Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing.  Next, learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally, learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing.



Expected Duration (hours)
1.1

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud

  • Course Overview
  • describe when various virtualization technologies should be used
  • distinguish the difference between Type 1 and Type 2 hypervisors
  • install the Microsoft Hyper-V hypervisor
  • configure a Microsoft Hyper-V virtual network switch
  • create a virtual machine hosted on Microsoft Hyper-V
  • secure virtualized environments through dedicated management interfaces, patching, and changing default configurations
  • define the NIST standard characteristics of cloud computing
  • map cloud service offerings to business needs
  • describe cloud-based security solutions such as the Azure Security Center, DDoS mitigation, and Azure network security groups
  • deploy a Windows virtual machine in the Microsoft Azure cloud
  • deploy a Linux virtual machine in the Microsoft Azure cloud
  • identify cloud services that require endpoint security through the Azure Security Center
  • map security solutions to the use of virtualization and cloud computing
  • Course Number:
    it_spcisa19_07_enus

    Expertise Level
    Expert