CompTIA Cloud+

The CompTIA Cloud+ 5-Day Training Course is an intensive, vendor-neutral program designed to provide IT professionals with the essential skills and knowledge necessary to excel in cloud infrastructure management. During the training, participants will dive deep into the core aspects of cloud technology, covering everything from architecture and design to security, deployment, operations, and troubleshooting. This course is structured to provide a blend of theoretical knowledge and practical skills through expert instruction and hands-on exercises.

What You Will Learn:

  • Cloud Architecture & Design: Understand different cloud models, and learn how to compare and design the best cloud solutions to support business needs.
  • Cloud Security: Gain insights into securing cloud environments, focusing on identity and access management, encryption, and compliance controls.
  • Cloud Deployment: Learn how to analyze system requirements, provision storage, and deploy cloud networking solutions effectively.
  • Operations & Support: Acquire skills in maintaining and optimizing cloud environments, with a focus on automation, orchestration, backup, and disaster recovery strategies.
  • Troubleshooting: Develop the ability to troubleshoot and resolve common cloud-related issues, including those affecting deployment, connectivity, and performance.

 Who Should Attend:

This course is ideal for IT professionals looking to specialize or advance their careers in cloud technology. Specifically, it’s suited for:

  • Senior Systems Administrators
  • Cloud Engineers
  • Systems Engineers
  • Senior Network Administrators
  • Senior Network Engineers
  • Cloud Specialists
  • Cloud Project Managers

 After the Training:

Upon completing the 5-day course, you will:

  • Have the practical skills and knowledge to manage and optimize cloud environments effectively.
  • Possess a deeper understanding of how to implement and maintain cloud security measures.
  • Be equipped to tackle real-world cloud deployment and troubleshooting tasks.
  • Be prepared to take the CompTIA Cloud+ certification exam, demonstrating their knowledge and skills in cloud infrastructure.

Course outline


Compare and contrast the different types of cloud models
  • Deployment models
  • Service models
  • Advanced cloud services
  • Shared responsibility model
Explain the factors that contribute to capacity planning
  • Requirements
  • Standard templates
  • Licensing
  • User density
  • System load
  • Trend analysis
  • Performance capacity planning
Explain the importance of high availability and scaling in cloud environments
  • Hypervisors
  • Oversubscription
  • Regions and zones
  • Applications
  • Containers
  • Clusters
  • High availability of network functions
  • Avoid single points of failure
  • Scalability
Given a scenario, analyze the solution design in support of the business requirements
  • Requirement analysis
  • Environments
  • Testing techniques


Given a scenario, configure identity and access management
  • Identification and authorization
  • Directory services
  • Federation
  • Certificate management
  • Multifactor authentication (MFA)
  • Single sign-on (SSO)
  • Public key infrastructure (PKI)
  • Secret management
  • Key management
Given a scenario, secure a network in a cloud environment
  • Network segmentation
  • Protocols
  • Network services
  • Log and event monitoring
  • Network flows
  • Hardening and configuration changes
Given a scenario, apply the appropriate OS and application security controls
  • Policies
  • User permissions
  • Antivirus/anti-malware/endpoint detection and response (EDR)
  • Host-based IDS (HIDS)/Host-based IPS (HIPS)
  • Hardened baselines
  • File integrity
  • Log and event monitoring
  • Configuration management
  • Builds
  • Operating system (OS) upgrades
  • Encryption
  • Mandatory access control
  • Software firewall
Given a scenario, apply data security and compliance controls in cloud environments
  • Encryption
  • Integrity
  • Classification
  • Segmentation
  • Access control
  • Impact of laws and regulations
  • Records management
  • Data loss prevention (DLP)
  • Cloud access security broker (CASB)
Given a scenario, implement measures to meet security requirements
  • Tools
  • Vulnerability assessment
  • Security patches
  • Risk register
  • Prioritization of patch application
  • Deactivate default accounts
  • Impacts of security tools on systems and services
  • Effects of cloud service models on security implementation
Explain the importance of incident response procedures
  • Preparation
  • Incident response procedures


Given a scenario, integrate components into a cloud solution
  • Subscription services
  • Provisioning resources
  • Application
  • Deploying virtual machines (VMs) and custom images
  • Templates
  • Identity management
  • Containers
  • Auto-scaling
  • Post-deployment validation
Given a scenario, provision storage in cloud environments
  • Types
  • Tiers
  • Input/output operations per second (IOPS) and read/write
  • Protocols
  • Redundant array of inexpensive disks (RAID)
  • Storage system features
  • User quotas
  • Hyperconverged
  • Software-defined storage (SDS)
Given a scenario, deploy cloud networking solutions
  • Services
  • Virtual private networks (VPNs)
  • Virtual routing
  • Network appliances
  • Virtual private cloud (VPC)
  • Single root input/output virtualization (SR-IOV)
  • Software-defined network (SDN)
Given a scenario, configure the appropriate compute sizing for a deployment
  • Virtualization
  • Central processing unit (CPU)/virtual CPU (vCPU)
  • Graphics processing unit (GPU)
  • Clock speed/Instructions per cycle (IPC)
  • Hyperconverged
  • Memory
Given a scenario, perform cloud migrations
  • Physical to virtual (P2V)
  • Virtual to virtual (V2V)
  • Cloud-to-cloud migrations
  • Storage migrations
  • Database migrations


Given a scenario, configure logging, monitoring, and alerting to maintain operational status
  • Logging
  • Monitoring
  • Alerting
Given a scenario, maintain efficient operation of a cloud environment
  • Confirm completion of backups
  • Life-cycle management
  • Change management
  • Asset management
  • Patching
  • Impacts of process improvements on systems
  • Upgrade methods
  • Dashboard and reporting
Given a scenario, optimize cloud environments
  • Right-sizing
  • Compute
  • Storage
  • Network
  • Placement
  • Device drivers and firmware
Given a scenario, apply proper automation and orchestration techniques
  • Infrastructure as code
  • Continuous integration/continuous deployment (CI/CD)
  • Version control
  • Configuration management
  • Containers
  • Automation activities
  • Secure scripting
  • Orchestration sequencing
Given a scenario, perform appropriate backup and restore operations
  • Backup types
  • Backup objects
  • Backup targets
  • Backup and restore policies
  • Restoration methods
Given a scenario, perform disaster recovery tasks
  • Failovers
  • Failback
  • Restore backups
  • Replication
  • Network configurations
  • On-premises and cloud sites
  • Requirements
  • Documentation
  • Geographical datacenter requirements


Given a scenario, use the troubleshooting methodology to resolve cloud-related issues
  • Identify the problem
  • Establish a theory of probable cause (question the obvious)
  • Test the theory to determine cause
  • Establish a plan of action to resolve the problem and implement the solution
  • Verify full system functionality and, if applicable, implement preventive measures
  • Document the findings, actions, and outcomes throughout the process.
Given a scenario, troubleshoot security issues
  • Privilege
  • Authentication
  • Authorization
  • Security groups
  • Keys and certificates
  • Misconfigured or misapplied policies
  • Data security issues
  • Exposed endpoints
  • Misconfigured or failed security appliances
  • Unsupported protocols
  • External/internal attacks
Given a scenario, troubleshoot deployment issues
  • Connectivity issues
  • Performance degradation
  • Configurations
  • Applications in containers
  • Misconfigured templates
  • Missing or incorrect tags
  • Insufficient capacity
  • Licensing issues
  • Vendor-related issues
Given a scenario, troubleshoot connectivity issues
  • Network security group misconfigurations
  • Common networking configuration issues
  • Network troubleshooting tools
Given a scenario, troubleshoot common performance issues
  • Resource utilization
  • Application
  • Incorrectly configured or failed load balancing
Given a scenario, troubleshoot automation or orchestration issues
  • Account mismatches
  • Change management failures
  • Server name changes
  • IP address changes
  • Location changes
  • Version/feature mismatch
  • Automation tool incompatibility
  • Job validation issue
  • Patching failure

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.