vSphere 8: Implementing vSphere Security Best Practices
This course teaches the best practices for securing a vSphere infrastructure, including securing ESXi, vCenter Server, and vSphere virtual machines. You’ll also learn how to implement vSphere Certificate Manager, utilize host profiles, and more.
What you'll learn
The VMware Certified Professional (or VCP) is one of the most popular virtualization certifications in the world. In this course, vSphere 8: Implementing vSphere Security Best Practices, you'll gain real-world VMware vSphere security knowledge and valuable insight to help you prepare for the VCP exam. First, you’ll learn the best practices for securing a vSphere infrastructure, including securing ESXi, vCenter Server, and vSphere virtual machines. Next, you’ll discover how to implement vSphere Certificate Manager, enable SSO and Active Directory integration, and configure and administer role-based access control. Finally, you'll explore how to utilize host profiles to ensure consistent security across your vSphere infrastructure. By the end of this course, you'll have the necessary knowledge of vSphere Security best practices needed to keep your vSphere infrastructure secure.
Table of contents
- Introduction 1m
- Differentiate Available Authentication Methods with VMware vCenter 4m
- Adding an ESXi Host to a Directory Service 3m
- Understanding vSphere Identity Federation 4m
- Configure/Manage Active Directory Authentication 2m
- Understanding vSphere Single Sign-on (SSO) 2m
- Enable/Disable Single Sign-on (SSO) Users 4m
- Logging in to vSphere with Windows Session Credentials 3m
- Configuring Single Sign-on (SSO) Policies 2m
- Enabling vCenter Enhanced Linked Mode 2m
- What This Module Covered 2m
- Introduction 2m
- Compare and Contrast Default System/Sample Roles 4m
- Determine How Permissions are Applied and Inherited in vCenter Server 5m
- View and Sort User and Group Lists 4m
- Create/Clone/Edit vCenter Server Roles 4m
- Add/Modify/Remove Permissions for Users and Groups on vCenter Server Inventory Objects 2m
- Apply a Role to a User/Group and to an Object or Group of Objects 5m
- Compare and Contrast Propagated and Explicit Permission Assignments 3m
- Determine the Appropriate Set of Privileges for Common Tasks in vCenter Server 3m
- What This Module Covered 1m
- Introduction 2m
- Control Access to Hosts 6m
- Enable/Configure/Disable Services in the ESXi Firewall 5m
- Configure a Custom ESXi Firewall Rule 6m
- Enable Lockdown Mode 5m
- Securing SSH and ESXi Shell 8m
- Password Security and Account Lockout 3m
- Understanding Secure Boot for ESXi 4m
- Securing ESXi with Trusted Platform Module (TPM) 2m
- Understanding vSphere Trust Authority 3m
- What This Module Covered 2m
- Introduction 2m
- Understanding Host Profiles 4m
- Create/Edit/Remove a Host Profile from an ESXi Host 3m
- Attach and Apply a Host Profile to ESXi Hosts in a Cluster 2m
- Perform Compliance Scanning and Remediation of ESXi Hosts and Clusters 5m
- Customizing Host Profiles 2m
- Scheduling Compliance Checks 2m
- Import and Export a Host Profile 2m
- What This Module Covered 2m