Course Description
CompTIA Cloud+ Advanced
Alison
Learn about testing, tools, security, controls, recovery, and availability with this free online CompTIA Cloud+ course. This free online CompTIA Cloud+ Advanced course covers the more advanced aspects of cloud computing and operations. You will study the different tools and testing methods used for the service and maintenance of cloud computing environments. You will also learn how to use security and controls for protecting the different aspects of the cloud infrastructure, perform disaster recovery, and maintain availability on cloud technologies.
Course Code | 1943 |
College Name | Alison |
Course Category | CompTIA, Computers & IT (Information Technology) |
Course Type | Online Learning |
Course Qualification | CPD Certificate |
Course Location | Online Course |
Delivery mode | |
Course Fee | Free |
Course Duration | 3-4 hours |
Entry Requirements | Like all courses on the Alison Free Learning platform this is a free, CPD-accredited course. A Graduate can choose to buy a certificate or diploma upon successful completion of a course, but this is not required or necessary. At Alison we believe that free education, more than anything, has the power to break through boundaries and transform lives. Alison is the world’s largest free online empowerment platform for education and skills training, offering over 5000 CPD accredited courses and a range of impactful career development tools. It is a for-profit social enterprise dedicated to making it possible for anyone, to study anything, anywhere, at any time, for free online, at any subject level. Through our mission, we are a catalyst for positive social change, creating opportunity, prosperity, and equality for everyone. |
Career Path | In This Free Course, You Will Learn How To • Define testing and tools • Describe security measures • Discuss the use of cloud controls • Outline the process for recovery • Explain service availability • Describe the challenges of the cloud environment • Define Network Latency • Explain the 'ping' troubleshooting tool • Identify the similarities between the vulnerability assessments and penetration testing • Discuss the Address Resolution Protocol (ARP) • List three factors associated with multi-factor authentication • Describe the hierarchy of the PKI collection of components and technologies |
Comments, Questions & Reviews