Course Outline

Introduction

Course Setup

Chapter 1: Virtualization Requirements

  • Module A: Planning and Requirements for Successful System Deployment
  • Module B: Considerations for Virtual Network Configuration
  • Module C: Allocation of Computer Resources

Chapter 2: Deployment and Migration

  • Module A: Techniques for Environment Testing
  • Module B: Integration and Migration to the Cloud

Chapter 3: Security Policies and Compliance

  • Module A: Implementation of Security Controls
  • Module B: Cryptography in the Cloud Environment
  • Module C: Application of Cryptographic Techniques

Chapter 4: Data and Environment Security

  • Module A: Ensuring Data Security
  • Module B: Automation for Enhanced Security

Chapter 5: Environment Maintenance

  • Module A: Updates and Patching in the Cloud
  • Module B: Backup Strategies for the Cloud
  • Module C: Comprehensive Cloud Environment Maintenance

Chapter 6: Disaster Recovery and Business Continuity

  • Module A: Strategies for Business Continuity

Chapter 7: Managing Virtual Environments

  • Module A: Provisioning Cloud Resources
  • Module B: Performance Analysis and Optimization

Chapter 8: Managing Compute Resources

  • Module A: Allocation of Compute Resources for Government
  • Module B: Monitoring and Analyzing Resource Usage

Chapter 9: Deployment Troubleshooting

  • Module A: The Process of Troubleshooting Deployments
  • Module B: Troubleshooting Deployment and Capacity Issues
  • Module C: Automation Troubleshooting Techniques

Chapter 10: Infrastructure Troubleshooting

  • Module A: Network Troubleshooting for Government
  • Module B: Security Troubleshooting in the Cloud

Lab Topics Include:

  • Creating Virtual Machines and Virtual Networks
  • Demonstrating Network Isolation Techniques
  • Migrating Virtual Machines from Cloud Providers for Government
  • Enabling Authentication and Authorization Controls for Government
  • Encrypting Virtual Disks and Storage Containers for Government
  • Configuring Backup and Recovery Options for Government
  • Setting Up Redundancy and High Availability Options for Government
  • Creating and Configuring Web Applications for Government

Requirements

  • This course is tailored for individuals with foundational knowledge in computers, networks, and cybersecurity principles. Although having a background comparable to the CompTIA Security+ certification is beneficial, it is not mandatory. The curriculum is structured to enhance skills relevant for government and other public sector environments.
 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories