Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud

Expert
  • 14 videos | 1h 8m 39s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 52 users Rating 4.7 of 52 users (52)
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing. Next, learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally, learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing.

WHAT YOU WILL LEARN

  • Describe when various virtualization technologies should be used
    Distinguish the difference between type 1 and type 2 hypervisors
    Install the microsoft hyper-v hypervisor
    Configure a microsoft hyper-v virtual network switch
    Create a virtual machine hosted on microsoft hyper-v
    Secure virtualized environments through dedicated management interfaces, patching, and changing default configurations
    Define the nist standard characteristics of cloud computing
  • Map cloud service offerings to business needs
    Describe cloud-based security solutions such as the azure security center, ddos mitigation, and azure network security groups
    Deploy a windows virtual machine in the microsoft azure cloud
    Deploy a linux virtual machine in the microsoft azure cloud
    Identify cloud services that require endpoint security through the azure security center
    Map security solutions to the use of virtualization and cloud computing

IN THIS COURSE

  • 1m 59s
  • 4m 55s
    After completing this video, you will be able to describe when various virtualization technologies can be used. FREE ACCESS
  • Locked
    3.  Hypervisors
    5m 31s
    Learn how to distinguish the difference between Type 1 and Type 2 hypervisors. FREE ACCESS
  • Locked
    4.  Hypervisor Installation
    4m 19s
    In this video, find out how to install the Microsoft Hyper-V hypervisor on your computer. FREE ACCESS
  • Locked
    5.  Virtual Network Switches
    6m 32s
    During this video, you will learn how to configure a Microsoft Hyper-V virtual network switch. FREE ACCESS
  • Locked
    6.  Virtual Machines
    7m 22s
    In this video, learn how to create a virtual machine on Microsoft Hyper-V. FREE ACCESS
  • Locked
    7.  Hardening a Virtualized Environment
    6m 55s
    In this video, learn how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations. FREE ACCESS
  • Locked
    8.  Cloud Computing
    6m 21s
    In this video, you will learn about the NIST standard characteristics of cloud computing. FREE ACCESS
  • Locked
    9.  Common Cloud Service Offerings
    3m 34s
    In this video, you will learn how to map cloud service offerings to business needs. FREE ACCESS
  • Locked
    10.  Cloud Security
    6m 35s
    Upon completion of this video, you will be able to describe cloud-based security solutions such as the Azure Security Center, DDoS mitigation, and Azure network security groups. FREE ACCESS
  • Locked
    11.  Windows Cloud-Based Virtual Machines
    4m 46s
    In this video, you will deploy a Windows virtual machine on the Microsoft Azure cloud. FREE ACCESS
  • Locked
    12.  Linux Cloud-Based Virtual Machines
    4m 15s
    In this video, you will deploy a Linux virtual machine on the Microsoft Azure cloud. FREE ACCESS
  • Locked
    13.  Cloud Endpoint Security
    2m 45s
    Find out how to identify cloud services that require endpoint security through the Azure Security Center. FREE ACCESS
  • Locked
    14.  Exercise: Securing Cloud Environments
    2m 50s
    In this video, you will learn how to map security solutions to the use of virtualization and cloud computing. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 29 users Rating 4.5 of 29 users (29)
Rating 4.6 of 1713 users Rating 4.6 of 1713 users (1713)
Rating 4.6 of 40 users Rating 4.6 of 40 users (40)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1774 users Rating 4.6 of 1774 users (1774)
Rating 4.4 of 96 users Rating 4.4 of 96 users (96)
Rating 4.7 of 44 users Rating 4.7 of 44 users (44)