From the course: IT Security Foundations: Network Security
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Safeguarding cloud services
From the course: IT Security Foundations: Network Security
Safeguarding cloud services
- [Instructor] Cloud computing has become extremely popular in the past decade as it represents a flexible and dynamic option for provisioning resources. With cloud computing, an organization can access and manage data and applications from any host anywhere in the world. Even though cloud services are offsite, it's essential to monitor the environment. In this segment, we'll review best practices for virtualization and container security. Virtualization and containers are an extension of the network, and security vulnerabilities exist. Some of those include the elastic and flexible nature of virtualization. This actually is a benefit of virtualization, however, it makes it difficult to enforce policies. There is an increased attack surface. Cloud computing has become popular, but this can result in cloud and virtualization sprawl where instances of virtual machines and containers become unmanageable. There is a lack of visibility because, unlike locally hosted hardware and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.