Skill
Protecting Virtualized Systems and BCDR
March 2022 with Bob Salmans
- Intermediate
- 7 videos
- 1 hr 14 mins
Join Bob Salmans as he takes a look at some ways that we can protect our virtualized systems.
He also examines the use of identification, authentication, and authorization, as well as business continuity and disaster recovery (BCDR) concepts such as business goals, planning, and testing.
He also examines the use of identification, authentication, and authorization, as well as business continuity and disaster recovery (BCDR) concepts such as business goals, planning, and testing.
Recommended Experience
- None
- None
- (ISC)2 CISSP® 2018
- Security consultant
- Security analyst
- Security manager
- Security systems engineer
- Chief information security officer
- Security auditor
- Security architect
- Network architect