System Security Certified Practitioner (SSCP 2018): Securing Environments

Intermediate
  • 12 videos | 58m 31s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 31 users Rating 4.4 of 31 users (31)
Learners can explore how to secure virtual and cloud environments in this 12-video course, which examines different types of virtualization technologies, including hypervisors, application virtualization, OS (operating system) virtualization, and desktop virtualization. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining hypervisors, a physical host that runs virtual machines, and appropriate software, and uses them to increase server density. You will learn about application virtualization, where the app files are not installed on the host machine, but run on the host machine. Next, you will examine OS virtualization where a virtual machine is assigned virtual hardware, such as virtual CPUs, virtual network adapters, and hard disks. You will learn how to install and configure a Microsoft Hyper-V Virtual Machine. Learn how to configure iSCSI (Internet Small Computer Systems Interface), and secure it by using CHAP (challenge handshake authentication protocol). Then learn to use AWS (Amazon Web Service) to secure data at rest in the cloud. Finally, you will examine laws and regulations to consider when using public cloud services.

WHAT YOU WILL LEARN

  • Describe the benefits of operating system and application virtualization
    Explain the purpose of type 1 and type 2 hypervisors
    Install microsoft hyper-v on a windows server
    Explain how to secure hypervisors and virtual machines
    Configure a virtual machine on a protected hyper-v network
    Configure iscsi and chap on a microsoft iscsi network
  • Explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibility
    Distinguish the differences between saas, iaas, paas, and their slas
    Describe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud stored data
    Discuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and ediscovery
    Use standard techniques to protect cloud and virtual assets

IN THIS COURSE

  • 2m 2s
  • 5m 42s
    Upon completion of this video, you will be able to describe the benefits of operating system and application virtualization. FREE ACCESS
  • Locked
    3.  Hypervisors
    3m 21s
    After completing this video, you will be able to explain the purpose of Type 1 and Type 2 hypervisors. FREE ACCESS
  • Locked
    4.  Install the Microsoft Hyper-V Hypervisor
    5m 58s
    Learn how to install Microsoft Hyper-V on Windows Server. FREE ACCESS
  • Locked
    5.  Hypervisor and Virtual Machine Security
    5m 42s
    After completing this video, you will be able to explain how to secure hypervisors and virtual machines. FREE ACCESS
  • Locked
    6.  Configure a Hyper-V Virtual Machine
    5m 23s
    Learn how to configure a virtual machine on a Hyper-V network that is protected. FREE ACCESS
  • Locked
    7.  Lock Down iSCSI Network Storage with CHAP
    5m 31s
    During this video, you will learn how to configure iSCSI and CHAP on a Microsoft iSCSI network. FREE ACCESS
  • Locked
    8.  Cloud Types
    5m 18s
    After completing this video, you will be able to explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibility. FREE ACCESS
  • Locked
    9.  Cloud Service Models
    3m 50s
    Learn how to distinguish the differences between SaaS, IaaS, PaaS, and their service level agreements. FREE ACCESS
  • Locked
    10.  Securing Data at Rest in the Cloud
    3m 26s
    After completing this video, you will be able to describe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud-stored data. FREE ACCESS
  • Locked
    11.  Laws, Regulations, and the Cloud
    4m 14s
    In this video, you will discuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and eDiscovery. FREE ACCESS
  • Locked
    12.  Exercise: Protect Virtualized and Cloud Environments
    8m 4s
    In this video, learn how to use standard techniques to protect your cloud and virtual assets. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 840 users Rating 4.7 of 840 users (840)
Rating 4.5 of 116 users Rating 4.5 of 116 users (116)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 280 users Rating 4.7 of 280 users (280)
Rating 4.5 of 147 users Rating 4.5 of 147 users (147)
Rating 4.5 of 43 users Rating 4.5 of 43 users (43)