Virtualization Security – Advanced VMware

0
Certificate

Paid

Language

Level

Advanced

Access

Free

Last updated on December 23, 2024 3:05 am

Earn a diploma in cybersecurity and use ESX networking and penetration testing to secure a VMware virtual environment and the integrity of data in the cloud.

Add your review

?Virtualization Security – Advanced VMware? is an online course from Alison that analyses ESX networking and the components of the virtual machine in addition to the penetration testing of the virtual environment. Protecting and providing security to operating systems is vital. Here is your chance to learn about the prevention of common attack vectors, the methods of hardening the ESX server and the virtual centre server. Enrol today!

What You Will Learn In This Free Course

  • Outline the components and applicati…
  • Explain the VMware infrastructure…
  • Discuss the generic method the VMWar…
  • Describe the ESX/ESXi and fibre chan…
  • Outline the components and applications of the ESX network
  • Explain the VMware infrastructure
  • Discuss the generic method the VMWare ESX Server uses to virtualise hardware components
  • Describe the ESX/ESXi and fibre channel SAN environment and addressing
  • Explain the concept, benefits and methodology of penetration testing
  • List the methods of obtaining information and footprinting
  • Analyse the vulnerabilities of network services
  • Explain DMZ virtualisation and common attack vectors
  • Discuss the securing of virtual machines
  • Outline the ways to harden an ESXi server
  • Describe the security setup of the Virtual Center
  • Analyse the virtualisation of third party mitigation tools
  • Primer and Reaffirming Our Knowledge

    This module discusses the components of the ESX network as well as the applications of various ports and VLANs in VMWare infrastructure. This module also analysis the concept of encryption, Linux as the base operating system for VMWare, and password file management in Linux.

    Routing and the Security Design of VMware

    This module analyses the ways to manipulate traffic routes between VMWare on the ESX hosts and the generic method the VMWare ESX Server uses to virtualize hardware components. This module also explains RAM allocation and memory virtualization in addition to the elements of the VMWare virtual center.

    Remote DataStore Security

    This module analyses the Environment and Addressing of the ESX/ESXi in addition to the Fibre Channel SAN. This module also discusses the basic attacks and securing of the fibre channel as well as the comparison of the iSCSI to the fibre channel. LUN masking and zoning along with IPSec implementation will also be covered.

    Penetration Testing 101

    This module outlines the benefits of a penetration test, the cost of a hack as well as the currents issues, and evolving threats in our networks. This module also discusses the methodology and types of penetration testing in addition to VMWare issues.

    Information Gathering, Scanning and Enumeration

    This module analyses the methods of obtaining information along with the various websites used for security queries and the concept of port scanning. This module explains the overview of enumeration in addition to various types of NMAP scans and attack tools.

    Penetration Testing and the Tools of the Trade

    This module outlines the vulnerabilities in the network services and types of vulnerability scanners in addition to the password cracking techniques. This module discusses the applications and modules of VASTO as well as ARP cache poisoning.

    DMZ Virtualization and Common Attack Vectors

    This module explains the DMZ virtualization, common attack vectors, fake certificate injection as well as vulnerability requirements. This module discusses the timeline, identification, vulnerabilities, and server log-in discussed in schmoo con 2010.

    Hardening Your ESX Server

    This module explains the methods of securing virtual machines, file permission, and configuring the service console in ESX. this module also discusses the configuration of the ESX/Linux user authentication as well as SNMP configuration, proper file logging, and root privileges.

    ESXi Server and vCenter Server Hardening

    This module describes the procedures to harden an ESXi server and the security measures in setting up a virtual center. This module also discusses the VMware converter enterprise and guided consolidation in addition to the 3rd Party Mitigation Tools.

    Course assessment

    ×

      Your Email (required)

      Report this page
      Virtualization Security – Advanced VMware
      Virtualization Security – Advanced VMware
      LiveTalent.org
      Logo
      Skip to content