Monthly Archives: February 2023
31. Other Common Cloud Services and Tech Module Introduction Well, when you look at the exam objectives for Cloud+ and you realize it’s like a Stephen King novel, it’s very-very long, it’s very-very broad, the number of topics that we’ve been covering together. One of the things that you know I’m gonna have to do […]
27. Security Controls Module Introduction We certainly understood before even enrolling in this course that there were many potential security attackers and many potential security attacks that we might encounter with any IT environment, never mind the cloud. Well, in this important module we’re gonna discuss some, just some, of the many powerful security controls […]
21. Networking Module Introduction As you might guess, for instructors like myself that have been in information technology for way too long, when we’re teaching a CompTIA subject like this, we often have to really be careful. We have to reel ourselves in from getting too carried away in any one area because that area […]
16. Identification and Authorization Module Introduction We know that if we implement cloud technologies properly we can actually improve the security posture of our organization, but this does not come automatically. As a matter of fact, we need to attend to identifying those individuals that wanna interact with our cloud resources and we need to […]
11. Advanced Design Topics Module Introduction In this module, we wanna take a look at some advanced design topics. For example, what kind of considerations should we factor in when we’re planning on capacity issues in the cloud. And shouldn’t the cloud be able to be elastic, scaling up and scaling down as we need? […]
5. Cloud Architecture and Design Module Introduction Well, it’s time for us to tackle our first major section of content in Cloud+. We’re gonna talk about design issues when it comes to cloud. This is one of my favorite subjects because we often think of cloud as some immediate solution, something that’s going to be […]
7. Deployment Options (OBJ. 3.1) In this lesson, we’re going to discuss the different mobile device deployment options that you can use in your organization. Now, a mobile device deployment model describes the way employees are provided with mobile devices and applications to use as part of their job functions. Now, this can be one […]
4. Connectivity Options (OBJ. 3.1) In this lesson, we’re going to talk about connectivity options for your mobile devices and wearables. Specifically, we’re going to discuss NFC, RFID, infrared, Bluetooth, USB peripherals, and tethering. The first connectivity option we need to discuss is NFC or near field communication. Now, NFC devices use a radio frequency […]
1. Enterprise Mobility In this section of the course, we’re going to discuss enterprise mobility and the proper configurations, deployment methods, and security considerations involved with smartphones, tablets and wearable devices that may connect to or communicate with our enterprise networks. Now, in this section, we’re going to be focused on domain three, security, engineering […]
7. Homomorphic Encryption (OBJ 1.8) In this lesson, we’re going to discuss homomorphic encryption and its potential uses in your enterprise security architecture. Now, homomorphic encryption is a form of encryption that permits users to perform calculations on its encrypted data without first decrypting it. By using homomorphic encryption, an organization can process information while […]