VMware vSphere Security Design: Advanced Security
Part 3 of 3 in the VMware vSphere Security Design series focuses on advanced security concepts in VMware virtualization.
What you'll learn
Part 3 of 3 in the VMware vSphere Security Design series focuses on advanced security concepts in VMware virtualization. The goal of this course is to take you beyond basic implementation, configuration, and administration of VMware vSphere and teach you the skills needed to properly secure a vSphere environment. You’ll learn information security and risk management concepts, how virtualization affects security, guidelines and best practices for securing a virtual environment, and securing virtual machines. This course is recommended for those who have existing VMware vSphere knowledge who want to enhance their security knowledge.
Table of contents
- Introduction 2m
- Monitoring Log Files for Security 6m
- Where vSphere Stores Local Log Files 2m
- Using Syslog for Logging Repository 2m
- How to Monitor and Retain Log Files for Auditing Purposes 14m
- Using vCenter Alarms for Security Monitoring 6m
- Monitoring vSphere Configuration Files 6m
- Aggregating Log Files - A Demo of Splunk 13m
- What We Covered 3m
- Introduction 2m
- An Overview of the vShield Suite 3m
- Centralized Management of the vShield Suite Using vShield Manager 1m
- Protecting Virtual Machines with vShield Zones 2m
- How vShield Zones Does Traffic Analysis 4m
- Configuring vShield Zones Firewall Policies 2m
- Enhancements Provided by vShield App 3m
- Deploy the vShield Manager 8m
- Deploy Agent VMs 9m
- Moving VMs Between Protected and Unprotected Hosts 10m
- Using vShield Edge to Provide Multi-tenancy Security 2m
- Deploying the vShield Suite for Maximum Benefit 2m
- What We Covered 3m
- Introduction 2m
- What is vShield Endpoint? 3m
- An Overview of Trend Micro's Deep Security 3m
- Pros and Cons 4m
- Deployment Steps 3m
- Deploy Endpoint 4m
- Install Deep Security Manager 4m
- Prepare the vSphere Host and Deploy an Agent VM 13m
- Install Drivers on the Guest and Activate the Guest to Be Managed 7m
- Configure Anti-malware and Intrusion Prevention Functionality 8m
- Where/When Would I Use Deep Security? 4m
- Introduction 2m
- What is Compliance 3m
- How Do We Do Compliance? 3m
- Why is Compliance Important? 4m
- Tools for Managing Compliance 3m
- About VMware Configuration Manager 4m
- Compliance Checker for vSphere and PCI Compliance Checker 2m
- Installing and Running Free Compliance Checking Tools 7m
- What We Covered 3m