MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

VMware vSphere Security Design: Security Basics

Course Summary

Part 1 of 3 in the VMware vSphere Security Design series focuses on the essential security concepts in VMware virtualization. The goal of this course is to take you beyond basic implementation, configuration, and administration of VMware vSphere and teach

  • +

    Course Syllabus

    ● Getting Started with VMware vSphere Security Design Training
        ◦ Introduction
        ◦ Why vSphere Security is Critical Knowledge
        ◦ What You Will Learn in This Course
        ◦ Lab Setup
        ◦ What We Covered
    ● About Your Instructors
        ◦ About Jason Nash
        ◦ About Lane Leverett
    ● Introduction to Information Security Concepts
        ◦ Introduction
        ◦ The Many Layers of Security in a Virtual Environment
        ◦ The Fundamentals: A Security Primer
        ◦ AAA Authentication, Authorization, and Accounting
        ◦ Standard Terminology
        ◦ CIA: Confidentiality, Integrity, and Availability
        ◦ The Different Shapes and Sizes of Potential Attackers
        ◦ The Steps of an Attempted Attack
        ◦ The Process for Developing and Maintaining Good Security
        ◦ Security Tools
        ◦ What We Covered
    ● Security Priorities in a Virtual Environment
        ◦ Introduction
        ◦ Is Virtualization Secure?
        ◦ Is The Hypervisor a Security Weakness?
        ◦ Encapsulation
        ◦ Common Worries About virtualization Security
        ◦ Types of Security Threats
        ◦ Impact of Virtualization of Security
        ◦ What is VMware Doing About Security?
        ◦ Regular Tasks a Good Admin Should Perform
        ◦ What We Covered
    ● Security Technologies
        ◦ What Do I Need to Protect What?
        ◦ Pairing Assets to Security Technology
        ◦ vSphere Authentication
        ◦ Who Has Access to Your Environment?
        ◦ Creating Local VSphere Users
        ◦ VSphere Host Authentication
        ◦ Integration with Active Directory
        ◦ The VI Firewall
        ◦ Integrating Security in with the Hypervisor by Using VMsafe
        ◦ Using vShield to Secure Application and Guests
        ◦ Keeping Hosts and Guests Updated with Update Manager
        ◦ What We Covered
    ● vNetwork Security Architecture
        ◦ Introduction
        ◦ Deployment Types for Different Trust Zones
        ◦ Partially Collapsed with Separate Physical Trust Zones
        ◦ Partially Collapsed with Separate Virtual Trust Zones
        ◦ Fully Collapsed Trust Zones
        ◦ Top 10 Common Mistakes and Recommendations
        ◦ Security Considerations with the Standard vSphere vSwitch
        ◦ Security Considerations with the vSphere vdSwitch
        ◦ Layering Additional Functionally with the Cisco Nexus 1000v
        ◦ Protecting Your Management Communications
        ◦ Isolating Management
        ◦ What We Covered
    ● Securing vNetwork Configuration
        ◦ Introduction
        ◦ Security Considerations in Your vNetwork Design
        ◦ Configuring the vNetwork for Different Trust Zones
        ◦ Implementing VLANs and Network Separation
        ◦ Using and Configuring Private VLANs (PVLANS)
        ◦ vSwitch Security Configuration
        ◦ Using and Configuring the vSphere dvSwitch
        ◦ Overview of the Cisco Nexus 1000v Distributed Switch
        ◦ Deploy and Configure of the Cisco Nexus 1000v Distributed Switch
        ◦ Configure Physical Ports and VM Port-Groups
        ◦ What We Covered
    ● Working with SSL Certificates
        ◦ Introduction
        ◦ An Overview on How SSL Works and Why We Use It
        ◦ How VMware Uses SSL
        ◦ Example of an SSL Negotiation
        ◦ Let's Talk About Digital Certificates
        ◦ Getting Rid of That Annoying SSL Warning in vCenter!
        ◦ Using Internal Versus Generating 'Real' Certificates
        ◦ Protect Your Certificates!
        ◦ Installing Your Own Certificates


Course Fee:
USD 29

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top