Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Expert
- 14 videos | 1h 8m 39s
- Includes Assessment
- Earns a Badge
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing. Next, learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally, learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing.
WHAT YOU WILL LEARN
-
describe when various virtualization technologies should be useddistinguish the difference between Type 1 and Type 2 hypervisorsinstall the Microsoft Hyper-V hypervisorconfigure a Microsoft Hyper-V virtual network switchcreate a virtual machine hosted on Microsoft Hyper-Vsecure virtualized environments through dedicated management interfaces, patching, and changing default configurationsdefine the NIST standard characteristics of cloud computing
-
map cloud service offerings to business needsdescribe cloud-based security solutions such as the Azure Security Center, DDoS mitigation, and Azure network security groupsdeploy a Windows virtual machine in the Microsoft Azure clouddeploy a Linux virtual machine in the Microsoft Azure cloudidentify cloud services that require endpoint security through the Azure Security Centermap security solutions to the use of virtualization and cloud computing
IN THIS COURSE
-
1.Course Overview1m 59sUP NEXT
-
2.Types of Virtualization4m 55s
-
3.Hypervisors5m 31s
-
4.Hypervisor Installation4m 19s
-
5.Virtual Network Switches6m 32s
-
6.Virtual Machines7m 22s
-
7.Hardening a Virtualized Environment6m 55s
-
8.Cloud Computing6m 21s
-
9.Common Cloud Service Offerings3m 34s
-
10.Cloud Security6m 35s
-
11.Windows Cloud-Based Virtual Machines4m 46s
-
12.Linux Cloud-Based Virtual Machines4m 15s
-
13.Cloud Endpoint Security2m 45s
-
14.Exercise: Securing Cloud Environments2m 50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.