Course: VMWare Certified Virtualization Security Expert (CVSE)
duration: 24 hours |
Language: English (US) |
access duration: 180 days |
Details
This VMWare Certified Virtualization Security Expert training starts with viewing virtual components, ESX network components, switches, vswitch and physical switch. You will then learn more about managing a virtual network, encryption and certificates and ending with the Linux file system.
Further in this training you will see through the eyes of a
hacker traffic routines, how you manipulate or inspect and change
this. You will finally get to work with the security functions of
iSCSI, authentication and the steps you need to follow to secure
your network.
You also learn more about
penetration testing, how much hacks cost, evolving threats,
information gathering, scanning, counting and finishing with tools
that hackers use and that you can use to collect
information.
This training is also about the
hardening techniques of the ESX server. It deals with best
practices, isolation and how templates are used effectively. It
also includes VM segmentation, data flow limitation, the risk of
set info, directory access for access to services, and
logging.
Result
You know how to secure vSphere and Private Cloud infrastructures. You also know how to implement Endpoint security and how to use vCloud network and security functions effectively.
Prerequisites
You preferably have experience in IT Security, comparable knowledge as the CompTIA Network + certification, Linux and Cloud knowledge.
Target audience
System Administrator, Network Administrator, Security Specialist
Content
VMWare Certified Virtualization Security Expert (CVSE)
Certified Virtualization Security Expert, Part 1 of 6: Reaffirming Knowledge
This course will start by taking a look at virtual components, ESX networking components, switches, vswitch and physical switch. It will then discuss spanning tree protool, vswitch isolation, virtual ports, vlans, load balancing, failover configuration, managing a virtual network, encryption and certificates and finish up with the Linux file system.
Certified Virtualization Security Expert, Part 2 of 6: Routing and Security
This course takes a look at how traffic routs and from the perspective of the hacker and how to manipulate or inspect and change it. It then moves into VM's and ESX hosts on both the same switches or port groups. Then SAN security with both fiber channel and iSCSI, and zoning. It will finish up with Security features of iSCSI, authentication and the steps in securing it.
Certified Virtualization Security Expert, Part 3 of 6: Penetration Testing 101
To be secure you have to think like a hacker. This course covers penetration testing, how much hacks cost, evolving threats, information gathering, scanning, enumeration and finishes with tools that hackers and you can utilize to gather information.
Certified Virtualization Security Expert, Part 4 of 6: PenTest Tools and DMZ
What are the tools of a penetration test? This course will answer that as well as cover vulnerability assessment, password cracking, how to disable auditing, rootkits and alternate data streams. Then it progress to three configurations of DMZs, hardening and isolating, layer 2 security options and separation of duties. Finally threats like SSL renegotiation and web access vulnerabilities will round out the course.
Certified Virtualization Security Expert, Part 5 of 6: Hardening the Server
This course is about the hardening techniques of the ESX server. It will cover best practices, isolation, and how templates can be used effectively. It will also cover VM segmentation, limiting data flow, the setinfo hazard, directory services control access and maintaining logs.
Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools
This course finishes out the series by taking a look at the differences between ESX and ESXi. It discusses Root privileges, controlled access, and securing SNMP configuration. This course discusses how to audit or disable tech support mode and provides an overview of third party security players as add-ons such as: Catbird, Altor, HyTrust, Reflex and Tripwire.
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.
Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.
FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.