Computer Science Homework Help
MCCEMCC Fundamentals of Virtualization Essay
Virtualization creates a safe sandbox environment for you to experiment with the various security tools that will be utilized within the course in a safe manner. You will be able to describe the fundamentals of virtualization, compare and contrast the various virtualization architectures, enumerate and describe the various interfaces between the hypervisors, VMs, physical and virtual hardware, code execution and emulation, management tools, networking, storage, and external environments.
- Using GCU Virtualization Solution, located in the Course Materials, create an out of band Penetration Testing (PEN) environment that will include one attack platform and numerous target operating systems.
- Install and configure Vmware Workstation or Fusion on your desktop or laptop.
- Download a Kali VM. Refer to the Kali Linux website located in the Course Materials.
- Install Kali Linux in virtual environment.
- Select at least two vulnerable target operation systems from the Vulnhub website, located in the Course Materials (suggestions: OSs, Metasploitable 1, Metasploitable 2, Windows XP Service Pack 0, or Windows 7 Service Pack 0).
- All virtual machines should be configured on an isolated subnet (suggested subnet: 172.16.111.0/24)
- As you go, take instructional notes and screenshots to help reproduce your process.
In a 500- to 750-word essay, research virtualization technologies, including Type I and II architectures, the technical mechanisms by which virtualization is implemented in a variety of environments, and their implications for cyber operations. Examine the following virtualization technologies and resource control principles:
- Memory management and isolation.
- Virtual storage allocation.
- Association of physical hardware with virtual hardware and device emulation.
- Live migration and failover of physical systems to virtual environment.
- Benefit of creating virtual snapshots and clones.
- Interfaces both internal and external for managing, monitoring, and synchronizing virtual environments.
Document the installation process in the “Lab Report Template.” Include individual IP addresses and host names for each virtual machine.
https://lopes.idm.oclc.org/login?url=http://search..