From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Virtualization management, security, and tool sets
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Virtualization management, security, and tool sets
- [Instructor] Welcome to this lesson on Virtualization Management, Security, and Tool Sets. In this lesson, we'll first talk about a handful of best practices when it comes to virtualization management, we'll then talk about virtual hardware security, and finally, we'll finish up with a discussion on installation of guest OS tools. Starting off with a handful of best practices in a virtualized environment. Some of these best practices include ensuring things like redundancy and high availability to avoid any single point of failure. Next is the importance of regular maintenance and patching so that we can minimize downtime and ensure that we're keeping our tools secure. It's also really important to adhere to things like vendor provided hardening instructions so that we can ensure our configurations of the systems as well as access controls for both network and permissions within the environment are as secure as they can reasonably be. And along those same lines, we should also make…
Contents
-
-
-
-
-
-
-
(Locked)
Domain 5 overview1m 57s
-
(Locked)
Hardware security4m 51s
-
(Locked)
Virtualization management, security, and tool sets5m 17s
-
(Locked)
Remote access4m 41s
-
(Locked)
Secure network configurations and controls12m 30s
-
(Locked)
Operating system hardening and configuration6m 46s
-
(Locked)
Availability of hosts and guest operating systems9m 14s
-
Performance, capacity, and hardware monitoring6m 27s
-
(Locked)
Infrastructure as code and the management plane6m 3s
-
(Locked)
Program management, part 18m 41s
-
(Locked)
Program management, part 28m 16s
-
(Locked)
Program management, part 37m 8s
-
(Locked)
Program management, part 46m 27s
-
(Locked)
Forensics, evidence collection, and preservation12m 16s
-
(Locked)
Communication and cloud stakeholders6m 57s
-
(Locked)
Security operations and intelligent monitoring6m 22s
-
(Locked)
Logging, incident management, and vulnerability assessments13m 18s
-
(Locked)
-