MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

VMware vSphere Security Design: Advanced Security

Course Summary

Part 3 of 3 in the VMware vSphere Security Design series focuses on advanced security concepts in VMware virtualization. The goal of this course is to take you beyond basic implementation, configuration, and administration of VMware vSphere and teach you


  • +

    Course Syllabus

    ● Using Host Profiles to Standardize ESX/ESXi Configuration
        ◦ How Host Profiles Help Secure ESX/ESXi
        ◦ What is Supported with Host Profiles
        ◦ What is Not Supported with Host Profiles
        ◦ Create, Apply, and Check Compliance with a Host Profile
    ● Keeping Hosts and VMs Secure with Update Manager
        ◦ Using VMware Update Manager (VUM) to Help Secure ESX/ESXi and VMs
        ◦ Deployment Options for Update Manager
        ◦ What We Covered
    ● Understanding and Managing vSphere Logs
        ◦ Introduction
        ◦ Monitoring Log Files for Security
        ◦ Where vSphere Stores Local Log Files
        ◦ Using Syslog for Logging Repository
        ◦ How to Monitor and Retain Log Files for Auditing Purposes
        ◦ Using vCenter Alarms for Security Monitoring
        ◦ Monitoring vSphere Configuration Files
        ◦ Aggregating Log Files - A Demo of Splunk
        ◦ What We Covered
    ● vShield: Zones, App, and Edge
        ◦ Introduction
        ◦ An Overview of the vShield Suite
        ◦ Centralized Management of the vShield Suite Using vShield Manager
        ◦ Protecting Virtual Machines with vShield Zones
        ◦ How vShield Zones Does Traffic Analysis
        ◦ Configuring vShield Zones Firewall Policies
        ◦ Enhancements Provided by vShield App
        ◦ Deploy the vShield Manager
        ◦ Deploy Agent VMs
        ◦ Moving VMs Between Protected and Unprotected Hosts
        ◦ Using vShield Edge to Provide Multi-tenancy Security
        ◦ Deploying the vShield Suite for Maximum Benefit
        ◦ What We Covered
    ● vShield: Endpoint and Trend Micro Deep Security
        ◦ Introduction
        ◦ What is vShield Endpoint?
        ◦ An Overview of Trend Micro's Deep Security
        ◦ Pros and Cons
        ◦ Deployment Steps
        ◦ Deploy Endpoint
        ◦ Install Deep Security Manager
        ◦ Prepare the vSphere Host and Deploy an Agent VM
        ◦ Install Drivers on the Guest and Activate the Guest to Be Managed
        ◦ Configure Anti-malware and Intrusion Prevention Functionality
        ◦ Where/When Would I Use Deep Security?
    ● Hytrust Appliance
        ◦ An Overview of Hytrust
        ◦ Pros and Cons
        ◦ Hytrust Installation Demo
        ◦ Where/When Would I Use Hytrust
        ◦ What We Covered
    ● Compliance and vCenter Configuration Manager
        ◦ Introduction
        ◦ What is Compliance
        ◦ How Do We Do Compliance?
        ◦ Why is Compliance Important?
        ◦ Tools for Managing Compliance
        ◦ About VMware Configuration Manager
        ◦ Compliance Checker for vSphere and PCI Compliance Checker
        ◦ Installing and Running Free Compliance Checking Tools
        ◦ What We Covered
    ● Next Steps
        ◦ Introduction
        ◦ What is Your Next Step?
        ◦ We Value Your Opinion

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top