Virtualization and Containers

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

9 hours 59 minutes
Video Transcription
welcome to domain. Eight. Virtual ization in containers.
A cornerstone of cloud is about pulling large quantities of physical resource is and allocating portions of those pools two different tenants for different purposes.
None of this pooling would be possible without abstracting. The physical resource is, and this is all done through virtual ization.
You'll notice this is a recurring thing, something we discussed in previous modules. But it's a fundamental concept, emphasized not just for the CCS K, not just for Sai Buri, but in all cloud technology circles.
You may feel some of the points in this module are reiterating concepts we discussed previously, or maybe discussing and future modules. This is a hint from the CCS A that it's important and something you really need to focus on four year exam
and this module will be examining the different virtual is ations a bit deeper and walking through categories of virtualization.
Then we'll revisit virtual, compute security and network security, reiterating important points from the last domain and adding a few new items.
Then we'll delve into virtual storage security and finish up looking at container. Security
for the remainder of this video will be focused on key principles to securing a virtualized environment and major virtual ization categories.
In the last module, we took a deep look at software defined networks under the hood. These type of networks are very different than a traditional network.
As a cloud user, you don't see this perspective. You build virtual networks with sub nets, and I p arranges following designs, much like the traditional networks.
The same goes for your virtual machines, storage devices and so forth.
These virtual assets are all created using traditional paradigms, but things are very different beneath the surface.
This simplifies a lot in terms of cloud adoption, but it adds layers to security controls that you need to consider.
First, you need to make sure the virtualization technology itself is secure. The cloud providers primarily responsible for this. But if we're talking private clouds or community clouds, it may fall more into your purview.
Secondly, you need to secure the virtual assets themselves, and this is often done using different methods. Case in Point Cloud customers don't use physical firewall devices, but they can take some very powerful measures using virtual firewalls and implementing these micro segmentation
for the exam. Remember that compute virtualization abstracts, the running of code, application code or even operating systems from the underlying hardware that is executing on
virtual networks. Route traffic amongst your cloud resource is such as compute and storage, storage and storage. Virtualization is key to managing. Large amounts of data containers are another form of compute, but the C S A outlines. This is a separate category of virtual ization.
This video was all about setting the stage for the remainder of this module. We covered key principles and securing virtualized assets and reviewed the four major categories of cloud virtual assets.
Up Next