VMware vSphere 4: Manage and Design for Security
Starting dates and places
Description
Prerequisites:
Completion of one of the following courses:* VMware vSphere 4: Install, Configure & Manage (VSICM)
* VMware vSphere 4: What's New (VMWN)
* VMware vSphere 4: Fast Track (VSFT)
Course Description:
This course shows you how to follow best practices for secure design, deployment, and operation of a VMware vSphere™ environment. Through lecture, discussion, and hands-on practice, you will gain the knowledge and skills necessary to meet the security and compliance goals of your organization.
After completing this course, you should be able to:
- Identify vulnerabilities in the current design of a vSphere environment and recommend corrective actions
- Harden vSphere components as described i…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
Completion of one of the following courses:* VMware vSphere 4: Install, Configure & Manage (VSICM)
* VMware vSphere 4: What's New (VMWN)
* VMware vSphere 4: Fast Track (VSFT)
Course Description:
This course shows you how to follow best practices for secure design, deployment, and operation of a VMware vSphere™ environment. Through lecture, discussion, and hands-on practice, you will gain the knowledge and skills necessary to meet the security and compliance goals of your organization.
After completing this course, you should be able to:
- Identify vulnerabilities in the current design of a vSphere environment and recommend corrective actions
- Harden vSphere components as described in vSphere Hardening Guide
- Recommend configuration and change management policies, processes, and systems
This course includes the following modules:
Course Introduction
- Introductions and course logistics
- Online resources for security and compliance
Security in a Virtual Environment
- Review of information security and risk management concepts
- How virtualization affects security and compliance
- Top vulnerabilities in a virtual environment
- Basic guidelines for securing a virtual environment
- Security tools and technologies
Secure Virtual Networking
- vNetwork security architecture
- Network segmentation and traffic isolation
- Secure virtual network configuration
- Traffic isolation with private VLANs
Protecting the Management Environment
- vCenter Server authentication, authorization, and accountingWorking with SSL certificates
- Hardening the vCenter Server system
Protecting VMware ESX/ESXi Host Systems
- ESX and ESXi security architecture
- Controlling access to storage
- Hardening ESX and ESXi hosts
Hardening Virtual Machines
- Virtual machine security architecture
- Configuring security parameters
Configuration and Change Management
- Configuration and change management goals and guidelines
- Maintaining the proper configuration of vSphere components
- Monitoring logs for security-related events
- Configuration and change management tools and technologies
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.