Time
56 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Virtualization In the previous lesson we explored the tools and strategies to prevent unauthorized removal or corporate hardware devices and how to secure the information they contain. In this lesson we defines what virtualization is, and we look at software tool called Hypervisor which help us build, operate and manage virtual machines. You'll observe a demonstration on what Hypervisor is and how it works, what types of server environments it supports and examples of Hypervisor tools currently on the market. [toggle_content title="Transcript"] coming soon... [/toggle_content]

Video Transcription

00:04
now we discussed the topic of actualization
00:06
with virtualization.
00:08
We use ah hyper visor built into our software into our computer to create virtual machines. Over here we have our host PC on on our host PC, we install a hyper visor,
00:23
which is just software that allows for the creation off virtual machines. So this represented the High Professor. The hyper visor is the software environment within which we build the virtual machines.
00:37
There are numerous hyper visors out there today. The hyper visor will share resources with your host PC Resource is like memory processor ports, et cetera. On the hyper visor,
00:51
we will then build
00:53
numerals, virtual machines.
00:56
This machine could be running windows seven.
00:59
These could be
01:02
over here. We could have se x b
01:06
windows Vista
01:07
window seven.
01:10
So the 37 4008
01:15
were born to
01:19
on duh. Say another Windows eight
01:22
right there on it is possible We were wrong. All these operating systems at the same time, provided we have sufficient memory processor on Duh
01:33
the hyper visor. There are numerous hyper visors are there on the market today.
01:38
If we put this here,
01:42
we have Microsoft virtual PC we have windows. Veg O P z. We have hyper V. We have some virtual books, also called Oracle Virtual Books. We have VM where we have V infusion. These are all
01:57
different types of hyper visors.
02:00
What we need to know for the exam is
02:02
the hyper visor is a software environment within which we build the virtual machines. The exam. There's not going to any detail about the specific hyper vices because this very based on your environment.
02:17
So the whole specie has the hyper visor installed on on the hyper visor. We build on install numerous virtual machines that will all run at the same time. This is different from multi booting in multi booting. You have multiple operating systems on the host PC.
02:37
However, you can only around one operating system at a time.
02:39
But with virtualization, it is possible that we run all machines at the same time, provided we have sufficient memory on reliable process that supports virtualization.
02:53
There are certain benefits derived from virtualization one it allows for maximum utilization of hardware. It also allows organizations save
03:05
coursed
03:07
Um,
03:07
rather than having to buy 12 machines. Organizations could just buy four machines on build the other eight machines as virtual missions within four machines. This way, you save cost in terms of infrastructure, you save course in terms of electricity. You save course even for space, in case you have to rent space.
03:27
Organizations could also save course from licensing issues being ableto build virtual applications on the server rather than having to pay for many licenses. You could just pay for a limited set off licenses on your users could log onto the machine used as they need on log off when they don't.
03:46
This is better than just keeping the software
03:47
registered with proper licenses on there. No well utilized.
03:53
So naturalization has come to stay on. This is what virtualization is all about. Were able to run
04:00
our computer in software with the
04:04
another computer.
04:05
So that is it for Section 4.2. Virtualization ends that topic on.
04:11
We've discussed section 4.3 in our next video

Up Next

Fundamental System Security

Commonly referred to as INFOSEC, refers to the processes and methodologies required to keep information confidential.

Instructed By

Instructor Profile Image
John Oyeleke
Lead IT Security Instructor
Instructor