Data Center Design
Cloud
| Expert
- 11 videos | 1h 8m 43s
- Includes Assessment
Fundamental to cloud service security are the construction and design of secure data centers. Examine best practices for data center design, and the building and setup of the physical and logical infrastructure.
WHAT YOU WILL LEARN
-
Define the design and implementation of logical elements of a proposed cloud service, including tenant isolation, access control, etc.Define the design and implementation of physical aspects of a proposed cloud service, including build or rent, location, managementDescribe the deployment and configuration of secured hardware with reference to bios, tmp, and the host preboot environment.Describe the deployment and configuration of secured hardware with reference to storage controllers, network controllers, and virtualized environmentDefine local machine access controls, and deployment of secure kmv switchesDefine techniques to secure network configuration and network support tools, including vlan, tls, dhpc and authorized dhcp, dns and secure, and ipsec
-
Define techniques to secure the datacenter network and network accessDefine operating system hardening techniques with reference to os: windows, linux, vmware, etc.Describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization (do), maintenance mode, and general high availability best practice adoption.Define the secure configuration of the virtual hardware, including network, storage and elastic expansion, memory, and external devicesDescribe the tolls associated with vm os installation on the physical host
IN THIS COURSE
-
9m 18sLearn how to define the design and implementation of logical elements of a proposed cloud service, including tenant isolation, access control, etc. FREE ACCESS
-
6m 6sFind out how to define the design and implementation of physical aspects of a proposed cloud service, including whether to build or rent, location, and management. FREE ACCESS
-
4m 42sUpon completion of this video, you will be able to describe the deployment and configuration of secured hardware with reference to BIOS, TPM, and the host preboot environment. FREE ACCESS
-
8m 4sUpon completion of this video, you will be able to describe the deployment and configuration of secured hardware with reference to storage controllers, network controllers, and virtualized environments. FREE ACCESS
-
4m 45sDuring this video, you will learn how to define local machine access controls and deploy secure KMV switches. FREE ACCESS
-
7m 8sDuring this video, you will learn how to define techniques to secure network configuration and network support tools, including VLANs, TLS, DHCP and Authorized DHCP, DNS and Secure, and IPSec. FREE ACCESS
-
5m 24sIn this video, find out how to define techniques to secure the data center network and network access. FREE ACCESS
-
7m 41sIn this video, find out how to define operating system hardening techniques with reference to OS: Windows, Linux, Vmware, etc. FREE ACCESS
-
4m 56sAfter completing this video, you will be able to describe standalone and cluster host availability, backup, and failover, in addition to load balancing, dynamic optimization (DO), maintenance mode, and general high availability best practice adoption. FREE ACCESS
-
7m 37sIn this video, you will learn how to configure the virtual hardware securely, including the network, storage and elastic expansion, memory, and external devices. FREE ACCESS
-
3m 3sAfter completing this video, you will be able to describe the costs associated with VM OS installation on the physical host. FREE ACCESS