Employees of federal, state and local governments; and businesses working with the government.
VMware vSphere Install, Configure, Manage or equivalent knowledge. In lieu of hands-on classroom training, an in-depth knowledge of VMware’s ESX/ESXi virtualization environment is required. The intended audience is System Administrators and Security Administrators using virtualization software.
The Advanced VMware Security course provides a solid understanding of the various components that make up the vSphere environment. Students have the opportunity to study and understand all aspects of the CIA triad as it pertains to the vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. Students walk away with a solid understanding of how the adversary infiltrates the virtual environment and, most importantly, how to secure that environment. The course also includes the virtual components that VMware has developed in the vSphere product line, including the vCPU, vMemory, vNetwork, vStorage, ESXi host, virtual center, update manager and many other plug-ins, appliances and third-party mitigation tools.
Upon completion of this course, students will be able to assess the security posture of a vSphere 4.x and vSphere 5 architecture, and by extension, the services offered through and by that architecture, and reduce identified risks.
The course is very lab intensive, with close to 50% of the time dedicated to lab work. The labs cover everything from Availability, including Resource Pools and High Availability, to Integrity and Confidentiality on products like vShield, Trend Micro and Reflex. There are labs that deal with the network, storage, hardening of the host, vCenter and VMs! We cover over 25 fully vetted labs that are used by consultants in the field.
Don’t let your network fall victim to fraud or theft!
Chapter 1 Introduction and Methodology
Chapter 2 Design for Security
- Virtualization and The Cloud
- Design – Functional Administration Requirements
- Management Connections and Interfaces
- Design – Functional vSphere Feature Requirements
- High Availability
- Distributed Resource Scheduler
- Design Security Implications
- Security or Functionality
- Isolation, Isolation, Isolation
- Corporate Network
- Management Network
- Highly Classified Environments
- Design Examples
Chapter 3 Penetration Testing 101
- What is a Penetration Test?
- What does a Hack Cost You?
- Penetration Testing Methodologies
- Information Gathering
- Tools of the Trade
- Website Review – How to stay up to date!
- Hashing, Encryption and Certificates.
- Different Types of Exploits!
- Where do we start with vSphere?
Chapter 4 Security Architecture, vCPU, vMemory
- ESXi File Structure
- Log Files (HOL)
- ESXi and vCenter
- Security Architecture
- Virtual Machine Monitor
- Security Roles and Permissions (HOL)
- vCPU (HOL)
- Buffer Overflow Protection
- vCPU Availability
- Transparent Page File Sharing
- Balloon Driver
- Swap File
Chapter 5 Routing and the vNetwork
- Networking Components
- Port Groups
- Physical Switch Configuration (HOL)
- NIC Teaming (HOL)
- Load Balancing
- Security Features
- VLAN’s (HOL)
- Private VLAN
- Network I/O Control
- Cisco Nexus 1000v
- Network Routing (HOL)
Chapter 6 vStorage – Architecture and Security Implementations
- Virtualized Storage (HOL)
- Pluggable Storage Architecture
- Storage Control
- vSphere API for Array Integration
- Fiber Channel
- LUN Masking
- SAN Zoning
- Fiber Channel Attacks
- Securing Fiber Channel
- iSCSI (HOL)
- Software vs Hardware Initiators
- iSCSI Security Featrures
- Securing iSCSI
Chapter 7 Hardening the Virtual Machines
- Harden the Server
- Unnecessary Functions
- Using Templates (HOL)
- VM Isolation (HOL)
- VM Advanced Settings (HOL)
- SetInfo Hazard
- VMCI (HOL)
- Isolation Tools (HOL)
- VMsafe Settings
Chapter 8 Hardening the Host
- Service Console Security (HOL)
- Password Integrity
- Wheel Group
- File System Integrity
- Encrypted Communication
- DCUI – Direct Console User Interface (HOL)
- CIM – Common Information Model (HOL)
- Tech Support Mode (HOL)
- ESXi Lockdown Mode
Chapter 9 Hardening Virtual Center
- Limiting Administrative Access (HOL)
- Limiting Network Connectivity
- Server Certificate Replacement (HOL)
- Controlling Log Files (HOL)
- Custom Rules
- Update Manager
- VMware Converter
- Managing the vCenter Clients (HOL)
- vShield (HOL)
Chapter 10 Third Party Mitigation Tools
- Altor Networks
- Catbird’s vCompliance
- Reflex Systems VMC (HOL)
- CheckPoint Virtual Appliances
- Trend Micro (HOL)
Chapter 11 vCloud Security
Chapter 12 Putting it all Together
- Looking back at the key security issues for all topics covered
- Design thoughts
- Final Hands On Lab – Can you secure your environment? (HOL)
- A printed manual that includes all power point slides and labs
- Participants will have access to their own rack of equipment to complete labs.
- The ability to remote into racks from home during the week of class
- One-on-one help during labs
With our VMware® related course offerings we have some flexibility in ways that we can deliver it. In addition to being able to offer training at our facility, these courses can also be brought on the road to you (contact us for minimums).
Another option that we have allows you to save time and money on hotel and travel expenses through live Instructor led training online. From the comfort of your office or home, busy professionals can get the training they need without the added expense through ITdojo’s live online learning solutions.
Call an ITdojo at 757-216-3656 to schedule training today!