Security Architecture Models

Welcome to the Security Architecture Models practice lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Virtualization and containerization are architecture models that are important to security. They provide efficient resource utilization, portability, rapid deployment, flexibility, and scalability.

In this module, you will install an Ubuntu virtual machine (VM) in the Hyper-V hypervisor and use Docker to create and manage containers in a command-line environment and Portainer to create and manage containers through a browser-based graphical user interface (GUI).

Overview

Learning Outcomes:

In this module, you will complete the following exercises:

  • Exercise 1 - Create a VM
  • Exercise 2 - Use Containers
  • Exercise 3 - Complete VM Deployment

After completing this module, you should be able to:

  • Create a VM in Hyper-V.
  • Launch Ubuntu installation.
  • Create and manage containers from a command-line interface (CLI).
  • Create and manage containers from a GUI.
  • Manually relaunch the Ubuntu VM.
  • Test the New VM.

Exam Objectives:

The following exam objectives are covered in this module:

2.5 Explain the purpose of mitigation techniques used to secure the enterprise

  • Segmentation

3.1 Compare and contrast security implications of different architecture models

  • Architecture and infrastructure concepts
  • Considerations