principles of virtualization virtualization computer networks virtual virtual machine cyber space cyber security server hypervisor vmware database host operating system iaas paas saas cloud computing cloud host client relational model tcp three way handshaking model udp tcp arp frame application cyber attacks network guest vm host vm mac sublayer ipv6 wireless ipv4 internet protocol (ip) transport layer protocol network layer protocol transport layer network layer wireless technologies wep wpa 802.1x 802.11 standards infrastructure mode infrastructure wireless access point ad-hoc mode netstat nslookup tracert ping ipconfig troubleshooting internet internet network utilities troubleshooting network hyper text transfer protocol file transfer protocol talnet dynamic host configuration protoco sftp tftp ftp https http dns dhcp application layer protocol application layer igmp icmp domain workstation man lan types of network c & c server command and control server botnet detection technique botnet life cycle bot computer social botnet social network botnet defensive cyber space operation offensive cyber space operation cyber space operations trojan horse worms virus denial-of-service attack cross-site scripting injection attacks states for cyber crime safety tips for cyber security cyber security in society cyber class-full-addressing scheme reverse address resolution protocol address resolution protocol point-to-point protocol ppp standard ethernet ethernet csu/dsu modem gateway bridges routers switches hub repeaters network interface cards working principle of nic computer network devices tcp/ip model osi model unguided media guided media transmission media ring topology star topology cloud service models characteristics of cloud aggregation specialization generalization mapping constraints characteristics of relational model relationship model database design er diagram er-model keys attributes entity set entity types entity classification of dbms distributed database client-server architecture network model hierarchical model database models three level architecture dbms database management system database properties authentication integrity confidentiality asset management assets vulnerability treats secure system development life cycle it security security principles principles of information security cia triad cia model information security saas and iaas models security considerations for paas common threats in virtualization common threats in clouds mitigation measures in cloud security challenges in cloud hypervisor and host/platform security virtualization security concerns cloud deployment models underlying technology pieces from which cloud comp using virtualization to form clouds cloud and virtualization hard disk virtualization hardware virtualization bios configure and manage virtualization on different p vitalization vmware infrastructure backup and recovery backup disaster recovery uses of virtualization consideration for server consolidation types of server consolidation need of server consolidation benefits of server consolidation guest operating system server consolidation storage input output desktop virtualization storage virtualization application virtualization network virtualization server virtualization types of virtualization benefits of virtualization nbstat data hierarchy data citrix xendesktop fundamentals hyper - v desktop virtual machine snapshot virtual networking hyper - v role hyper - v esxi server hyper-v type 2 hyper-visor type 1 hyperviosr vsphere client vcenter server esxi vsphere remote desktop web access azure remoteapp azure published virtualized application remote desktop remote application streaming application virtualization remote application virtualization virtualization application virtual hard disk topology
Ver más