CISA 2022: Virtualization & Cloud Computing

CISA    |    Expert
  • 14 videos | 1h 21m 29s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Virtualization is such an important technology today that it is rather surprising that a little more than a decade ago, it was not given much consideration as a practical way of providing cloud-based services. Today, it is difficult to imagine life without virtualization. In this course, you will explore virtualization and cloud computing, beginning with an overview of virtualization technologies, hypervisors, and virtual network switches. Then you will dig into creating a virtual machine and hardening a virtualized environment. Next, you will investigate cloud computing, common cloud service offerings, and cloud security. Finally, you will learn about Windows cloud-based virtual machines, Linux cloud-based virtual machines, and cloud endpoint security. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe when various virtualization technologies should be used
    Distinguish between type 1 and type 2 hypervisors
    Install the microsoft hyper-v hypervisor
    Configure a microsoft hyper-v virtual network switch
    Create a virtual machine hosted on microsoft hyper-v
    Secure virtualized environments through dedicated management interfaces, patching, and changing default configurations
  • Define the national institute of standards and technology (nist) standard characteristics of cloud computing
    map cloud service offerings to business needs
    Describe cloud-based security solutions such as the azure security center, distributed denial-of-service (ddos) mitigation, and azure network security groups
    Deploy a windows virtual machine in the microsoft azure cloud
    Deploy a linux virtual machine in the microsoft azure cloud
    Identify cloud services that require endpoint security through the azure security center
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 6s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 29s
    After completing this video, you will be able to describe when various virtualization technologies should be used. FREE ACCESS
  • Locked
    3.  Hypervisors
    5m 16s
    Upon completion of this video, you will be able to distinguish between Type 1 and Type 2 hypervisors. FREE ACCESS
  • Locked
    4.  Installing Hypervisors
    5m 31s
    Learn how to install the Microsoft Hyper-V hypervisor. FREE ACCESS
  • Locked
    5.  Configuring Virtual Network Switches
    6m 27s
    During this video, discover how to configure a Microsoft Hyper-V virtual network switch. FREE ACCESS
  • Locked
    6.  Creating a Virtual Machine
    6m 46s
    In this video, find out how to create a virtual machine hosted on Microsoft Hyper-V. FREE ACCESS
  • Locked
    7.  Hardening a Virtualized Environment
    6m 29s
    During this video, you will learn how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations. FREE ACCESS
  • Locked
    8.  Cloud Computing
    8m 28s
    In this video, we will define the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing. FREE ACCESS
  • Locked
    9.  Common Cloud Service Offerings
    5m 49s
    After completing this video, you will be able to map cloud service offerings to business needs. FREE ACCESS
  • Locked
    10.  Using Cloud-based Security Solutions
    6m 9s
    Upon completion of this video, you will be able to describe cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups. FREE ACCESS
  • Locked
    11.  Deploying Windows Cloud-based Virtual Machines
    7m 22s
    Find out how to deploy a Windows virtual machine in the Microsoft Azure cloud. FREE ACCESS
  • Locked
    12.  Deploying Linux Cloud-based Virtual Machines
    6m 37s
    In this video, discover how to deploy a Linux virtual machine in the Microsoft Azure cloud. FREE ACCESS
  • Locked
    13.  Identifying Cloud Services That Require Endpoint Security
    6m 9s
    During this video, you will learn how to identify cloud services that require endpoint security through the Azure Security Center. FREE ACCESS
  • Locked
    14.  Course Summary
    51s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.5 of 133 users Rating 4.5 of 133 users (133)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 11 users Rating 4.5 of 11 users (11)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 37 users Rating 4.7 of 37 users (37)