| |
| |
CompTIA Certification | |
| |
| |
Introduction | |
| |
| |
| |
What Is Cloud Computing? | |
| |
| |
Defining Cloud Computing | |
| |
| |
Understanding Distributed Application Design | |
| |
| |
Understanding Resource Management Automation | |
| |
| |
Understanding Virtualized Computing Environments | |
| |
| |
Understanding High-performance Computing Models | |
| |
| |
Understanding Cloud Computing Technologies | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Cloud Models | |
| |
| |
Evolving from Virtualization to the Cloud | |
| |
| |
Planning Organizational Roles in the Cloud | |
| |
| |
Identifying Cloud Deployment Models and Scope Modifiers | |
| |
| |
Cloud Deployment Models | |
| |
| |
Model Scope Modifiers | |
| |
| |
Including Future Cloud Models | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Service Models | |
| |
| |
Categorizing Cloud Services | |
| |
| |
Examining Software as a Service | |
| |
| |
Examining Platform as a Service | |
| |
| |
Examining Infrastructure as a Service | |
| |
| |
Identifying Emerging Cloud Database Capabilities | |
| |
| |
Sharding | |
| |
| |
Database Profiling | |
| |
| |
Defining Everything as a Service | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Current Cloud Technologies | |
| |
| |
Comparing Traditional Technologies and Cloud Alternatives | |
| |
| |
Accessing the Cloud | |
| |
| |
Networking in the Cloud | |
| |
| |
Web Access Architecture | |
| |
| |
Leveraging Software as a Service | |
| |
| |
Personal Software as a Service Applications | |
| |
| |
Enterprise Software as a Service Applications | |
| |
| |
Cloud-Specific Software as a Service Applications | |
| |
| |
Developing within Platform as a Service | |
| |
| |
Implementing Infrastructure as a Service | |
| |
| |
Empowering Mobile Computing | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Cloud Business Value | |
| |
| |
Identifying Business Drivers for Cloud Computing | |
| |
| |
Reducing Costs and Increasing Efficiency | |
| |
| |
Increasing Organizational Agility | |
| |
| |
Examining the Business Impact | |
| |
| |
Evaluating Cloud Computing Costs | |
| |
| |
Identifying Value Now and in the Future | |
| |
| |
Choosing the Appropriate Cloud Model | |
| |
| |
Making the Right Decision | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Cloud Infrastructure Planning | |
| |
| |
Understanding Cloud Networks | |
| |
| |
The Open Systems Interconnection Model | |
| |
| |
Internet Protocol Version | |
| |
| |
Network Challenges | |
| |
| |
Infrastructural Changes | |
| |
| |
Leveraging Automation and Self-Service | |
| |
| |
Understanding Federated Cloud Services | |
| |
| |
Achieving Interoperability | |
| |
| |
Cloud Computing Standards | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Strategies for Cloud Adoption | |
| |
| |
Aligning Cloud Deployments with Organizational Goals | |
| |
| |
Identifying the Impact of Cloud Adoption to Business Processes | |
| |
| |
Culture and Business Changes | |
| |
| |
Management Changes | |
| |
| |
Testing for Readiness | |
| |
| |
Understanding the Importance of Service-Level Agreements | |
| |
| |
Cloud Service-Level Agreements (SLAs) | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Applications in the Cloud | |
| |
| |
Understanding the Role of Standard Applications | |
| |
| |
Desktop Applications | |
| |
| |
Distributed Applications | |
| |
| |
Web-Based Applications | |
| |
| |
Cloud Applications | |
| |
| |
Developing Cloud-Ready Applications | |
| |
| |
Cloud-Ready Application Patterns | |
| |
| |
Cloud-Ready Application Development | |
| |
| |
Migrating Applications to the Cloud | |
| |
| |
Preparing for Technical Challenges | |
| |
| |
Identifying and Mitigating Risks | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Cloud Service Rollout | |
| |
| |
Identifying Vendor Roles and Responsibilities | |
| |
| |
Identifying Organizational Skill Requirements | |
| |
| |
Software as a Service (SaaS) | |
| |
| |
Platform as a Service (PaaS) | |
| |
| |
Infrastructure as a Service (IaaS) | |
| |
| |
Transitioning to Live Environments | |
| |
| |
Preparing for Incident Management | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Cloud Service-Level Management | |
| |
| |
Understanding ITIL Service Management | |
| |
| |
ITIL Overview | |
| |
| |
Applying ITIL to Cloud Computing | |
| |
| |
Planning the Service Strategy | |
| |
| |
Planning a Service Desk Operation | |
| |
| |
Developing and Utilizing Performance Metrics | |
| |
| |
Running a Cloud Service Operation | |
| |
| |
General Performance Metrics | |
| |
| |
Tools | |
| |
| |
Implementing Continual Process Improvement | |
| |
| |
Service Evaluation | |
| |
| |
Process Evaluation | |
| |
| |
Definition of Improvement Initiatives | |
| |
| |
CSI Monitoring | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Security in the Cloud | |
| |
| |
Understanding Security and Risk | |
| |
| |
Key Principles of Information Security | |
| |
| |
Risk Management Basics | |
| |
| |
Reviewing Security Standards | |
| |
| |
Exploring Common Security Risks and Mitigations | |
| |
| |
Application Interface | |
| |
| |
Shared Technology | |
| |
| |
Insider and Criminal Threats | |
| |
| |
Data Exposure and Loss | |
| |
| |
Organizational Risks | |
| |
| |
Implementing an ISMS | |
| |
| |
Responding to Incidents | |
| |
| |
Digital Forensics in the Cloud | |
| |
| |
Recognizing Security Benefits | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Privacy and Compliance | |
| |
| |
Identifying Legal Risks | |
| |
| |
Records Management | |
| |
| |
Software Licensing | |
| |
| |
Audit | |
| |
| |
Identifying Privacy Risks | |
| |
| |
Safe Harbor | |
| |
| |
Managing Identity in the Cloud | |
| |
| |
Federated Identity Management | |
| |
| |
Single Sign-On | |
| |
| |
The Essentials and Beyond | |
| |
| |
| |
Future of the Cloud | |
| |
| |
| |
Answers to Review Questions | |
| |
| |
| |
CompTIA's Certification Program | |
| |
| |
| |
EXIN's Certification Program | |
| |
| |
Glossary | |
| |
| |
Index | |