From the course: Cloud Security Operations by Pearson
Installation of guest OS virtualization tools
From the course: Cloud Security Operations by Pearson
Installation of guest OS virtualization tools
On the exam, you want to have awareness of Guest Operating System virtualization tools. Remember, the Guest is the operating system and application running in the underlying Type I Hypervisor host. Hypervisor companies offer extensive virtualization support for various Guest Operating System platforms to help data center environments to maximize their investments. Vendors offer compatibility guides to show the certification status of operating system releases for use as guest operating systems on their product lines. Hypervisor administrators, either on-premise data centers or in the cloud, must know the operating systems that vendors are planning to no longer support, deprecate support, and or terminate support. Open source and proprietary hypervisor vendors will offer a suite of device drivers and utilities as well. Tools can augment performance of the guest operating system, as well as improve management of the virtual machine. On the exam, remember, Although a guest operating system can run without VMware tools, for example, you'll lose important functionality and convenience. Here's an example of a screenshot of VMware guest operating system compatibility guides. This is relatively recent. It gives you an introduction, for example, kind of the widest virtualization support for guest operating systems. And then it shows you VMware certification and support levels. Now, on the exam, it will not be vendor-specific, but I will tell you that the authors of these exam questions definitely come from a kind of a VMware point of view. And so realize this is an excellent example of a type of compatibility guide that you would use as a data center hypervisor administrator.
Contents
-
-
-
Hardware-specific security configuration3m 28s
-
Installation and configuration of management tools3m 12s
-
SDS and securing storage area networks7m 20s
-
Installation of guest OS virtualization tools2m 10s
-
(Locked)
Secure network configuration12m 38s
-
(Locked)
Network security controls13m 35s
-
(Locked)
Operating system hardening1m 45s
-
(Locked)
Patch management and infrastructure as code (IaC)4m 23s
-
(Locked)
Clustered host availability4m 37s
-
(Locked)
Performance and capacity monitoring5m 27s
-
-
-
-
-