From the course: Cybersecurity with Cloud Computing
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Hypervisors and visualization
From the course: Cybersecurity with Cloud Computing
Hypervisors and visualization
- [Instructor] Virtualization forms the underlying fabric of the cloud. However, with virtualization comes another layer of risks, including hypervisor-specific threats intervirtual machine attacks and blind spots, and virtual machine sprawl. Added to this, new threats such as instant-on gaps, commingling, and residual data destruction also complicate life in a virtual world. The evolution of virtualization revolves around software known as the hypervisor. There are two forms of hypervisor. Type 1 hypervisors run at the hardware level. This is known as running on bare metal. The hypervisor contains all the features necessary to manage the underlying hardware, and prevents para-virtualized devices to the virtual machines which run on top of it. Type 2 hypervisors run on a host operating system. They're not as efficient as type 1 hypervisor because of the underlying software, and they also inherit all of its vulnerabilities.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
(Locked)
Cloud security guidance2m 49s
-
(Locked)
Essential characteristics7m 17s
-
(Locked)
Cloud services5m 7s
-
(Locked)
Infrastructure as a service3m 32s
-
(Locked)
Platform as a service2m 52s
-
(Locked)
Software as a service2m 41s
-
(Locked)
Deployment models4m 44s
-
(Locked)
Hypervisors and visualization5m 1s
-
(Locked)
Cloud security certification1m 13s
-
(Locked)
-
-
-
-
-
-