Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud

Expert
  • 14 Videos | 1h 14m 39s
  • Includes Assessment
  • Earns a Badge
Likes 38 Likes 38
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing.  Next, learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally, learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing.

WHAT YOU WILL LEARN

  • describe when various virtualization technologies should be used
    distinguish the difference between Type 1 and Type 2 hypervisors
    install the Microsoft Hyper-V hypervisor
    configure a Microsoft Hyper-V virtual network switch
    create a virtual machine hosted on Microsoft Hyper-V
    secure virtualized environments through dedicated management interfaces, patching, and changing default configurations
    define the NIST standard characteristics of cloud computing
  • map cloud service offerings to business needs
    describe cloud-based security solutions such as the Azure Security Center, DDoS mitigation, and Azure network security groups
    deploy a Windows virtual machine in the Microsoft Azure cloud
    deploy a Linux virtual machine in the Microsoft Azure cloud
    identify cloud services that require endpoint security through the Azure Security Center
    map security solutions to the use of virtualization and cloud computing

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 126 Likes 126  
Likes 1275 Likes 1275