Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud

Expert
  • 14 videos | 1h 8m 39s
  • Includes Assessment
  • Earns a Badge
Likes 69 Likes 69
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing. Next, learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally, learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing.

WHAT YOU WILL LEARN

  • describe when various virtualization technologies should be used
    distinguish the difference between Type 1 and Type 2 hypervisors
    install the Microsoft Hyper-V hypervisor
    configure a Microsoft Hyper-V virtual network switch
    create a virtual machine hosted on Microsoft Hyper-V
    secure virtualized environments through dedicated management interfaces, patching, and changing default configurations
    define the NIST standard characteristics of cloud computing
  • map cloud service offerings to business needs
    describe cloud-based security solutions such as the Azure Security Center, DDoS mitigation, and Azure network security groups
    deploy a Windows virtual machine in the Microsoft Azure cloud
    deploy a Linux virtual machine in the Microsoft Azure cloud
    identify cloud services that require endpoint security through the Azure Security Center
    map security solutions to the use of virtualization and cloud computing

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.