Cloud+ Outline – Modules 7, 8 and 9

April 21, 2017 | Views: 1350

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Module 7: Allocation and Optimizing

Unit Overview

VM and Host Resource Allocation

  • Resources
  • Memory
  • CPU
  • Disk Space
  • Quotas
  • Quotas are the total amount of resources that a Vm can use
  • Hard – maximum amount of resources
  • Soft – allows a user to exceed maximum amount
  • Licensing
  • Allows an origination to use the software
  • Most expensive part of the install
  • The license agreement should be read
  • Reservations
  • A set aside of resources given to the customer of VM
  • VM will always get a set level of resources
  • Resource Pools
  • Resources set aside for a VM
  • Possible for the resources to be divided for specific groups
  • Provide organization
  • Dynamic Resource Allocation
  • Best performance
  • Availability
  • Capacity arrangements
  • Helps reduce power costs

Physical Resource Redirection

  • External modem
  • Handheld device
  • File on the host computer
  • Printers (parallel or serial ports)
  • Scanners
  • Dongles
  • USB device

Configuration Practices

  • Memory Ballooning
  • Memory is typically the limited factor
  • Ballooning allows the OS to exceed the limits loosely
  • Usually requires a third party software
  • Swap Disk Space
  • When all physical memory has been issued swap disk space can be used
  • Similar to page file but for VM
  • CPU
  • Typically VM are limited to how many cores a CPU has
  • Fast CPU allow for more request to be achieved
  • If VM or host is performing slow, too many processes might be running
  • Disk
  • Disk speeds can limit the VM
  • RAID can improve performance and allow for fault tolerance

Common Issues

  • Common Disk Failures
  • Physical Hard Disk Failures
  • Disk Corruption
  • HBA Fails (Host Bus Adapter)
  • Common Memory Failures
  • RAM failures
  • Swap Files out of space
  • Network Failures
  • NIC failures
  • Speed/Duplex mismatches
  • External devices fail

Common Performance Considerations

  • DISK
  • Caching
  • Network
  • Bandwidth
  • Latency
  • Quality of Service (QoS)
  • Multipathing
  • Load Balancing


Unit Summary

Described VM and Host Resource Allocation

Described Configuration Best Practices

Described Common Issues

Described Common Performance Concepts


Module 8: Network Storage Types and Configuration

Unit Overview


  • Simple Network Management Protocol (SNMP)
  • Used to monitor devices for issues
  • Used primarily on routers, switches, printers and servers
  • Windows Management Instrumentation (WMI)
  • Give admin the ability to create scripts to automate tasks
  • Scripts can look at CPU, memory, OS and hard drive space performance
  • Out-of-band Management
  • Give admin ability to manage and monitor a device remotely even if device is off
  • Intelligent Platform Management Interface (IPMI) is needed
  • Not part of the OS but a third party software of part of the motherboard
  • BIOS can be modified
  • Short Message Service
  • Alerts can be sent to a mobile device after hours


  • Designed as a troubleshooting tool
  • Shows the computing resources being consumed by a device at that time
  • Allows an admin to compare to a previous point in time


  • Tipping point for a server
  • Point when a device is consuming more resources than needed
  • Compare to a baseline

Automated Event Responses

  • Automated responses monitor the events
  • When the threshold is triggered
  • The trigger or event causes a program or script to start
  • Can be caused by an alert
  • Allows the administrator to keep the system safe with little or no intervention

Remote Access Tools

  • Console Port
  • Connect directly to the PC with a cable
  • Uses parallel or serial ports
  • Allows for management of a host from another PC
  • Remote Desktop Protocol (RDP)
  • Remotely connects to a PC or VM as if the admin was at the PC
  • Allows for management
  • One sessions for one PC or VM
  • Remote Hypervisor Access
  • Connect to a hypervisor from your workstation
  • Add multiple hypervisors into a single console
  • Manage all hypervisor hosts from a single console
  • Create or modify VHDs, VM settings, etc. from a local workstation
  • Secure Shell (SSH)
  • Securely connect to a host
  • Creates a secure tunnel to a remote device
  • Allows an admin to remotely log into a host and execute commands
  • HTTP
  • Access devices via a web browser
  • Can use HTTP or HTTPS
  • Additional software needs to be loaded during host installation

Unit Summary

Described Resource Monitoring Techniques

Described Remote Access Tools


Module 9: Management and Testing

Unit Overview

Policies and Procedures

  • Change Management
  • Maximizes the Value
  • Reduces Disruptions
  • Minimize Risk
  • Provides control for configuration management
  • Configuration Management
  • Improve performance
  • Optimizes cost and risk
  • Capacity Management
  • Gives the customers the best performance
  • Allows for justifiable cost
  • Gives justification for demands and performance
  • Life Cycle Management
  • Process or processes put in place by an organization to assist


  • Coordination
  • Control
  • Delivery
  • Support
  • Information Technology Infrastructure Library (ITIL)
  • Microsoft Operations Framework (MOF)
    • Documentation
    • Strategic Planning
    • Requirements (Business, Technical, SLAs)
    • Designs (Service Design Package)
    • Service Delivery (Incidents, Problems, COnfiguration Item Records)
    • Continual Service IMprovement Register
    • Standardization
    • Naming conventions
    • Configuration Options
    • Procedures
    • Baselines
    • Planning
    • Maintenance WIndows
    • Change Advisory Board (CAB) Approvals


Testing Techniques

  • Testing the components
  • Network
  • Data
  • Applications
  • Storage

Security Testing

  • For legal reasons the organization should review the contract with the cloud provider
  • Before testing begins the organizations should inform the provider the plan to test
  • White box – the tester is given information about the system, designed for specific attacks
  • Black box – the tester knows very little about the system, simulate a real-world hacker

Roles and Responsibilities

  • Separation of duties
  • Checks and balances
  • Internal controls help reduce potential damage
  • A single administrator can cause issues if he has all the keys


  • ipconfig (Windows) / ifconfig (Linux)
  • nslookup (exit)
  • Netstat (what’s connected to the machine)
  • ARP (address resolution protocol)
  • Telnet (remote into a computer via command prompt – unsecure vs SSH)


  • Should be easy to understand
  • Record responsibilities
  • Record device configurations
  • Updated changes
  • Makes troubleshooting easier if issues arise

System Logs

  • Records events on PCs
  • Tracks device changes
  • Device drivers
  • System changes
  • Events
  • Some third party software allow the logs to be consolidated

Unit Summary

Described Policies and Procedures

Described Systems Management Best Practices

Described Testing Techniques

Described Troubleshooting and Tools

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?