Train together, save more! 10% off individual registration, 20% off for pairs.
×
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This training will present you with a technical summary of the solutions to ensure the security of your virtualized environments: from the main weaknesses of virtualized architectures, to the optimal implementation of security solutions.

Who is this training for ?

For whom ?

Identify security threats in virtualized environments Understand attack typologies Secure the virtual datacenter, VMS servers and workstations Evaluate available tools and techniques

Prerequisites

  • Basic knowledge of technical architectures (systems and networks) and IT security.

Training objectives

  • Identify security threats in virtualized environments
  • Understand attack typologies
  • Secure the virtual datacenter, VMS servers and workstations
  • Evaluate available tools and techniques
  • Training program

      • Security: reactive, proactive, predictive.
      • Internal and external threats.
      • Fields of application (servers, workstations, clients, applications) .
      • Context isolation, hyper-virtualization, para-virtualization.
      • Input/output (I/O) virtualization, classic and container.
      • Unikernel systems, microvisors.
      • The Reason model.
      • Organizations and disasters.
      • Backups, replications, PRA.
      • Trusted third parties, man in the attack middle.
      • Industrial advantages, risks.
      • The layers to monitor.
      • The Zero Trust security model, a new paradigm? Micro-segmentation.
      • Defense in depth.
      • Security areas: network, system, management, applications.
      • OSI layers.
      • VLANs, routing, virtual switches, VSS, VDS, N1KV, VXLAN and logical switches.
      • Service provider Certification Services, AD, LDAP, Nis, VMware NSX Edge.
      • System security principles: trust zones (dmz), password policies.
      • Encryption algorithms , public and private keys, self-signed certificates, trusted authority.
      • Antivirus : VMsafe API, vShield Endpoint.
      • Cartographie applicative, gestion des fluxs.
      • Isolation : application sandboxing, containers.
      • VMware Photon, ieVM.
      • Protection des API.
      • Tools overview (Nessus, Nmap, kali).
      • Intrusion detections and tests.
      • Logs, machine learning.
      • Behavioral analysis.
      • Risks and criticality: vCenter Operations (VMware).
      • Risk mapping.
      • Supervision and monitoring, alarms.
      • ACL, simple authentication, roles and privileges.
      • Social engineering.
      • BYOD, Shadow IT (Rogue IT).
      • Virtual infrastructure hardening plan.
      • Management of updates and backups.
    • 921
    • 14 h

    Submit your review

    Translated By Google Translate