Course Overview:
This course covers the knowledge and skills required to understand standard Cloud terminologies/methodologies, to implement, maintain, and deliver cloud technologies and infrastructures (e.g. server, network, storage, and virtualization technologies), and to understand aspects of IT security and use of industry best practices related to cloud implementations and the application of virtualization.
TechNow has worked worldwide enterprise infrastructures for over 20 years and has developed demos and labs to exemplify the techniques required to demonstrate cloud technologies and to effectively manage security in the cloud environment.
TechNow is a CompTIA partner and uses official CompTIA Cloud+ curriculum.
Attendees to CT-215: Cloud+ will receive TechNow approved course materials and expert instruction.
Date/Locations:
Date/Time |
Event |
11/03/2025 - 11/07/2025
08:00 -16:00
|
CT-215: Cloud+
TechNow, Inc, San Antonio TX
|
Course Duration: 5 days
Course Objectives:
- Prepare to deploy cloud solutions
- Deploy a pilot project
- Test a pilot project deployment
- Design a secure network for cloud deployment
- Determine CPU and memory sizing for cloud deployments
- Plan Identity and Access Management for cloud deployments
- Analyze workload characteristics to ensure successful migration to the cloud
- Secure systems to meet access requirements
- Maintain cloud systems
- Implement backup, restore, and business continuity measures
- Analyze cloud systems for required performance
- Analyze cloud systems for anomalies and growth forecasting
- Troubleshoot deployment, capacity, automation, and orchestration issues
- Troubleshoot connectivity issues
- Troubleshoot security issues
Course Prerequisites:
- Security+, Network+, CASP or equivalent experience
- Managing or administering at least one of UNIX, Windows, Databases, networking, or security
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow provides a wide variety of skills based computer training and testing. With our Headquarters in San Antonio, TX, we have provided services including computer training around the United States to many individuals and corporations.
Our products and services are designed for those who are seeking to expand their knowledge base, whether with one class or a series of classes to gain certification in specific areas of training.
Our talented and knowledgeable instructors enjoy teaching and sharing their skills; allowing you to expand and learn essential computer skills.
This is a list of some of our Products and Services
Hardware, Software, and Consulting
Classroom in a Box
Authorized Testing Center
Customized Training
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.
Course Overview:
Through hands-on labs, you will learn to automate system administration tasks on managed hosts with Ansible, learn how to write Ansible playbooks to standardize task execution, and manage encryption for Ansible with Ansible Vault. This course will also teach you how to deploy and use Red Hat® Ansible Tower to centrally manage existing Ansible projects, playbooks, and roles; perform basic maintenance and administration of the Ansible Tower installation; and configure users and teams and use them to control access to systems, projects, and other resources through role-based access controls. You will learn to use Ansible Tower’s visual dashboard to launch, control, and monitor Ansible jobs; use the Ansible Tower application programming interface (API) to launch jobs from existing templates; automatically schedule Ansible jobs; and dynamically update host inventories.
Course Objectives:
- Install and troubleshoot Ansible on central nodes and managed hosts
- Automate administration tasks with Ansible playbooks and ad hoc commands
- Write effective Ansible playbooks
- Protect sensitive data used by tasks with Ansible Vault.
- Install and configure Ansible Tower for enterprise Ansible management
- Use Ansible Tower to control access to inventories and machine credentials by users and teams
- Create job templates in Ansible Tower to standardize playbook execution.
- Centrally launch playbooks and monitor and review job results with Ansible Tower
Course Outline:
- Introduce Ansible
- Deploy Ansible
- Implement playbooks
- Manage variables and inclusions
- Implement task control
- Implement Jinja2 templates
- Implement roles
- Configure complex playbooks
- Implement Ansible Vault
- Troubleshoot Ansible
- Install Ansible Tower and describe Ansible Tower’s architecture
- Create users and teams for role-based access control
- Create and manage inventories and credentials
- Manage projects for provisioning with Ansible Tower
- Construct advanced job workflows
- Update inventories dynamically and compare inventory members
- Maintenance and administration of Ansible Tower
Dates/Locations:
Duration: 5 Days
Prerequisites:
- Become a Red Hat Certified System Administrator, or demonstrate equivalent experience
Target Audience:
This course is designed for Linux system administrators, cloud administrators, and network administrators needing to automate configuration management, application deployment, and intraservice orchestration at an enterprise scale.