Video Description

This lesson focuses on the need for security over the virtualized environment. Virtualization allows logic isolation on multi-tenant servers and may also allow attackers to target relevant components in order to access resources. Virtualization is the very core of cloud computing and its security relies upon the security of the Hypervisor. There are two types of hypervisors: • Type I: run directly on the hardware with VM resources and significantly reduce attack surface. • Type II: runs on a host OS and is at a greater risk for vulnerabilities.

Course Modules

ISC2 Certified Cloud Security Professional (CCSP)