5 hours 31 minutes

Video Description

This lesson focuses on the need for security over the virtualized environment. Virtualization allows logic isolation on multi-tenant servers and may also allow attackers to target relevant components in order to access resources. Virtualization is the very core of cloud computing and its security relies upon the security of the Hypervisor. There are two types of hypervisors: • Type I: run directly on the hardware with VM resources and significantly reduce attack surface. • Type II: runs on a host OS and is at a greater risk for vulnerabilities.

Up Next

ISC2 Certified Cloud Security Professional (CCSP)

This online course will guide you through the contents of the CCSP certification exam. Obtaining your CCSP certification shows that you are a competent, knowledgeable, cloud security specialist who has hands-on experience in the field.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor