Login / Register

Shopping cart

CompTIA Cloud+

Last Update:

October 7, 2025

Accredited by:

Cybersecurity Training Malaysia, CompTIA Cloud Plus

Course Overview

CompTIA Cloud+ is the only performance-based IT certification that views cloud-based infrastructure services in the context of broader IT systems operations regardless of the platform. Migrating to the cloud presents opportunities to deploy, optimize, and protect mission critical applications and data storage. CompTIA Cloud+ validates the technical skills needed to secure these valuable assets.

The reality of operating multi-cloud environments poses new challenges. CompTIA Cloud+ is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ is the only cloud-focused certification approved for DoD 8570.01-M, offering an infrastructure option for individuals who need to certify in IAM Level I, CSSP Analyst, and CSSP Infrastructure Support roles.

Target Audience

This course is designed for IT professionals who wish to develop cloud computing skills to enable them to move IT workloads to the cloud and integrate products and services from different providers and industries. Their focus is to ensure that cloud deployments are secure, that automation and orchestration are used effectively to bring business value from the cloud, and that costs are controlled through effective management of cloud vendors.

This course is also designed for students who are preparing to take the CompTIA Cloud+ certification exam CV0-002, or who plan to use Cloud+ as the foundation for more advanced cloud certifications or career roles.

Skills Covered

In this course, you will deploy, test, secure, manage, optimize, and troubleshoot a cloud solution. You will:

  • Prepare to deploy cloud solutions.
  • Deploy a pilot project.
  • Test a pilot project deployment.
  • Design a secure network for cloud deployment.
  • Determine CPU and memory sizing for cloud deployments.
  • Determine storage requirements for cloud deployments.
  • Plan Identity and Access Management for cloud deployments.
  • Analyze workload characteristics to ensure successful migration to the cloud.
  • Secure systems to meet access requirements.
  • Maintain cloud systems.
  • Implement backup, restore, and business continuity measures.
  • Analyze cloud systems for required performance.
  • Analyze cloud systems for anomalies and growth forecasting.
  • Troubleshoot deployment, capacity, automation, and orchestration issues.
  • Troubleshoot connectivity issues.
  • Troubleshoot security issues.

Prerequisites

To ensure your success in this course, you should have 24–36 months of experience with IT networking, network storage, and data center administration. You should also have familiarity with any major hypervisor technologies for server virtualization, basic knowledge of common cloud service models, and common cloud deployment models.

Note: The prerequisites for this course might differ significantly from the prerequisites for the CompTIA certification exams.

Training Content

Module 1 : Cloud Architecture and Design

1.1 Compare and contrast the different types of cloud models

  • Deployment models
  • Service models
  • Advanced cloud services
  • Shared responsibility model

1.2 Explain the factors that contribute to capacity planning

  • Requirements
  • Standard templates
  • Licensing
  • User density
  • System load
  • Trend analysis
  • Performance capacity planning

1.3 Explain the importance of high availability and scaling in cloud environments

  • Hypervisors
  • Oversubscription
  • Regions and zones
  • Applications
  • Containers
  • Clusters
  • High availability of network functions
  • Avoid single points of failure
  • Scalability

1.4 Given a scenario, analyze the solution design in support of the business requirements

  • Requirement analysis
  • Environments
  • Testing techniques
Module 2 : Security

2.1 Configure identity and access management

  • Identification and authorization
  • Directory services
  • Federation
  • Certificate management
  • Multifactor authentication (MFA)
  • Single sign-on (SSO)
  • Public key infrastructure (PKI)
  • Secret management
  • Key management

2.2 Secure a network in a cloud environment

  • Network segmentation
  • Protocols
  • Network services
  • Log and event monitoring
  • Network flows
  • Hardening and configuration changes

2.3 Apply the appropriate OS and application security controls

  • Policies
  • User permissions
  • Antivirus / Anti-malware / EDR
  • HIDS / HIPS
  • Hardened baselines
  • File integrity
  • Log and event monitoring
  • Configuration management
  • Builds
  • OS upgrades
  • Encryption
  • Mandatory access control
  • Software firewall

2.4 Apply data security and compliance controls

  • Encryption
  • Integrity
  • Classification
  • Segmentation
  • Access control
  • Impact of laws and regulations
  • Records management
  • Data loss prevention (DLP)
  • Cloud access security broker (CASB)

2.5 Implement measures to meet security requirements

  • Tools
  • Vulnerability assessment
  • Security patches
  • Risk register
  • Patch prioritization
  • Deactivate default accounts
  • Impacts of security tools
  • Effects of service models on security

2.6 Explain the importance of incident response procedures

  • Preparation
  • Incident response procedures
Module 3 : Deployment

3.1 Integrate components into a cloud solution

  • Subscription services
  • Provisioning resources
  • Application
  • Deploying virtual machines (VMs) and custom images
  • Templates
  • Identity management
  • Containers
  • Auto-scaling
  • Post-deployment validation

3.2 Provision storage in cloud environments

  • Types
  • Tiers
  • Input/output operations per second (IOPS) and read/write
  • Protocols
  • Redundant array of inexpensive disks (RAID)
  • Storage system features
  • User quotas
  • Hyperconverged
  • Software-defined storage (SDS)

3.3 Deploy cloud networking solutions

  • Services
  • Virtual private networks (VPNs)
  • Virtual routing
  • Network appliances
  • Virtual private cloud (VPC)
  • VLAN / VXLAN / GENEVE
  • Single root input/output virtualization (SR-IOV)
  • Software-defined network (SDN)

3.4 Configure the appropriate compute sizing for a deployment

  • Virtualization
  • CPU / vCPU
  • GPU
  • Clock speed / instructions per cycle (IPC)
  • Hyperconverged
  • Memory

3.5 Perform cloud migrations

  • Physical to virtual (P2V)
  • Virtual to virtual (V2V)
  • Cloud-to-cloud migrations
  • Storage migrations
  • Database migrations
Module 4 : Operations and Support

4.1 Configure logging, monitoring, and alerting

  • Logging
  • Monitoring
  • Alerting

4.2 Maintain efficient operation of a cloud environment

  • Confirm completion of backups
  • Lifecycle management
  • Change management
  • Asset management
  • Patching
  • Impacts of process improvements on systems
  • Upgrade methods
  • Dashboard and reporting

4.3 Optimize cloud environments

  • Right-sizing
  • Compute
  • Storage
  • Network
  • Placement
  • Device drivers and firmware

4.4 Apply automation and orchestration techniques

  • Infrastructure as code
  • Continuous integration / continuous deployment (CI/CD)
  • Version control
  • Configuration management
  • Containers
  • Automation activities
  • Secure scripting
  • Orchestration sequencing

4.5 Perform backup and restore operations

  • Backup types
  • Backup objects
  • Backup targets
  • Backup and restore policies
  • Restoration methods

4.6 Perform disaster recovery tasks

  • Failovers
  • Failback
  • Restore backups
  • Replication
  • Network configurations
  • On-premises and cloud sites
  • Requirements
  • Documentation
  • Geographical datacenter requirements
Module 5 : Troubleshooting

5.1 Troubleshooting methodology for cloud-related issues

  • Consider policies, procedures, and impacts
  • Identify the problem
  • Establish a theory of probable cause
  • Test the theory
  • Establish and implement a plan of action
  • Verify full system functionality
  • Implement preventive measures
  • Document findings, actions, and outcomes

5.2 Troubleshoot security issues

  • Privilege
  • Authentication / Authorization
  • Security groups
  • Keys and certificates
  • Misconfigured policies
  • Data security issues
  • Exposed endpoints
  • Failed security appliances
  • Unsupported protocols
  • External / internal attacks

5.3 Troubleshoot deployment issues

  • Connectivity issues
  • Performance degradation
  • Configurations
  • Applications in containers
  • Misconfigured templates
  • Missing or incorrect tags
  • Insufficient capacity
  • Licensing issues
  • Vendor-related issues

5.4 Troubleshoot connectivity issues

  • Network security group misconfigurations
  • Common networking configuration issues
  • Network troubleshooting tools

5.5 Troubleshoot common performance issues

  • Resource utilization
  • Application
  • Load balancing misconfigurations or failures

5.6 Troubleshoot automation or orchestration issues

  • Account mismatches
  • Change management failures
  • Server name changes
  • IP address changes
  • Location changes
  • Version / feature mismatch
  • Tool incompatibility
  • Job validation issues
  • Patching failures

Price From:

RM3,700.00

Enquire for More Info

Courses You May Like

CERTIFICATION

CERTIFICATION

CERTIFICATION

CERTIFICATION

Huawei HCIA-Datacom v1.0

10 Days

Intermediate

RM7,500.00