System Security Certified Practitioner (SSCP 2018): Securing Environments
Intermediate
- 12 videos | 58m 31s
- Includes Assessment
- Earns a Badge
Learners can explore how to secure virtual and cloud environments in this 12-video course, which examines different types of virtualization technologies, including hypervisors, application virtualization, OS (operating system) virtualization, and desktop virtualization. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining hypervisors, a physical host that runs virtual machines, and appropriate software, and uses them to increase server density. You will learn about application virtualization, where the app files are not installed on the host machine, but run on the host machine. Next, you will examine OS virtualization where a virtual machine is assigned virtual hardware, such as virtual CPUs, virtual network adapters, and hard disks. You will learn how to install and configure a Microsoft Hyper-V Virtual Machine. Learn how to configure iSCSI (Internet Small Computer Systems Interface), and secure it by using CHAP (challenge handshake authentication protocol). Then learn to use AWS (Amazon Web Service) to secure data at rest in the cloud. Finally, you will examine laws and regulations to consider when using public cloud services.
WHAT YOU WILL LEARN
-
Describe the benefits of operating system and application virtualizationExplain the purpose of type 1 and type 2 hypervisorsInstall microsoft hyper-v on a windows serverExplain how to secure hypervisors and virtual machinesConfigure a virtual machine on a protected hyper-v networkConfigure iscsi and chap on a microsoft iscsi network
-
Explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibilityDistinguish the differences between saas, iaas, paas, and their slasDescribe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud stored dataDiscuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and ediscoveryUse standard techniques to protect cloud and virtual assets
IN THIS COURSE
-
2m 2s
-
5m 42sUpon completion of this video, you will be able to describe the benefits of operating system and application virtualization. FREE ACCESS
-
3m 21sAfter completing this video, you will be able to explain the purpose of Type 1 and Type 2 hypervisors. FREE ACCESS
-
5m 58sLearn how to install Microsoft Hyper-V on Windows Server. FREE ACCESS
-
5m 42sAfter completing this video, you will be able to explain how to secure hypervisors and virtual machines. FREE ACCESS
-
5m 23sLearn how to configure a virtual machine on a Hyper-V network that is protected. FREE ACCESS
-
5m 31sDuring this video, you will learn how to configure iSCSI and CHAP on a Microsoft iSCSI network. FREE ACCESS
-
5m 18sAfter completing this video, you will be able to explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibility. FREE ACCESS
-
3m 50sLearn how to distinguish the differences between SaaS, IaaS, PaaS, and their service level agreements. FREE ACCESS
-
3m 26sAfter completing this video, you will be able to describe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud-stored data. FREE ACCESS
-
4m 14sIn this video, you will discuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and eDiscovery. FREE ACCESS
-
8m 4sIn this video, learn how to use standard techniques to protect your cloud and virtual assets. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.