud deployment model has on authorization and the shared responsibility model.
Implementing Defined Security Technologies
Implementing the correct security technologies is a high priority for any company that operates a system in the cloud. In this lesson, we will talk about how best to implement security technologies for cloud-based systems, and examine some of the tools and techniques that are available.The first part of the lesson is about data classification, and some of the criteria used for achieving that classification. Next, we will talk about the different aspects of segmentation, including application segmentation, service segmentation, data segmentation, and storage segmentation. The next part of the lesson stresses the importance of encrypting data both in transit and at rest, then we will talk about multi-factor authentication and some of the options for implementing this technology.In the last part of the section, we discuss audit compliance and the importance of this for companies in regulated industries.
One of the best ways to achieve a consistent security posture is through the use of automation. In this lesson, we will discuss some basic automation techniques that will help an organization improve their security. In the first part of the lesson, we will talk about some of the basic tools that are available, such as application program interfaces, command line interfaces, and graphical user interfaces. Next, we will discuss some of the well-defined techniques that you can utilize, such as orchestration, scripting, and custom programming.Finally, we will talk about some of the elements of a security service, and examine some basic automation techniques.
How to Apply Patches
Keeping systems up to date with the latest patches is a security and operations best practice. In this lesson, we will look at applying patches to your cloud-based system. There are a number of systems and subsystems that require patching in a complex environment. Some of these systems include: - Hypervisors - Virtual machines - Virtual appliances - Networking components - Applications - Storage components and - ClustersIn this lesson, we will describe some strategies for distributing patches, such as rolling updates, and the blue-green deployment methodology. Toward the end of the lesson, we will discuss some system dependencies and patching.
Applying Automation to Cloud Tools
Managing cloud deployments is an important task for IT organizations that support cloud-based systems. In this lesson, we will look at some techniques for managing and automating cloud deployments. Early on, we will examine some various types of updates, such as hotfixes, patches, version updates, and rollbacks. Afterward, we will look at some basic automation techniques, such as runbooks, automated scripts, and orchestration.In the last part of this lesson, we will explore some activities that automation tools perform, such as snapshots, cloning, patching, recycling systems, and enabling maintenance mode.
Backup and Restore Methods
Keeping systems backed up regularly is a routine part of IT operations. In this lesson, we will discuss some of the techniques for managing your cloud-based system's backups. In the first part of the lesson, we will explore backup types, such as snapshots, cloning, full backups, differential backups, and incremental backups. We will also discuss the basic definitions of backup targets, such as replicas, local backups, and remote backups.We will also examine some other backup considerations, such as service level agreements and backup schedules. In the last part of the lesson, we will look at various backup configurations and some dependency considerations.
Disaster Recovery Models
Disaster recovery is an important part of business continuity planning. In this lesson, we will discuss some considerations regarding Disaster Recovery planning for your cloud-based system. In the first part of this lesson, we will discuss how to establish your Disaster Recovery service level agreement. Next, we will walk through establishing two important metrics for disaster recovery: the Recovery Point Objective (RPO), and the Recovery Time Objective (RTO). We will also explore the importance of establishing the capacity and limitations of your bandwidth and your Internet Service Provider (ISP).In the last part of the lesson, we will discuss some techniques for managing Disaster Recovery operations, such as site mirroring, replication, automated file transfers, and archiving. We will round out the discussion by talking about some third-party alternatives for disaster recovery planning and operations.
Steps for Business Continuity
Business continuity planning is a complex undertaking. The entire organization will have to contribute if the planning is going to succeed. In this lesson, we will talk about some business continuity planning basics. First, we will discuss what to consider with selecting an alternate site, and the importance of basic network connectivity.Following that, we will explore some of the options organizations have for placing equipment, and some trade-offs of each those options. In the last part of this lesson, we will discuss establishing a service level agreement for business continuity planning and high availability.
Maintenance Automation Techniques
IT organizations can make their operations more efficient and consistent by automating maintenance tasks. In this lesson, we will discuss some of the basic automation techniques used for maintaining cloud-based systems. First, we will look at some of the issues around creating a maintenance schedule, and then establishing windows for system maintenance. In addition, we will discuss some basic aspects of orchestration, with respect to maintaining your cloud-based system.In the last part of this lesson, we will examine some of the tasks that are likely targets to automate in your cloud-based system. Among other things, these tasks include clearing logs, archiving logs, compressing drives, removing inactive accounts, and removing stale DNS entries.
Forecasting necessary resources to support system operations is one of the most important jobs that operational personnel manage. In this lesson, we will look at some important areas of forecasting what resources will be needed for cloud-based systems. First, we will look at monitoring and collecting data, and how important it is to establish a solid baseline for system performance. Next, we will look at event correlation, and the importance of a central repository that collects the data.Finally, we will look at some of the issues that surround establishing a forecast, like event collection, alerts, and communication.
Allocation of Cloud Resources
In order to achieve maximum performance, IT operations staff must appropriately allocate cloud resources in order to minimize bottlenecks. In this lesson, we will look at the allocation of resources in a number of different areas. The first thing we will do is establish the general capacity of your current cloud environment. Next, we will look at cloud support agreements, and some of the options that cloud service providers commonly offer. Afterward, we will look at configuration management tools, and some of the advantages they provide for maintaining your system.In addition, we will look at resource balancing, and some of the techniques you can utilize when scaling your system out. Finally, we will look at the change management process and its relationship to allocating resources to your system.
Provisioning Cloud Resources
Knowing when to provision and de-provision resources is necessary for maintaining the ongoing operations of any system. In this lesson, we will look at a number of scenarios in cloud-based systems that require this. The first item we will look at is a technique known as cloud bursting. It will allow you to easily add additional processing power to your private cloud system. Next, we will look at some of the issues around migrating from one cloud service provider to another, and some of the things you should consider. After that, we will look at the phases of the application lifecycle.Then we will look at some common scenarios that cause businesses to change, and some of the ways to support these changes in cloud-based systems. Finally, we will look at usage patterns, and what effect they will have on provisioning resources for your cloud-based system.
Account provisioning is an important aspect of supporting a cloud-based system. In order to effectively provision accounts, IT operations staff needs to be trained in the proper tools and techniques that cloud providers offer. During this lesson, we will explore some aspects of account provisioning in the cloud. First, we will look at the basic elements that need to be associated with a user account. Next, we will talk about some of the authentication method options, as well as single sign-on and federation. Afterward, we will look into account lifecycles, the stages that a user account moves through, and the necessary tasks that support those stage migrations.We will also talk about the efficiency of establishing account management policies, and then round out the discussion by examining the advantages of using automation and orchestration for maintaining user accounts.
Following a deployment, IT operations need to look at performance statistics and confirm whether or not they meet the baseline. In this lesson, we will look at some areas that you can analyze to confirm things, like CPU and memory usage, storage utilization, and network utilization. We will also discuss the importance of managing software versions, which includes keeping track of both patch and major application versions. Finally, we will discuss the importance of making sure that your organization complies with any necessary regulations, utilizing auditing and management tools to ensure that compliance.
You need to have a complete analysis of your performance data in order to apply changes effectively and manage your cloud-based system. In this lesson, we will discuss some of the issues concerning analyzing cloud performance data, and using that performance data to implement changes. Some of these changes may result in the tuning of cloud objects that include computing resources, storage, and service applications. In addition to fine tuning cloud objects, we will also discuss some methods of scaling up vertically and scaling out horizontally.
An essential job of IT personnel is establishing proper reporting metrics, for communicating correct performance parameters to the business units of the company. The IT staff can also utilize these reports and ensure that the system is operating within the service level agreement's parameters. In this lesson, we will look at some of the issues with determining reporting metrics, including some of the most of the critical areas that need to be reported. In the first part of this lesson, we will discuss system availability reports. They detail system uptime, downtime, and any significant incidents that have occurred during the reporting period.Next, we will talk about chargeback models, and how system reporting should be able to report chargebacks to individual corporate departments and business units. In the last part of the discussion, we will talk about dashboards and how to utilize them for communicating the performance of cloud-based systems.
One of the main tasks facing IT operations is supporting and troubleshooting deployment issues. In this lesson, we will talk about troubleshooting some of the more common problems, and some points to consider when trying to rectify them. We will cover troubleshooting workflow, trouble with third-party integrations, common resource issues, and connectivity problems.We will also delve into some strategies to help deal with an outage from your cloud service provider. Afterward, there is a brief discussion about how to troubleshoot software licensing issues. In the final part of this discussion, we will dive into troubleshooting software templates, potential time synchronization problems, support for your development programming language, and troubleshooting automation scripts. These areas represent some of the most common failures of cloud-based systems.
Ensuring that a system has adequate capacity, and planning for future system growth, is an essential task for IT operations. In this lesson, we will look at three primary areas that affect the capacity of cloud-based systems. The first, cloud capacity boundaries, includes computer resources, storage capacity, network capacity, licensing, the number of users on the system, and any limits on API requests.In the second section, we will talk about the importance of establishing a baseline and being prepared for deviations from that baseline. Lastly, we will discuss unplanned expansion, and some of the options you have with cloud-based systems to deal with this.
Automation and orchestration make maintaining cloud-based systems much more efficient. IT operations staff dedicate a great deal of time to maintaining and troubleshooting these types of automated scripts whenever there are failures. In this lesson, we will look at troubleshooting the failures of automated scripts, and some of the potential solutions. We will see some of the more common failures, such as account mismatches, change management failures, and server name changes. We will also look at some of the issues that IP address changes can cause with automated scripts, as well as compatibility between automated tools. In the last part of this lesson, we will look at job validation issues, and some of the ways you can troubleshoot these.
Since cloud-based systems are remote by definition, troubleshooting network connectivity is a very common task for the IT operation staff that support them. In this lesson, we will talk about various aspects of troubleshooting connectivity issues with cloud-based systems. In the first part of the discussion, we will look at some common networking issues and potential solutions. In the next part of the lesson, we will talk about some network connectivity tools and how they are used.Following that, we will see how remote access tools can be used for network troubleshooting. And in the last part of the lesson, we will talk about output from network tools, and some options for managing that output.
Security issues are one of the top priorities for organizations that deploy and operate cloud-based systems. Many problems will require troubleshooting while a system is still operating. In this lesson, we will look at some of the items that you will need for troubleshoot security problems, and techniques to simplify the maintenance of these. We will discuss such issues as troubleshooting authentication, security device failures, and role changes. We will also consider the impact of obsolete systems and unencrypted communication.
The Troubleshooting Methodology
Troubleshooting system problems is an ongoing task for IT operations staff. Adopting a standard troubleshooting methodology will make this process more efficient, and we'll outline one here in this lesson. The Troubleshooting Methodology has six steps:1. Gather the necessary information 2. Distill the issue 3. Research the data and create a hypothesis of the underlying problem 4. Develop a plan of action after you have established your hypothesis 5. Test and verify after you have implemented your plan of action 6. Document and resolve the issueThis section explains each of these steps in detail, and gives some hints on how best to approach each one.
Scheduling the Test
In this video I will show you how to sign up for and schedule the certifiation exam.
Preparing for the Test
The CV0 – 002 exam has 100 questions, and you will have 90 minutes to complete it. In order to pass, you’ll need a score of 750 out of a possible 900. All of the questions are multiple-choice. In this video, I will give you some basic tips on how to best use this Linux Academy class to prepare for the exam.
CompTIA Cloud+ Certification
Take this course and learn a new skill today.
Transform your learning with our all access plan.Start 7-Day Free Trial