Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools
Interactive

Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools

Biz Library
Updated Jan 21, 2020

This courses finishes out the series by taking a look at the differences between ESX and ESXi. It discusses root privileges, controlled access, and securing SNMP configuration. It also discusses how to audit or disable tech support mode and takes an overview of third-party security players as add-ons such as Catbird, Altor, HyTrust, Reflex, and Tripwire. This course contains the following lessons:

Lesson 1:

  • Set up the Windows Host for Virtual Center
  • Limit Network Connectivity to Virtual Center
  • Proper Security Measures
  • Certificate-Based Encryption
  • vCenter Log Files and Rotation
  • Collecting vCenter Log Files
  • Virtual Center Custom Roles
  • Document and Monitor Changes to the Configuration
  • Virtual Center Add-on Components
  • VMware Update Manager
  • VMware Converter
  • VMware Guided Consolidation
  • General Considerations
  • Client Components
  • Verify the Integrity of the VI Client
  • Monitor the Usage of VI Client Instances
  • Avoid the Use of Plain-Text Passwords
  • vShield Zones Overview
  • vShield VM Wall and Flow Features.

Lesson 2:

  • Demo: vShield Manager
  • Demo: Deploy OVF Template
  • Demo: Configure Install Parameters
  • Demo: Add vShield Plugin
  • Demo: Datacenter Changes.

Lesson 3:

  • Demo: Verify Protection
  • Demo: Zenmap
  • Demo: Deny the vSphere Client at the DataCenter
  • Demo: Communicating from Inside the Data Center
  • Demo: Scanning
  • Demo: VM Flow.

Lesson 4:

  • The Virtualization Security Players
  • 1K View of Altor
  • 1K View of Catbird and Hytrust
  • 1K View of Reflex
  • 1K View of Trend Microsystems
  • 1K View of Tripwire
  • In-Depth Look at HyTrust
  • HyTrust Key Capabilities: Unified Access Control
  • HyTrust Key Capabilities: Policy Management
  • HyTrust Key Capabilities: Audit-Quality Logging
  • In-Depth Look at Catbird
  • Trust Zones
  • Catbird: Continuous Compliance
  • What's Missing
  • Making Sense of It All.