• Online, Self-Paced
Course Description

In this challenge, you will monitor resource usage and alarms. First, you will monitor the CPU load caused by virtual machines, and then you will monitor the disk load. Next, you will create a custom alarm. Finally, you will modify the alarm settings, and then you will configure alarm actions. Note: Once you begin the challenge lab, you will not be able to pause, save, or return to your challenge lab. Please ensure that you have set aside enough time to complete the challenge lab before you start.

Learning Objectives

In this challenge, you will monitor resource usage and alarms. First, you will monitor the CPU load caused by virtual machines, and then you will monitor the disk load. Next, you will create a custom alarm. Finally, you will modify the alarm settings, and then you will configure alarm actions. Note: Once you begin the challenge lab, you will not be able to pause, save, or return to your challenge lab. Please ensure that you have set aside enough time to complete the challenge lab before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.