Integrating Cloud & Virtualization Technologies in the Enterprise

Expert
  • 10 videos | 36m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 4 users Rating 4.5 of 4 users (4)
Discover how to integrate cloud and virtualization technologies into a secure enterprise architecture. In this Computing Technology Industry Associate Advanced Security Practitioner course (CompTIA CASP+), you will describe technical models for cloud and virtualization and cloud service models; compare the pros and cons of hypervisors and virtualization; specify cloud augmented security services and CASB and sec-as-a-service offerings; define and describe host comingling vulnerabilities; define resource provisioning and de-provisioning; and complete a review exercise to describe enterprise cloud and virtualization technologies.

WHAT YOU WILL LEARN

  • Describe technical models for cloud and virtualization
    Describe cloud service models
    Compare the pros and cons of hypervisors
    Compare the pros and cons of virtualization
    Specify cloud augmented security services
  • Specify casb and sec-as-a-service offerings
    Define host comingling vulnerabilities
    Describe host comingling vulnerabilities
    Define resource provisioning and de-provisioning
    Describe enterprise cloud and virtualization technologies

IN THIS COURSE

  • 6m 35s
    Upon completion of this video, you will be able to describe technical models for cloud computing and virtualization. FREE ACCESS
  • 4m 4s
    After completing this video, you will be able to describe the cloud service models. FREE ACCESS
  • Locked
    3.  Type 1 vs. Type 2 Hypervisors
    4m 4s
    Find out how to compare the pros and cons of hypervisors. FREE ACCESS
  • Locked
    4.  Pros and Cons of Virtualization
    4m 49s
    In this video, find out how to compare the pros and cons of virtualization. FREE ACCESS
  • Locked
    5.  Cloud Augmented Security Services
    2m 11s
    Upon completion of this video, you will be able to specify cloud-augmented security services. FREE ACCESS
  • Locked
    6.  CASB and Sec-as-a-Service
    2m 33s
    After completing this video, you will be able to specify CASB and security-as-a-service offerings. FREE ACCESS
  • Locked
    7.  Host Comingling Vulnerabilities
    5m 37s
    In this video, you will learn how to define vulnerabilities that come from mixing different types of hosts. FREE ACCESS
  • Locked
    8.  Data Security Considerations
    2m 5s
    After completing this video, you will be able to describe host vulnerabilities that allow for comingling. FREE ACCESS
  • Locked
    9.  Resource Provisioning and De-provisioning
    2m 36s
    In this video, you will learn about resource provisioning and de-provisioning. FREE ACCESS
  • Locked
    10.  Exercise: Describe Cloud and Virtualization
    1m 54s
    Upon completion of this video, you will be able to describe enterprise cloud and virtualization technologies. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 65 users Rating 4.6 of 65 users (65)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 15 users Rating 4.5 of 15 users (15)
Rating 4.2 of 107 users Rating 4.2 of 107 users (107)
Rating 4.7 of 197 users Rating 4.7 of 197 users (197)