Basic Of Cloud Computing From A – Z

0 (0 Ratings)

Course Curriculum

1 – 2.5 Hard Drive

2 – 3.5 Hard Drive

3 – Access Controls

4 – Access Points

5 – Account Life-Cycle Management

6 – Account Lockout Policy

7 – Account Mismatches

8 – Adaptive Optimization

9 – Advanced Cloud Services

10 – Advanced Technology eXtended – ATX

11 – Affinity

12 – Agent Based Scans

13 – Alerting

14 – Alternate Locations

15 – Application Delivery Controller – ADC

16 – Application Monitoring

17 – Auto Scaling

18 – Availability

19 – Backup And Restore Policies

20 – Backup Objects

21 – Backup Targets

22 – Backup Types

23 – Ballooning

24 – Bandwidth Issues

25 – Baselines

26 – Beta – Versions

27 – Billing Issues

28 – Block Migration

29 – Blue – Green Upgrades

30 – Buckets

31 – Capacity

32 – Certificate Management

33 – Chargebacks

34 – CI – CD

35 – Clock Speed

36 – Cloud Access Security Broker – CASB

37 – Cloud Bursting

38 – Cloud Resources Services

39 – Cloud Services Budgetary

40 – Cloud Service Models

41 – Cloud Within A Cloud

42 – Cloud-To-Cloud Migrations

43 – Cluster Placement

45 – Collaboration Service

46 – Collectors

47 – Colocation

48 – Common Internet File System

49 – Common Messaging Methods

50 – Communications Services

51 – Compromised Certificates

52 – Compromised Key

53 – Compute

54 – Compute Resource

55 – Configuration Files

56 – Configure Secrets

57 – Configure Variables

58 – Confirming Completion Of Backups

59 – Connectivity

60 – Connectivity Issues

61 – Containers

62 – Content Delivery Network – CDN

63 – Core – Based

64 – Cost Issues

65 – Creating Internal APIs

66 – Credentialed Scans

67 – Cross Platform Virtualization

68 – Cross Service Migrations

69 – CSP Outages

70 – Data Breaches

71 – Database Dumps

72 – Database Migrations

73 – DDoS Protection

74 – Deactivate Default Accounts

75 – Default Routes

76 – Deploying VMs

77 – Deprecated Features

78 – Desktop Virtualization

79 – Device Drivers

80 – Digital Signatures

81 – Directory And Identity Services

82 – Directory Security Groups

83 – Disaster Recovery – DR

84 – Discretionary Access

85 – DNS over HTTPS (DoH)

86 – DNS over TLS (DoT)

87 – DNS Records

88 – DNS Security – DNSSEC

89 – Domain Name Service – DNS

90 – Double Data Rate 3 – DDR3

91 – Double Data Rate 4 – DDR4

92 – Double Data Rate 5 – DDR5

93 – DR Kits

94 – Dual – Channel

95 – Dynamic Allocation

96 – ECC RAM

97 – Elasticity Usages

98 – Email Services

99 – Expired Certificates

100 – Expired Key

101 – Exposed Endpoints

102 – External Attacks

103 – Failed Load Balancing

104 – Feature Mismatch

105 – Federations

106 – Fibre Channel – FC

107 – File Integrity Monitoring – FIM

108 – File Migration

109 – File Subscription Service

110 – File Synchronization

111 – Filesystem

112 – File System Backup

113 – Firmware Upgradation

114 – Firmwares

115 – Flushdns

116 – Front Ends

117 – Generic Routing Encapsulation (GRE)

118 – GENEVE

119 – Geographical Datacenter Requirements

120 – Hardened Baselines

121 – Hashing Algorithms

122 – HDD Form Factor

123 – High Availability

124 – Horizontal Scaling

125 – Hot Fixes

126 – Hub – Spoke

127 – Hyperconverged

128 – Hypervisors

129 – Infrastructure As A Service – IaaS

130 – Identification – Authorization

131 – Identity Management

133 – Incidents

134 – Incorrect IP Address

135 – Incorrect IP Space

136 – Incorrect Subnet Issues

137 – Incorrectly Administered Firewall

138 – Incorrectly Configured Load Balancing

139 – Information Technology eXtended – ITX

140 – Infrastructure As Code – IAC

141 – Infrastructure Components Monitoring

142 – Ingress- Egress Traffic

143 – Insecure Ciphers

144 – Instructions Per Cycle – IPC

145 – Insufficient Capacity

146 – Integration Of Platforms

147 – Internet Mail Access Protocol – IMAP

148 – Intrusion Detection Systems – IDS

149 – Intrusion Protection System

150 – IP Address Changes

151 – IP Address Management

152 – ISP Outages

153 – Key Based Authentication

154 – Key Management

155 – Licensing

156 – Licensing Issues

157 – Load Balancers

158 – Location Backup

159 – Location Changes

160 – Log Scrubbing

161 – Logical Access Management

162 – LongTerm Support – LTS

163 – M.2 Devices

164 – Maintainance Mode

165 – Managed Switches

166 – Mandatory Access Control

167 – Metered Utilization

168 – Micro-Segmentation

169 – Migration Of Platforms

170 – Migration Of Vendors

171 – Misapplied Policies

172 – Misconfigured Certifications

173 – Misconfigured Key

174 – Misconfigured Policies

175 – mSATA

176 – Multicloud

177 – Multifactor Authentication – MFA

178 – n-1 Policy

179 – Network Access Control – NAC

180 – NetStat

181 – Network Bandwidth

182 – Network Flows

183 – Network Interface Controllers

184 – Network Latency

185 – Network Requirements

186 – Network Security Groups

187 – Network Services

188 – Network Time Security – NTS

189 – Network Troubleshooting Tools

190 – Network Types

191 – Non-Discretionary Access

192 – Non-Relation Migration

193 – Non-Volatile Memory Express – NVME

194 – NVMe-oF

195 – Object Backup

196 – Object Migration

197 – On-Premises-Cloud Sites

198 – Open Source Drivers

199 – OpenSSL Client

200 – Optical Network Terminal – ONT

201 – Orchestration Sequencing

202 – OS Templates

203 – Overall Utilization

204 – OverSubscription

205 – P2V Migration

206 – Platform As A Service – PaaS

207 – PaaS Migration

208 – Packet Analyzer

209 – Packet Brokers

210 – Pass Through

211 – Password Complexity Policy

212 – Patching Failures

213 – PCI Express – PCIe

214 – Peering

215 – Peering Issues

216 – Performance Capacity Planning

217 – Performance Degradation

218 – Performance Monitoring

219 – Performance Testing

220 – Persistant Storage

221 – PoE Standards

222 – Point-To-Point Tunnelling Protocol – PPTP

223 – Point-To-Point VPN

224 – Point-To-Site VPN

225 – Policies

226 – Port 110

227 – Port 143

228 – Port 22

229 – Port 23

230 – Port 25

231 – Port 3389

232 – Port 389

233 – Port 443

234 – Port 445

235 – Port 53

236 – Port 80

237 – Post Deployment Validation

238 – Production Upgrades

239 – Protocols

240 – Provisioning Resources

241 – Provisioning – Deprovisioning Accounts

242 – Proxy

243 – QA Upgrades

244 – Quad Channel

245 – Quality Assurance

246 – RAID – 0, 1, 5, 6, 10

247 – Rapid Elasticity

248 – Read Write Operations Per Second

249 – Redundant Power Supply

250 – Region-Zones

251 – Relational Migration

252 – Removable Storage

253 – Requirement Analysis

254 – Restoration Methods

255 – Restore Backups

256 – Restore Files

257 – Retention Policy

258 – Revoked Key

259 – Rollbacks

260 – Rolling Upgrades

261 – Rollups

262 – Routine Operations

263 – S.M.A.R.T Failure

264 – SaaS Migrations

266 – Sandbox

267 – Scaling

268 – Scaling Configurations

269 – Scheduled Updates

270 – Secure Scripting

271 – Security Patches

272 – Security Requirements

273 – Serverless Application

274 – Serverless Cloud Services

275 – Severity Categorization

276 – Shared GPU

277 – Shared Resources

278 – Showbacks

279 – Signature Updates

280 – Simultaneous Multi-Threading – SMT

281 – Single Channel

282 – Sizing

283 – SLA Policy

284 – Socket-Based

285 – Software Defined Storage – SDS

286 – Software Defined Networking – SDN

287 – Solution Templates

288 – SR – IOV

289 – SDD Form Factors

290 – Stateful Service

291 – Storage Components

292 – Storage Compression

293 – Storage Deduplication

294 – Storage Migrations

295 – Subnetting

296 – Synthetic Full Backup

297 – System Load

298 – Tagging

299 – Tenants

300 – Testing Requirements

301 – Thick Provisioning

302 – Thin Provisioning

303 – Thresholds

304 – Time Synchronization Issues

305 – Tracert

306 – Triple Channel

307 – Trust Certificates

308 – Trust Key

309 – Two-Factor Authentication

310 – Type 1 Hypervisor

311 – Type 2 Hypervisor

312 – Unencrypted Data

313 – Unmanaged Switches

314 – Unsupported Protocols

315 – Upgrading Methods

316 – Usability Testing

317 – User Density

318 – User Permissions

319 – User Group Policy

320 – V2V Migration

321 – VDI In The Cloud

322 – VDI On Premises

323 – Vendor Drivers

324 – Version Mismatch

325 – Versioning

326 – Vertical Scaling

327 – Virtual Appliances

328 – Virtual CPU – vCPU

329 – Virtual Extensible LAN – VXLAN

330 – Virtual GPU

331 – Virtual Network Interface Controller

332 – Virtual Patches

333 – Virtual Private Cloud – VPC

334 – Virtual Routing

336 – VoIP Service

337- Whitelisting – Blacklisting

338 – Wireless Internet Service Provider – WISP

339 – Zoning

Student Ratings & Reviews

No Review Yet
No Review Yet
1,500.00

A course by

Tags

error: Content is protected !!