From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Virtualization security
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Virtualization security
- [Instructor] Welcome to this lesson on virtualization security. In this lesson, we're going to talk about four things, which are hypervisor security, container security, ephemeral computing, and then finally serverless technology. Before we really talk about hypervisor security, we should talk about the different types of hypervisors. When comparing to traditional infrastructure where we have a base layer of hardware and then on top of that, there's one operating system such as Apple's Macintosh, Linux, or Microsoft Windows. On top of that, we will have a variety of different kinds of applications that are going to run in a shared environment. In a Type 1 hypervisor or otherwise known as a bare metal hypervisor, we're going to have hardware and directly on top of the hardware, we're going to have that hypervisor layer. So some common solutions for this type of hypervisor are going to be VMware's vSphere and Microsoft Hyper-V. On top of this hypervisor, we'll have one or more guest…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-