Cloud and Virtualization Concepts Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33
Video Transcription
00:00
Hello and welcome back to the side. Berry 2019 Cop T A. Security plus certification preparation course.
00:08
We continue our discussion of marginal my three
00:11
and the topic of discussion will be domain. Three. Architectural design
00:16
Surprising enough We have a brain new objective, which is 3.7. We've got this summarize cloud and virtualization concepts.
00:24
The first item margin is a pre assessment Quist, and it reads as follows. Company eight is due to upgrade all of us I T systems and has been investigating moving to the cloud as there's no capital expenditure since the CSP provides the hardware
00:42
company was still like to control the i T systems in the cloud,
00:46
which cloud Marwood best served company eight needs Is a software as a service
00:53
be infrastructure as a service
00:55
See mantra as a service, or is it the platform of the service?
01:00
In this case, if you start to be, you're absolutely correct because infrastructure service provides the bare metal hardware. Then you need to install the software, configure it and then patch it.
01:12
As mentioned earlier, this brand new get this is 3.7.
01:17
When we have to summarize cloud and virtualization concept here again on some concepts which encompasses this particular objective. We begin by first taking a look at hyper visor.
01:29
Take a look, a tight one hyper visor
01:32
as well as a type two.
01:34
There were more in our discussion, taking a look at application sales and containers,
01:38
virtual machines, sprawl of what is
01:42
birch machine escape protection.
01:46
They would take a look at cloud storage.
01:49
So when you think what virtualization birch is a change in the mindset from physical, too logical
01:57
virtualization means create mawr. Logical ITV sources call virtual systems within one physical system.
02:04
This is called system virtualization. It's most commonly uses. The hyper visor for Imagine of resource is for every virtual system.
02:14
The hyper Basel is a software that can virtualized the hardware. Resource is
02:19
so, in essence, on happen visors were controls
02:23
and allocates what portion the heart worry sources each operating systems to get in order for every one of them to get what they lead and not disrupt each other.
02:35
Now there are two types of hyper visor that you need to be aware of. The 1st 1 is tight. One hyper visor,
02:42
this high bar that runs directly on the system heart, where other words a bare metal embedded hyper visor.
02:49
Then we have the type to hyper visor. This hyper brother runs on the host operating system that provides virtualization services such as input, output, device support as well as memory management.
03:02
Then we have shared storage. She has storage. Is the centralising data in one place? Harbor is more than just that.
03:10
In today's business environment, it is imperative that database accessible on a 24 7 bases and not be subject to hardware issues
03:21
virtually imply it's is is the software application. Residing and operating in a pre configured virtual environment or platform.
03:31
Virtual appliances are excess remotely by users and do not require local install hardware
03:38
continuity and resilience. I t continuity and adores infamous technology. Continuity is in fact, a holistic approach to imagine technology systems in event of a major disruption.
03:53
Resilience refers to a network system of Billy to withstand the slings and arrows of life in operations, from human errors to migration, failure to natural disasters,
04:06
virtual sheen, sprawl. Avoidance is a phenomenon occurs when the number of birth machines on a network reaches a point with administrator can no longer manage them effectively.
04:16
Birch Machine spoke often happens when there's freedom to provision instances because of a lack of proper implemented policies regarding provisioning
04:27
VM escape protection it is and explore. And was the attacker runs cold on a VM that allows an operating system running within it to break out and interact directly with the hyper visor.
04:39
This type of sport could give their tiger access to the host operating system and all other birch machines running on that host.
04:47
This brings us to cloud computing.
04:50
What we gonna do now it's briefly take a look at some of the advantages off cloud computing.
04:55
Now, when you think about one of the advantages is flexibility
04:59
bases ability to quickly meet your venison man. Opposite is an important reason why a lot of organizations have made a decision to move toward a cloud.
05:09
Then we look at his *** recovery. When a company start relying on cloud based services, they don't longer need complex disaster recovery plans. Cloud computing providers take care of most issues
05:20
and do it much faster.
05:23
Then we have another event is called automatic software updates. Then we have what we call capital expenditure fee
05:30
cloud computing services typically pay as you go, so there's no need for capital expenditure at all. And because clock but is much more faster. Deploy binges have minimum project, start up costs and predictable ongoing operating expenses. Are computer increasing collaboration by allowing all implores
05:48
where they are to sync up and work on documents and share app simultaneously.
05:55
Then they're able to work from anywhere. As long as employees have Internet access, they can work from anywhere this flexibility possibly affect knowledge workers
06:04
in terms of work, balanced life and productivity. One study found that 42% of working adults will give up some of their salary if they could telecommute, and on average they would take about 6% pay cut,
06:19
turn after two door cloud storage is like local storage. A bunch of disk drives or S S DS sometime connected that store data hire a cloud. Storage is in the cloud, not on premises, and instead of deploying and manu stores, you just consume it.
06:38
Think of it as storage as a service.
06:41
Benefits include reduce administrative overhead, reduced costs. The downside are that you lose control of the hardware and much of the configuration Often you can't choose how the data store or house encrypted. You essentially give a lot of control where you actually move toward the cloud.
06:59
Let's take a look at some of different types of Cloud service models. You have the traditional
07:03
enlisted here.
07:04
As you can see here, you match everything from a traditional perspective.
07:10
Then we go to infrastructure as a service. As you can see here, you manage the applications that data, the runtime, the middleware and so forth. The vendor managed everything that below this listed in red.
07:21
Then we come to platform as a service. Here
07:25
you only manage the application in the data. Everything else is matched by a vendor.
07:30
However, when you move to software the service,
07:33
everything is matched by the vendor. Essentially, you don't manage anything. Everything managed essentially by the vendor.
07:43
This raises to our key takeaways from this particular video presentation.
07:46
Doing this critical presentation, we learned that the tight one hyper visor runs directly on the system. Heart war, A bare metal embedded hyper visor.
07:56
We learned a Type two hyper visor runs on the host operating system that provides virtualization services such as input output device could support and memory management.
08:07
We learned that Artie Continuity or information technology continuity is in fact a holistic approach to imagine technology system in event of a major disruption.
08:16
A hyper buys is welcome. Chose and allocate what point in the hardware resource is. Each operates is once you get in order for everyone to get what they need and not disrupt each other
08:28
really. Under that virtual plants a software application residing and operating in a pre configure Bertrand via mental platform, virtual appliances are access remotely by users and do not require local install hardware.
08:43
Some additional
08:45
key takeaways. We learned that virtualization is changing the minds from physical too logical.
08:50
We learned that Virtual Jason means creating mawr. Logical I T Resource is called Virtual systems within one physical system that's called system virtualization.
09:01
In our upcoming video, we're taking a look again in terms of continuing our discussion off 3.7, which deal specific with summarize cloud and virtualization concepts. And again, I look forward to seeing you in a very next video
Up Next
CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By