VMware vSphere Security Design: Architecture
Part 2 of 3 in the VMware vSphere Security Design series focuses on designing and building a secure VMware environment.
What you'll learn
Part 2 of 3 in the VMware vSphere Security Design series focuses on designing and building a secure VMware environment. The goal of this course is to take you beyond basic implementation, configuration, and administration of VMware vSphere and teach you the skills needed to properly secure a vSphere environment. You’ll learn information security and risk management concepts, how virtualization affects security, guidelines and best practices for securing a virtual environment, and securing virtual machines. This course is recommended for those who have existing VMware vSphere knowledge who want to enhance their security knowledge.
Table of contents
- ESX Hardening - User and Group Configuration 7m
- Sudo 6m
- Customize SSH 4m
- Secure ESX Web Proxy 2m
- Configuring Password Policies 6m
- Configure the ESX Firewall 4m
- ESXi Hardening - Enabling ESXi Lockdown Mode 7m
- Tech Support and Remote Tech Support Configuration 5m
- Isolating the ESX/ESXi and vCenter Management Networks 1m
- Enabling Certificate Checking in vCenter 3m
- Configuring CA Signed Certificates 12m
- Configure SSL Timeouts 1m
- What We Covered 1m
- Use a Firewall or Access Control Lists 1m
- Use an Antivirus Solution 1m
- Use VMware Update Manager 5m
- Limit Who Has Console Access 9m
- Do Not Use the VMCI if Possible 2m
- Isolate VMotion and/or FT Networks 1m
- Use vCenter Roles 1m
- Use Virtual Machine Log Rotation 5m
- Turn off or Disable Unneeded Services 1m
- Turn on Auditing and/or Logging 1m
- What We Covered 2m