VMware vSphere 5 – Part 2: Securing Hosts, Internal Components, Certificate Use

This course is included in our On-demand training solution.

Overview

In addition to securing against external threats you must also work to mitigate threats against the internal network components such as vLANs, switches, and iSCSI traffic within your vSphere Environment. This course describes how to protect internal components using ESXi Shell, Security Profiles. Firewalls, Lockdown mode, and encryption.
Often times, the first time that you connect to a vCenter Server instance, you receive a Security Warning dialog box.This security warning appears because the vSphere Client uses HTTP over Secure Sockets Layer (HTTPS) to connect to vCenter Server while the vCenter Server is using a Secure Sockets Layer (SSL) certificate from an “untrusted” source. This course reviews ESXi SSL certificate options as well as explains the SSL certificate options available to correct errors security warning messages.

Target Audience

Systems engineers, system administrators, vSphere operators and support personnel working in virtualized server environments who have completed Datacenter Virtualization with vSphere 5: Part 1. Candidates who are seeking to learn about advanced features and configuration options available in the vSphere Enterprise product. This includes, configuring High Availability, Distributed Resource Scheduling, upgrading to vSphere 5 and auto deployment. A solid technical foundation in virtualization using vSphere coupled with strong network and administration skills are required as a prerequisite for this path.

Prerequisites

Expected Duration

90 min.

Course Objectives

Security Profile Services

  • describe how to configure services from the Security Profile
  • ESXi Firewall and ESXi Lockdown

  • describe how ESXi firewall and Lockdown mode provide security
  • Firewall Considerations

  • recognize the options available when using firewall protection
  • vLANs and Switches

  • describe how vLANS and switch settings can be used to protect standard switches
  • Encryption and Authentication

  • match the features of the encryption and authentication methods appropriately
  • describe best practice when securing components
  • Securing ESXi Hosts and Switches

  • secure ESXi hosts in a given scenario
  • Secure Certificates

  • describe the characteristics of ESXi certificate support
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?