C+ Course Review
C+ Course Review
Module 1
    •   Resource Pooling
    •   On-demand self-service
    •   Rapid elasticity
    •   Measured services
    •   Broad network access
    •   Software-as-a-Service (SaaS)
    •   Platform-as-a-Service (PaaS)
    •   Infrastructure-as-a-Service (IaaS)
There are many other services offered by CSPs, including such things as Graphics-as-a-Service (GaaS),
Desktop-as-a-Service (DaaS), and Disaster Recovery-as-a-Service (DRaaS), Database-as-a-Service
(DBaaS), Anything-as-a-Service (XaaS)
    •   Compute
    •   Virtual servers and machines
    •   Containers
    •   Storage
    •   Database
    •   Network and content delivery
    •   Security, identity, and compliance
    •   Application services
    •   Developer tools
                                                                                                        1
Additional Cloud Computing Components
    •   Analytics
    •   Migration
    •   Management tools
    •   Artificial intelligence
    •   Mobile services
    •   Messaging
    •   Business productivity
    •   Desktop and streaming
    •   Software development and publishing
    •   Internet of Things
    •   Public cloud
    •   Private cloud
    •   Hybrid cloud
    •   Community cloud
    •   Single server
    •   Single cloud architecture
    •   Multi-cloud architecture
CSP Agreements
Non-cloud security apparatus that needs to be configured to allow traffic from cloud
    •   Firewalls
    •   Proxy servers
    •   Encryption technologies
    •   Antivirus software
    •   Anti-malware software
    •   Intrusion detection and prevention systems
Cloud service providers offer authentication and identity management mechanisms, but In many cases,
authentication and identity management will be handled by on-premises, non-cloud systems.
                                                                                                      2
How to evaluate existing systems to see if they are a good fit for the cloud
CSPs provide Application Programming Interfaces (APIs) to allow programmatic access for
administration, management, and monitoring of their services. Use the:
Cloud Automation - the completion of a cloud-related administrative task without human intervention
Benefits of DevOps Approach - moves automation and orchestration to a mindset and technical
approach rather than an administrative activity; building, testing, and releasing changes happens
regularly and updates are quick and reliable
                                                                                                      3
Third-Party Tools for Orchestration
    •   Network requirements
    •   Security and compliance requirements
    •   App architecture requirements; two-tier where clients or three-tier
Module 2
    •   Identifying the change or developing a solution to address a problem (which then becomes the
        change).
    •   Recording the change.
    •   Assessing the impact of the change.
    •   Notifying stakeholders of the change or requesting approval to make changes.
    •   Scheduling implementation of changes.
    •   Monitoring the impact of the change.
    •   Rolling back changes if required to address issues that arise from the changes.
                                                                                                       4
Assessing the impact of changes (not all changes are negative)
    •    Impact to project schedule (both current phase and any cascading implications that will impact
         deadlines).
    •    Impact on project dependencies.
    •    Impact to project goals.
    •    Impact on project costs.
    •    Impact to projected project ROI.
    •    Recommendations
    •    Best practice guides
    •    Checklists
    •    Pre-deployment documentation
    •    Deployment documentation
    •    Post-deployment documentation
                                                                                                          5
Post-Deployment Cloud Configuration Tasks
    •   Testing and validation that the solution is functional and performing well.
    •   Setup of user roles and access.
    •   Configuration of integration components.
    •   Configuration of data connections.
    •   Configuration of system or data backup.
    •   Management portal
    •   Command-line management
    •   API management
Module 3
Test Plan - formal set of criteria, functions, or tasks that must be tested in order to validate that a
service, app, or cloud infrastructure component meets specific criteria
Test Case – represents an individual scenario and may contain the following information:
    •   Data to be tested
    •   Procedures or inputs
    •   Scenarios and descriptions
    •   Expected results
    •   Actual results
When testing a cloud deployment, your team should be using a formal test plan made up of test cases
and documented results.
    •   Sizing
    •   Connectivity
    •   Resource allocation
    •   Security
    •   Performance
Multiple cloud environments for more seamless development, testing, and deployment of updates both
to infrastructure and apps; three cloud environments; must stay identical
    •   Development cloud
    •   Quality Assurance (QA) or Testing Cloud
    •   Production Cloud
                                                                                                          6
Test for Goals of Cloud Deployment Plan; goals documented
    •   Connectivity Testing
           o Latency
           o Performance
    •   Data Integrity Testing
           o Validating each value if it is successfully saved to the database.
           o Ensuring the data compatibility against old hardware or old versions of operating
                systems and browsers.
           o Verifying the data can be modified and deleted.
           o Verifying size and number of files present.
           o Checking whether or NOT a blank value or default value can be retrieved from the
                database.
    •   Proper Function Testing
           o Identification of functions that a service or app is expected to perform.
           o Use of input data based on function specifications.
           o Examination of output based on function specifications.
           o Execution of the test case.
           o Comparison of expected and actual outcomes.
           o Checks against whether the service or app works as needed
    •   Accessibility Testing
           o WCAG 2.0
           o Federal Section 508
Highly available (HA) solutions are systems, services, apps, or components that are always, or nearly
always, up and running
    •   Load balancing
    •   Replication
    •   Multi-region deployments
Replication Tests
                                                                                                        7
Benefits of using multiple regions:
Load Testing - simulate usage by placing synthetic load, in the form of traffic, requests, query
submissions, and so forth, to cloud services and apps
    •   White box
    •   Gray box
    •   Black box
    •   Functionality
    •   Sizing
    •   Automation and orchestration
    •   Scaling
    •   Performance
    •   SLA guarantees
    •   Security
    •   Compliance
                                                                                                           8
Cloud Performance Fluctuation Variables:
Module 4
Responsible Parties in Cloud Environments - some security services will need to be managed by the CSP
and others coordinated with the CSP
A holistic security approach, also called defense-in-depth or layered security, is considered a best
practice approach and applies multiple remediation processes, technologies, and security controls to
protect components, services, apps, and data at different levels so that attackers must break through
multiple defenses to gain access. This also increases the likelihood notification mechanisms will alter
administrators of attack.
Encryption - a cryptographic technique that converts data from plaintext form into ciphertext
                                                                                                          9
Decryption - converts ciphertext back to plaintext
        • Plaintext is unencrypted data that is meant to be encrypted (or the result of decrypting
        encrypted data).
Governance model: Control Objectives for Information and Related Technology (COBIT includes:
Although a CSP may be certified to handle certain types of data or to meet regulations, ultimately you
are responsible for meeting regulatory compliance for your cloud.
    •   CSP compliance with data handling requirements set out by specific regulations such as PCI DSS
        or HIPAA
    •   Location, recoverability, and retention of data stored in the cloud
    •   Physical and digital security
    •   Support and procedures for cross-border investigations
    •   Identify compliance requirements such as corporate policies and standards, laws and
        regulations, SLAs, etc.
    •   Implement policies, procedures, processes, and systems to satisfy those compliance
        requirements.
    •   Monitor whether these policies, procedures, and processes are followed diligently.
                                                                                                         10
Module 5
A virtual network, sometimes called a VNet, or Virtual Private Cloud (VPC), are often a representation of
your network in the cloud; benefits and capabilities:
    • Isolation
    • Internet connectivity
    • Connection to other CSP services
    • Connection to other virtual networks
    • Connection to on-premises
    • Traffic filtering
                                                                                                       11
Apps in the cloud will use the same ports as they do on-premises
Cipher
    • Enciphering
    • Deciphering
                                                                    12
Network Encryption Technologies
   • Internet Protocol Security (IPSec)
   • Point-to-Point Tunneling Protocol (PPTP)
   • Layer 2 Tunneling Protocol (L2TP)
   • Secure Shell (SSH)
   • PKI
   • Digital certificate
   • HTTPS
   • TLS and SSL
Virtual Private Network (VPN) can securely connect any two networks by establishing an
authenticated path over which traffic is encrypted.
Segmentation Options
   • Management traffic
   • Operations traffic
   • Virtual machine production traffic
                                                                                         13
Firewalls
    • Host or personal
    • Network-based
    • Web application-based
Module 6
Identification
Authentication
Authorization
Identity Access Management
Authentication Factors
   • Something you are, including physical characteristics, such as fingerprints or a retina pattern.
   • Something you have, such as a token or access card.
   • Something you know, such as a password.
   • Somewhere you are or are not, such as an approved IP address or GPS location.
   • Something you do, such as established keystroke patterns or tracing over a Windows 8 or 10
       picture password.
                                                                                                        14
Multi-factor Authentication (MFA)
Authentication Protocols
   • PAP
   • CHAP
   • TACACS
   • RADIUS
   • DIAMETER
   • Kerberos
Identity federation
SSO
Transitive Trust
Account Management
Principle of least privilege
Privilege bracketing
Data Classification
• The sensitivity of the data.
• Business impact of data if exposed, lost, or breached.
• Regulatory or compliance rules, including applicable regulations, access requirements, and retention
requirements.
                                                                                                     15
Access Control Methods
• Mandatory Access Control (MAC)
• Discretionary Access Control (DAC)
• Role Based Access Control
• Rule Based Access Control
• Dynamic Access Control
Orchestration Activities
• Orchestrating creating of accounts, assignments of group memberships, and rights based on an
employee's role, department, or other criteria specified.
• Orchestrating change of account group memberships, and rights based on a change of
department, role, or promotion.
• Orchestrating detection of unused accounts that trigger emails to account owners at specified
intervals and sequentially disable then delete the account.
Module 7
Once you select an architecture you should stick with it; AMD-V or Intel-VT
                                                                                                   16
Advantages of Containers for Development
Module 8
IOPS measures I/O performance for compute storage devices such as hard disk drives
(HDDs), solid state drives (SSDs) , and storage area networks (SANs).
Storage Mirroring
Snapshots and Clones
Data Deduplication
• Segment data into blocks or some other discrete portion.
• Create a hash for each block.
• Compare the hash to existing hashes to determine if the data is already stored in a different
block.
• Add a pointer to the existing object already stored in the database in place of the duplicate data.
Storage Tiers
    • Hot storage for frequently accessed data or data used on a day-to-day basis. This is highest
        performance (outside of special high-performance storage tiers) and costs the most to get
        access to.
    • Warm storage for less frequently accessed data such as data used a few times a month. Month
        end account spreadsheets and other data files might fall into this category. This storage is
        slightly slower and costs less to access.
    • Cold storage for rarely accessed data. This is used for archival purposes, is slower, and costs
        even less to store data, too. Some providers charge an additional fee to read data from cold
        storage.
                                                                                                    17
Storage Access Protocols
    • SCSI
    • Fibre Channel (FC)
    • iSCSI
    • FCoE
    • CIFS
    • NFS
    • HTTP
Tokenization
ACLs
Data Obfuscation (DO)
Module 9
Storage Migrations
• Data cannot be moved all at once while offline because the migration would take too long
• It's not feasible to move data due to bandwidth consumption
                                                                                             18
OVF -An OVF package contains the software files and an Extensible Markup Language (XML)
OVF descriptor file in a single folder
Migration Methods
   • Lift and shift
   • Lift, tinker, and shift
   • Repurchasing
   • Refactoring
   • Retirement
   • Revisit
Environmental Considerations
    • Working hours restrictions
    • Peak time frame constraints
    • Legal restrictions
    • Time zone constraints
                                                                                              19
Module 10
Module 11
Backup Types
   • Full backup
   • Incremental backup
   • Differential backup
   • Copy-on-write snapshot
   • Clone or split mirror snapshot
   • Redirect-on-write storage snapshot
   • Incremental snapshot
   • Change block/delta tracking
Backup Targets
   • Tape
   • DAS
   • NAS
   • SAN
   • Integrated backup appliances
   • Cloud
Online/Offline Backups
                                                                   20
Disaster Recovery focuses on repairing, reconstructing, restoring, and replacing systems, personnel, and
other assets after a disaster has affected the organization
    • Recovery Point Objective (RPO)
    • Recovery Time Objective (RTO)
Alternate Sites
• The physical location of the site
• The comfort of employees during a crisis
• Will it be able to support the needed technology?
• Does it have amenities such as day care, kitchen, restrooms, etc.?
                                                                                                      21
Module 12
Benefits of monitoring
A key performance indicator (KPI) is a quantifiable measure a company uses to determine how well it
meets the set operational and strategic goals
Performance monitoring
    • Performance to Baselines Comparison
    • Performance to SLA Comparison
Module 13
                                                                                                      22
Change management control is a systematic way of approving and executing change in order to assure
maximum security, stability, and availability of information technology services
Module 14
Troubleshooting Steps
1. Identify the problem: Question the user and identify user changes to the computer and
perform backups before making changes.
2. Establish a theory of probable cause: Question the obvious. If necessary, conduct internal or
external research based on symptoms.
3. Test the theory to determine cause: Once the theory is confirmed, determine the next steps to
resolve the problem. If the theory is not confirmed, establish a new theory or escalate.
4. Act: Establish a plan of action to resolve the problem and implement the solution.
5. Test and prevent: Verify full system functionality and, if applicable, implement preventative
measures.
6.Report: Document findings, actions, and outcomes.
                                                                                                   23
   •   Language Support
   •   Deployment-Related Automation Issues
   •   Capacity issues and unplanned expansions
   •   Automation and orchestration issues
   •   Breakdowns in the Workflow
   •   Account Mismatch Issues
   •   Change Management Failure
   •   Server Name and IP Address Changes
   •   Location Changes
   •   Version and Feature Mismatch
   •   Automation Tool Incompatibility
   •   Job Validation Issues
Module 15
   •   Ping
   •   Tracert/traceroute
   •   Arp
   •   NETSTAT
   •   Nslookup
   •   Ipconfig/ifconfig
   •   Rout
   •   Ssh
   •   Tcpdump
   •   telnet
Module 16
                                                         24
External Attacks
    • DoS
    • Malicious code-based DoS attack
    • Malware
    • Exploitation tools
    • Cloud-based attacks
Internal Attacks
    • Policy violation
    • Social media and personal messaging use
    • Social engineering
    • Insider threat
With privilege escalation, the user is able to obtain access to additional resources or
functionality which they are normally not allowed access to.
Vertical privilege escalation , also called privilege elevation, occurs when a user can perform functions
that are not normally assigned to their role or explicitly permitted.
An attack vector is the method that an attack takes; elements that can contribute to an attack vector”
    • Vulnerabilities
    • Exploits
    • Techniques
25