MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

VMware vSphere Security Design: Architecture

Course Summary

Part 2 of 3 in the VMware vSphere Security Design series focuses on designing and building a secure VMware environment. The goal of this course is to take you beyond basic implementation, configuration, and administration of VMware vSphere and teach you t

  • +

    Course Syllabus

    ● ESX and ESXi Security Architecture
        ◦ Introduction
        ◦ Why is ESXi More Secure Than ESX Classic - or is It?
        ◦ The Virtualization Layer, Network Layer, and VM Layer
        ◦ Securing the Service Console / Management Interface
        ◦ What We Covered
    ● Controlling Access to Storage
        ◦ Common Security for All Protocols
        ◦ Fiber Channel: Zoning and LUN Masking
        ◦ iSCSI: CHAP and LUN Masking
        ◦ NFS (Network File System)
        ◦ What We Covered
    ● Hardening ESX and ESXi Host Systems
        ◦ ESX Hardening - User and Group Configuration
        ◦ Sudo
        ◦ Customize SSH
        ◦ Secure ESX Web Proxy
        ◦ Configuring Password Policies
        ◦ Configure the ESX Firewall
        ◦ ESXi Hardening - Enabling ESXi Lockdown Mode
        ◦ Tech Support and Remote Tech Support Configuration
        ◦ Isolating the ESX/ESXi and vCenter Management Networks
        ◦ Enabling Certificate Checking in vCenter
        ◦ Configuring CA Signed Certificates
        ◦ Configure SSL Timeouts
        ◦ What We Covered
    ● Virtual Machine Security Architecture
        ◦ Introduction
        ◦ Virtual Machine Isolation
        ◦ Virtualization Security Enablers
        ◦ Virtualization Security Challenges
        ◦ Operating System Security Best Practices
        ◦ What We Covered
    ● Hardening Virtual Machines - Best Practices
        ◦ Use a Firewall or Access Control Lists
        ◦ Use an Antivirus Solution
        ◦ Use VMware Update Manager
        ◦ Limit Who Has Console Access
        ◦ Do Not Use the VMCI if Possible
        ◦ Isolate VMotion and/or FT Networks
        ◦ Use vCenter Roles
        ◦ Use Virtual Machine Log Rotation
        ◦ Turn off or Disable Unneeded Services
        ◦ Turn on Auditing and/or Logging
        ◦ What We Covered


Course Fee:
USD 29

Course Type:


Course Status:



1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top