System Security Certified Practitioner (SSCP 2018): Securing Environments
Intermediate
- 12 videos | 58m 31s
- Includes Assessment
- Earns a Badge
Learners can explore how to secure virtual and cloud environments in this 12-video course, which examines different types of virtualization technologies, including hypervisors, application virtualization, OS (operating system) virtualization, and desktop virtualization. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining hypervisors, a physical host that runs virtual machines, and appropriate software, and uses them to increase server density. You will learn about application virtualization, where the app files are not installed on the host machine, but run on the host machine. Next, you will examine OS virtualization where a virtual machine is assigned virtual hardware, such as virtual CPUs, virtual network adapters, and hard disks. You will learn how to install and configure a Microsoft Hyper-V Virtual Machine. Learn how to configure iSCSI (Internet Small Computer Systems Interface), and secure it by using CHAP (challenge handshake authentication protocol). Then learn to use AWS (Amazon Web Service) to secure data at rest in the cloud. Finally, you will examine laws and regulations to consider when using public cloud services.
WHAT YOU WILL LEARN
-
Describe the benefits of operating system and application virtualizationExplain the purpose of type 1 and type 2 hypervisorsInstall microsoft hyper-v on a windows serverExplain how to secure hypervisors and virtual machinesConfigure a virtual machine on a protected hyper-v networkConfigure iscsi and chap on a microsoft iscsi network
-
Explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibilityDistinguish the differences between saas, iaas, paas, and their slasDescribe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud stored dataDiscuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and ediscoveryUse standard techniques to protect cloud and virtual assets
IN THIS COURSE
-
2m 2s
-
5m 42s
-
3m 21s
-
5m 58s
-
5m 42s
-
5m 23s
-
5m 31s
-
5m 18s
-
3m 50s
-
3m 26s
-
4m 14s
-
8m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.