- Design, Build, and Deploy
- Considerations
- Deployment
- Existing Infrastructure
- Hosting Options
|
- Disaster Recovery
- Backup
- Down Time
- Recovery
- Verification
|
- Hardware
- Boot Sequence
- Memory
- Motherboard/CPU/Platform/Chassis
- NIC/HBA/Remote Management Adapters
- Storage
|
- Management Process
- Change Management
- Incident Response
- Monitoring and Logging
- System Lifecycle
|
- Network
- OSI Model
- Protocols
- Routing and Switching
- Security-based Networks
|
- Security
- Authentication and Authorization
- Firewall and IDS
- Passwords and Auditing
- Physical Access
|
- Troubleshooting and Optimization
- Data Maintenance
- Network
- Server
- Virtual Environment
|
- Users and Resources
- File System Restrictions
- Network Appliances
- Resource Availability
- Users and Groups
|