Implementing and Securing your Virtual Environment 4-Day Course
Lunarline offers the comprehensive and detailed hands-on training for students who want to gain an understanding of securing a VMWare vSphere/ ESXi©™ environment. Our training is based upon our experience in building and securing ESXi systems and virtual hosts for deployment in DOD enclaves based on current DIACAP and DISA STIG/ Checklist requirements. This course is focused on a series of hands-on activities that will provide active learning in the security and securing of virtual machines and hosts. Upon completion, students will be able to apply the concepts and ensure that their organization can implement a new, secure virtual environment or apply appropriate security controls to an existing virtual environment.
What you will learn:
- Virtualization Basis
- vSphere Concepts and Features
- Hypervisor Models
- Hypervisor Security
- Threat and Vulnerability Overview
- vSphere Security Features Overview
- Host Configuration Settings and Profiles
- vShield Edge
- vShield Endpoint
- vShield Data Security
- Lockdown Overview
- Lockdown Mode Behavior
- Enable and Disable Lockdown Mode
- Specifying Accounts with Access Privileges
- Assigning Permissions for ESXi
- Using Active Directory to Mange ESXi Users
- vSphere Authentication Proxy
- Smart Card Authentication
- Securing Network Storage
- Securing Virtual Network
- Security and Clustering
- vCenter Single Sign-On
- vSphere Permissions and User Management Tasks
- ESXi SSH keys
- vSphere Security Certificates vSphere ESXi 6.0 STIG
- vSpeher vCenter Server Version 6 STIG
- vSphere Virtual Machine Version 6 STIG
- vSphere 6.0 Hardening Guide Permissions on Server Inventory Objects
- Permission Inheritance
- Control MOB Access
- Platform Services Controller ESXi Host
- VCenter Server System
- Virtual Machine
- vSphere Networking
- Virtualization Host with pNIC Combinations
- Host Security Tools
Course includes the following takeaway items: a printed training book and a CD that includes reference materials pertaining to the course.
NICE Work Roles
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
Systems Requirements Planner
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
Information Systems Security Manager
Responsible for the cybersecurity of a program, organization, system, or enclave.
Cyber Defense Analyst
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Cyber Defense Infrastructure Support Specialist
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
- Module 1 – Overview of vSphere™ Security
- Module 2 – Overview of Security for ESXi™ Systems
- Module 3 – Lockdown Mode
- Module 4 – ESXi™ Authentication and User Management
- Module 5 – vCenter™ Server Authentication and User Management
- Module 6 – Encryption and Security Certificates
- Module 7 – Securing Virtual Machines
- Module 8 – Security vCenter™ Server Systems
- Module 9 – Best Practices for Virtual Machine and Host Security
No image gallery for this course as of yet.
No video for this course as of yet.