Virtualization Security – Advanced VMware
Earn a diploma in cybersecurity and use ESX networking and penetration testing to secure a VMware virtual environment and the integrity of data in the cloud.
?Virtualization Security – Advanced VMware? is an online course from Alison that analyses ESX networking and the components of the virtual machine in addition to the penetration testing of the virtual environment. Protecting and providing security to operating systems is vital. Here is your chance to learn about the prevention of common attack vectors, the methods of hardening the ESX server and the virtual centre server. Enrol today!
What You Will Learn In This Free Course
Primer and Reaffirming Our Knowledge
This module discusses the components of the ESX network as well as the applications of various ports and VLANs in VMWare infrastructure. This module also analysis the concept of encryption, Linux as the base operating system for VMWare, and password file management in Linux.
Routing and the Security Design of VMware
This module analyses the ways to manipulate traffic routes between VMWare on the ESX hosts and the generic method the VMWare ESX Server uses to virtualize hardware components. This module also explains RAM allocation and memory virtualization in addition to the elements of the VMWare virtual center.
Remote DataStore Security
This module analyses the Environment and Addressing of the ESX/ESXi in addition to the Fibre Channel SAN. This module also discusses the basic attacks and securing of the fibre channel as well as the comparison of the iSCSI to the fibre channel. LUN masking and zoning along with IPSec implementation will also be covered.
Penetration Testing 101
This module outlines the benefits of a penetration test, the cost of a hack as well as the currents issues, and evolving threats in our networks. This module also discusses the methodology and types of penetration testing in addition to VMWare issues.
Information Gathering, Scanning and Enumeration
This module analyses the methods of obtaining information along with the various websites used for security queries and the concept of port scanning. This module explains the overview of enumeration in addition to various types of NMAP scans and attack tools.
Penetration Testing and the Tools of the Trade
This module outlines the vulnerabilities in the network services and types of vulnerability scanners in addition to the password cracking techniques. This module discusses the applications and modules of VASTO as well as ARP cache poisoning.
DMZ Virtualization and Common Attack Vectors
This module explains the DMZ virtualization, common attack vectors, fake certificate injection as well as vulnerability requirements. This module discusses the timeline, identification, vulnerabilities, and server log-in discussed in schmoo con 2010.
Hardening Your ESX Server
This module explains the methods of securing virtual machines, file permission, and configuring the service console in ESX. this module also discusses the configuration of the ESX/Linux user authentication as well as SNMP configuration, proper file logging, and root privileges.
ESXi Server and vCenter Server Hardening
This module describes the procedures to harden an ESXi server and the security measures in setting up a virtual center. This module also discusses the VMware converter enterprise and guided consolidation in addition to the 3rd Party Mitigation Tools.
Course assessment