System Security Certified Practitioner (SSCP 2018): Securing Environments

Intermediate
  • 12 videos | 58m 31s
  • Includes Assessment
  • Earns a Badge
Learners can explore how to secure virtual and cloud environments in this 12-video course, which examines different types of virtualization technologies, including hypervisors, application virtualization, OS (operating system) virtualization, and desktop virtualization. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining hypervisors, a physical host that runs virtual machines, and appropriate software, and uses them to increase server density. You will learn about application virtualization, where the app files are not installed on the host machine, but run on the host machine. Next, you will examine OS virtualization where a virtual machine is assigned virtual hardware, such as virtual CPUs, virtual network adapters, and hard disks. You will learn how to install and configure a Microsoft Hyper-V Virtual Machine. Learn how to configure iSCSI (Internet Small Computer Systems Interface), and secure it by using CHAP (challenge handshake authentication protocol). Then learn to use AWS (Amazon Web Service) to secure data at rest in the cloud. Finally, you will examine laws and regulations to consider when using public cloud services.

WHAT YOU WILL LEARN

  • Describe the benefits of operating system and application virtualization
    Explain the purpose of type 1 and type 2 hypervisors
    Install microsoft hyper-v on a windows server
    Explain how to secure hypervisors and virtual machines
    Configure a virtual machine on a protected hyper-v network
    Configure iscsi and chap on a microsoft iscsi network
  • Explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibility
    Distinguish the differences between saas, iaas, paas, and their slas
    Describe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud stored data
    Discuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and ediscovery
    Use standard techniques to protect cloud and virtual assets

IN THIS COURSE

  • 2m 2s
  • 5m 42s
  • Locked
    3.  Hypervisors
    3m 21s
  • Locked
    4.  Install the Microsoft Hyper-V Hypervisor
    5m 58s
  • Locked
    5.  Hypervisor and Virtual Machine Security
    5m 42s
  • Locked
    6.  Configure a Hyper-V Virtual Machine
    5m 23s
  • Locked
    7.  Lock Down iSCSI Network Storage with CHAP
    5m 31s
  • Locked
    8.  Cloud Types
    5m 18s
  • Locked
    9.  Cloud Service Models
    3m 50s
  • Locked
    10.  Securing Data at Rest in the Cloud
    3m 26s
  • Locked
    11.  Laws, Regulations, and the Cloud
    4m 14s
  • Locked
    12.  Exercise: Protect Virtualized and Cloud Environments
    8m 4s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.