vSphere 7: Implementing vSphere Security Best Practices
This course will teach you the best practices for securing your VMware vSphere infrastructure, including hosts, vCenter, and virtual machines.
What you'll learn
The VMware Certified Professional (or VCP) is one of the most popular virtualization certifications in the world. In this course, vSphere 7: Implementing vSphere Security Best Practices, you'll gain valuable VMware vSphere administration knowledge to help you prepare for the new vSphere 7 VCP exam. First, you’ll learn the best practices for securing a vSphere infrastructure, including securing ESXi, vCenter Server, and vSphere virtual machines. Next, you’ll discover how to implement vSphere Certificate Manager, enable SSO and Active Directory integration, and configure and administer role-based access control. Finally, you'll explore how to utilize host profiles to ensure consistent security across your vSphere infrastructure. By the end of this course, you'll have the necessary knowledge of vSphere Security best practices needed to keep your vSphere infrastructure secure.
Table of contents
- Introduction 1m
- Differentiate Available Authentication Methods with VMware vCenter 3m
- Adding an ESXi Host to a Directory Service 3m
- Understanding vSphere Identity Federation 5m
- Configure/Manage Active Directory Authentication 3m
- Understanding vSphere Single Sign-on (SSO) 2m
- Enable/Disable Single Sign-on (SSO) Users 4m
- Logging in to vSphere with Windows Session Credentials 3m
- Configuring Single Sign-on (SSO) Policies 2m
- Enabling vSphere Enhanced Linked Mode 2m
- What This Module Covered 2m
- Introduction 2m
- Compare and Contrast Default System/Sample Roles 3m
- Determine How Permissions Are Applied and Inherited in vCenter Server 5m
- View and Sort User and Group Lists 4m
- Create/Clone/Edit vCenter Server Roles 4m
- Add/Modify/Remove Permissions for Users and Groups on vCenter Server Inventory Objects 2m
- Apply a Role to a User/Group and to an Object or Group of Objects 4m
- Compare and Contrast Propagated and Explicit Permission Assignments 3m
- Determine the Appropriate Set of Privileges for Common Tasks in vCenter Server 3m
- What This Module Covered 1m
- Introduction 2m
- Control Access to Hosts 6m
- Enable/Configure/Disable Services in the ESXi Firewall 4m
- Configure a Custom ESXi Firewall Rule 5m
- Enable Lockdown Mode 5m
- Securing SSH and ESXi Shell 6m
- Password Security and Account Lockout 3m
- Understanding Secure Boot for ESXi 4m
- Securing ESXi with Trusted Platform Module (TPM) 3m
- Understanding vSphere Trust Authority 3m
- What This Module Covered 2m
- Introduction 2m
- Understanding Host Profiles 4m
- Create/Edit/Remove a Host Profile from an ESXi Host 3m
- Attach and Apply a Host Profile to ESXi Hosts in a Cluster 4m
- Perform Compliance Scanning and Remediation of ESXi Hosts and Clusters 2m
- Customizing Host Profiles 4m
- Scheduling Compliance Checks 1m
- Import/Export a Host Profile 1m
- What This Module Covered 2m