Detailed course outline
Module 1: Course Introduction
- Introductions and course logistics
- Online resources for security and compli
Module 2: Security in a Virtual Environment
- Review of information security and risk management concepts
- How virtualization affects security and compliance
- Top vulnerabilities in a virtual environme
- Basic guidelines for securing a virtual environment
- Security tools and technologies
Module 3: Secure Virtual Networking
- vNetwork security architecture
- Network segmentation and traffic isolatio
- Secure virtual network configuration
- Traffic isolation with private VLANs
Module 4: Protecting the Management
Environment
- vCenter Server authentication, authoriza and accounting
- Working with SSL certificates
- Hardening the vCenter Server system
Module 5: Protecting VMware ESX/ESXi Host
Systems
- ESX and ESXi security architecture
- Controlling access to storage
- Hardening ESX and ESXi hosts
Module 6: Hardening Virtual Machines
- Virtual machine security architecture
- Configuring security parameters
Module 7: Configuration and Change
Management
- Configuration and change management goals and guidelines
- Maintaining the proper configuration of vSphere components
- Monitoring logs for security-related events
- Configuration and change management tools and technologies
Social Media
Live Contact