Introduction |
|
xxv | |
Assessment Test |
|
li | |
|
Chapter 1 Cloud Computing Overview, Concepts, and Models |
|
|
1 | (22) |
|
Overview of Cloud Computing |
|
|
3 | (1) |
|
|
3 | (1) |
|
Computing as a Utility Service |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Cloud vs. In-House Computing |
|
|
5 | (1) |
|
|
5 | (1) |
|
Present State of Computing |
|
|
6 | (1) |
|
|
7 | (1) |
|
Cloud Services Models and Architecture |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Accountability and Responsibility Based on Service Models |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
On-Premise vs. Off-Premise Hosting |
|
|
13 | (1) |
|
Security Differences between Models |
|
|
13 | (1) |
|
Functionality and Performance Validation Based on Chosen Delivery Model |
|
|
13 | (1) |
|
|
14 | (1) |
|
Cloud Characteristics and Terms |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Metering Resource Pooling |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Cloud Object Storage Concepts |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (4) |
|
Chapter 2 Compute Virtualization in the Cloud |
|
|
23 | (22) |
|
Understanding the Hypervisor in a Virtualized Cloud |
|
|
25 | (1) |
|
Type 1 and Type 2 Hypervisor Types |
|
|
25 | (1) |
|
Proprietary vs. Open Source |
|
|
26 | (1) |
|
Consumer vs. Enterprise Use |
|
|
26 | (1) |
|
Workstation vs. Infrastructure |
|
|
27 | (1) |
|
Setting Up and Managing VMs, Networking, and Storage |
|
|
27 | (1) |
|
Creating, Importing, and Exporting Templates and VMs |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
Image Backups vs. File Backups |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Migrating from Physical Servers to a Virtual Architecture |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Online vs. Offline Migrations |
|
|
33 | (1) |
|
Physical-to-Virtual (P2V) |
|
|
33 | (1) |
|
|
34 | (1) |
|
Virtual-to-Physical (V2P) |
|
|
34 | (1) |
|
Understanding the Benefits of Virtualization in a Cloud Environment |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
The Time to Service/Mean Time to Implement |
|
|
35 | (1) |
|
|
36 | (1) |
|
Network and Application Isolation |
|
|
36 | (1) |
|
Infrastructure Consolidation |
|
|
36 | (1) |
|
Virtual Datacenter Creation |
|
|
36 | (1) |
|
Virtual Components in a Cloud Environment |
|
|
36 | (1) |
|
Virtual Network Components |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (2) |
|
|
40 | (5) |
|
Chapter 3 Cloud Storage and Provisioning |
|
|
45 | (28) |
|
Understanding Infrastructure |
|
|
46 | (1) |
|
Comparing Storage Technologies |
|
|
46 | (1) |
|
Network-Attached Storage (NAS) |
|
|
46 | (1) |
|
Direct-Attached Storage (DAS) |
|
|
47 | (1) |
|
Storage Area Network (SAN) |
|
|
48 | (3) |
|
Working with Storage Protocols |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Understanding Protocols and Applications |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Understanding Storage Configuration Concepts |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
Performance Levels of Each Tier |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
Using Storage Provisioning and Creating LUNs |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Implications of Adding Capacity to a NAS and SAN |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (2) |
|
|
69 | (4) |
|
Chapter 4 Cloud Networking Concepts and Implementation |
|
|
73 | (30) |
|
Implementing Appropriate Network Configurations |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Network Port Configurations |
|
|
78 | (1) |
|
Switching and Routing in Physical and Virtual Environments |
|
|
79 | (1) |
|
The Importance of Network Optimization |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
Devices on the Same Subnet |
|
|
85 | (1) |
|
Troubleshooting Basic Network Connectivity Issues |
|
|
85 | (1) |
|
|
85 | (7) |
|
Review Documentation and Device Configuration Settings |
|
|
92 | (1) |
|
|
92 | (1) |
|
Common Network Protocols, Ports, and Topologies |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (4) |
|
Chapter 5 Cloud Compute Resources, Concepts, and Implementation |
|
|
103 | (18) |
|
Understanding the Hardware Computing Resources in the Cloud |
|
|
104 | (1) |
|
BIOS/Firmware Configurations |
|
|
104 | (2) |
|
Minimum Memory Capacity and Configuration |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
NICs Quantity, Speeds, and Configurations |
|
|
109 | (1) |
|
Internal Hardware Compatibility |
|
|
110 | (1) |
|
Computing Storage Systems |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (4) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (4) |
|
Chapter 6 Cloud Management Concepts |
|
|
121 | (16) |
|
Managing Your Cloud Deployment |
|
|
122 | (1) |
|
What Do We Mean by Managing Your Cloud? |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
125 | (1) |
|
Cloud Provider Management Services |
|
|
125 | (1) |
|
What Does the Provider Manage? |
|
|
126 | (1) |
|
|
126 | (1) |
|
Responsibility for Management in the Cloud |
|
|
127 | (1) |
|
|
127 | (1) |
|
What Is Management as a service? |
|
|
127 | (1) |
|
Cloud Management Providers |
|
|
128 | (1) |
|
Outsourcing Your Management Responsibilities or Keeping It in House |
|
|
128 | (1) |
|
Remote Access Tools for Managing Your Cloud |
|
|
128 | (1) |
|
What Are the Tools Used for Remote Management? |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
133 | (4) |
|
Chapter 7 Cloud Operations |
|
|
137 | (28) |
|
Implementing and Using Cloud Resource Monitoring |
|
|
139 | (1) |
|
|
139 | (3) |
|
|
142 | (1) |
|
Establish Baselines and Thresholds |
|
|
143 | (1) |
|
Automated Responses to Specific Events |
|
|
144 | (1) |
|
Examine Processes Usage and Resource Usage |
|
|
144 | (1) |
|
Understanding and Allocating Physical Host Resources |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Storage and Network Allocation |
|
|
146 | (1) |
|
Entitlement/Quotas (Shares) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Understanding and Allocating Virtual Host Resources |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
Storage and Network Allocation |
|
|
150 | (1) |
|
Entitlement/Quotas (Shares) |
|
|
151 | (1) |
|
|
151 | (1) |
|
Reservations and Licensing |
|
|
151 | (1) |
|
Dynamic Resource Allocation |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
Physical Resource Redirection and Mapping to Virtual Resources |
|
|
153 | (1) |
|
Accessing Cloud Resources Remotely |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (5) |
|
Chapter 8 Understanding and Maintaining Cloud Security |
|
|
165 | (30) |
|
Understanding Network Security Concepts, Tools, and Best Practices |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (2) |
|
Hardware- and Software-Based Firewalls |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (3) |
|
Understanding Storage Security Concepts, Methods, and Best Practices |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
User and Host Authentication |
|
|
177 | (1) |
|
|
178 | (1) |
|
Cloud Encryption Technologies and Methods |
|
|
178 | (1) |
|
|
178 | (2) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (2) |
|
Encryption for Data in Transit and Encryption for Data at Rest |
|
|
183 | (1) |
|
Understanding User Access Control |
|
|
183 | (1) |
|
Role-Based Administration |
|
|
183 | (1) |
|
Mandatory Access Controls |
|
|
184 | (1) |
|
Discretionary Access Controls |
|
|
185 | (1) |
|
Multifactor Authentication |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
Hardening the Guest OS and Compute Resources |
|
|
186 | (1) |
|
Disabling Unneeded Ports and Services |
|
|
187 | (1) |
|
|
187 | (1) |
|
Host-Based/Software Firewalls |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
Deactivating Default Accounts |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (4) |
|
Chapter 9 Systems Management in the Cloud |
|
|
195 | (36) |
|
Understanding Policies and Procedures in the Cloud Environment |
|
|
197 | (1) |
|
Network and IP Planning, Documentation |
|
|
197 | (1) |
|
Configuration Standardization and Documentation |
|
|
198 | (1) |
|
Change Management Best Practices |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (1) |
|
Systems Life-Cycle Management |
|
|
203 | (1) |
|
|
204 | (1) |
|
Diagnosing, Remediating, and Optimizing Physical Host Performance |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Performance Management and Monitoring Tools |
|
|
207 | (1) |
|
Establish Baseline and Create Documentation with Appropriate Tools |
|
|
207 | (1) |
|
Hypervisor Configuration Best Practices |
|
|
208 | (1) |
|
Impact of Configuration Changes to the Virtual Environment |
|
|
209 | (1) |
|
|
209 | (3) |
|
Understanding Cloud Performance Concepts |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Throughput (Bonding/Teaming) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (2) |
|
Testing Your Cloud Services Deployment |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
Application Server Testing |
|
|
221 | (1) |
|
|
222 | (1) |
|
Application Delivery Testing |
|
|
222 | (1) |
|
Service Performance Testing and Application Performance Testing |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (2) |
|
|
227 | (4) |
|
Chapter 10 Understanding Business Continuity in the Cloud |
|
|
231 | (24) |
|
Disaster Recovery Methods and Concepts |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
Archiving and Offsite Storage |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
Mean Time Between Failures |
|
|
243 | (1) |
|
|
243 | (1) |
|
Mission-Critical Requirements |
|
|
243 | (1) |
|
High Availability and Fault Tolerance in the Cloud |
|
|
244 | (1) |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (2) |
|
|
250 | (5) |
|
Appendix A Answers to Written Labs |
|
|
255 | (6) |
|
Chapter 1 Cloud Computing Overview, Concepts, and Models |
|
|
256 | (1) |
|
Chapter 2 Compute Virtualization in the Cloud |
|
|
256 | (1) |
|
Chapter 3 Cloud Storage and Provisioning |
|
|
256 | (1) |
|
Chapter 4 Cloud Networking Concepts and Implementation |
|
|
257 | (1) |
|
Chapter 5 Cloud Compute Resources, Concepts, and Implementation |
|
|
257 | (1) |
|
Chapter 6 Cloud Management Concepts |
|
|
258 | (1) |
|
Chapter 7 Cloud Operations |
|
|
258 | (1) |
|
Chapter 8 Understanding and Maintaining Cloud Security |
|
|
259 | (1) |
|
Chapter 9 Systems Management in the Cloud |
|
|
259 | (1) |
|
Chapter 10 Understanding Business Continuity in the Cloud |
|
|
260 | (1) |
|
Appendix B Answers to Review Questions |
|
|
261 | (14) |
|
Chapter 1 Cloud Computing Overview, Concepts, and Models |
|
|
262 | (1) |
|
Chapter 2 Compute Virtualization in the Cloud |
|
|
263 | (1) |
|
Chapter 3 Cloud Storage and Provisioning |
|
|
264 | (2) |
|
Chapter 4 Cloud Networking Concepts and Implementation |
|
|
266 | (1) |
|
Chapter 5 Cloud Compute Resources, Concepts, and Implementation |
|
|
267 | (1) |
|
Chapter 6 Cloud Management Concepts |
|
|
268 | (1) |
|
Chapter 7 Cloud Operations |
|
|
269 | (2) |
|
Chapter 8 Understanding and Maintaining Cloud Security |
|
|
271 | (1) |
|
Chapter 9 Systems Management in the Cloud |
|
|
272 | (1) |
|
Chapter 10 Understanding Business Continuity in the Cloud |
|
|
273 | (2) |
Index |
|
275 | |