Close
COURSE LIST / COURSE BY TECHNOLOGY VENDORS / VMWARE

VMware vSphere: Security [V8] – On Demand

Course Summary:

This course, equivalent to 2 days of training, is designed to provide IT professionals with the knowledge and skills necessary to secure their vSphere environment. Through a mix of lecture and hands-on labs, you will learn how to secure your virtual infrastructure, while learning the architecture of vSphere security and the role of vSphere components in securing your environment.

Course Duration: 30 Days


Course Content:

1 Course Introduction

  • Introductions and course logistics
  • Course objective

2 General Security Awareness

  • Identify the security recommendations for vCenter
  • Recognize strategies for securing the vSphere management network
  • Identify the security recommendations for ESXi hosts
  • Explain the importance of the vSphere Security Configuration Guide
  • Explain the importance of VMware Security Advisories

3 Securing ESXi

  • Explain how to navigate the Direct Console User Interface to configure an ESXi host
  • Demonstrate how to configure the ESXi host settings
  • Describe how UEFI Secure Boot functions in ESXi hosts
  • Demonstrate how to configure the ESXi firewall
  • Explain how to configure directory services to authenticate user logins

4 Securing VMs

  • Identify the role of vTPM and VBS for securing VMs
  • Describe the process of activating encrypted vSphere vMotion

5 vSphere Authentication

  • Recognize the identity sources on your vCenter
  • Define the term permission in the context of vCenter
  • Identify the services used for vCenter Single Sign-On
  • Identify methods for two-factor authentication on vCenter
  • Configure identity federation

6 vSphere Certificate Authority

  • Describe how to replace vCenter certificates in vSphere Certificate Manager
  • Explain how the vSphere Client manages ESXi certificates
  • Identify common certificate-related issues in vCenter
  • Troubleshoot certificate-related issues in vCenter

7 VM Encryption

  • Describe the components of a VM encryption architecture
  • Explain the process of managing encrypted VMs
  • List VM encryption events and alarms

8 Key Provides and the vSphere Trust Authority

  • Recognize the role of the Key Provider in vCenter
  • Describe vSphere Trust Authority
  • List the use cases of vSphere Trust Authority
  • Configure vSphere Trust Authority