Unlock the potential of generative AI across all your managerial functions.
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This training will present you with a technical summary of the solutions to ensure the security of your virtualized environments: from the main weaknesses of virtualized architectures, to the optimal implementation of security solutions.

Who is this training for ?

For whom ?

Identify security threats in virtualized environments Understand attack typologies Secure the virtual datacenter, VMS servers and workstations Evaluate available tools and techniques

Prerequisites

  • Basic knowledge of technical architectures (systems and networks) and IT security.

Training objectives

  • Identify security threats in virtualized environments
  • Understand attack typologies
  • Secure the virtual datacenter, VMS servers and workstations
  • Evaluate available tools and techniques
  • Training program

      • Security: reactive, proactive, predictive.
      • Internal and external threats.
      • Fields of application (servers, workstations, clients, applications) .
      • Context isolation, hyper-virtualization, para-virtualization.
      • Input/output (I/O) virtualization, classic and container.
      • Unikernel systems, microvisors.
      • The Reason model.
      • Organizations and disasters.
      • Backups, replications, PRA.
      • Trusted third parties, man in the attack middle.
      • Industrial advantages, risks.
      • The layers to monitor.
      • The Zero Trust security model, a new paradigm? Micro-segmentation.
      • Defense in depth.
      • Security areas: network, system, management, applications.
      • OSI layers.
      • VLANs, routing, virtual switches, VSS, VDS, N1KV, VXLAN and logical switches.
      • Service provider Certification Services, AD, LDAP, Nis, VMware NSX Edge.
      • System security principles: trust zones (dmz), password policies.
      • Encryption algorithms , public and private keys, self-signed certificates, trusted authority.
      • Antivirus : VMsafe API, vShield Endpoint.
      • Cartographie applicative, gestion des fluxs.
      • Isolation : application sandboxing, containers.
      • VMware Photon, ieVM.
      • Protection des API.
      • Tools overview (Nessus, Nmap, kali).
      • Intrusion detections and tests.
      • Logs, machine learning.
      • Behavioral analysis.
      • Risks and criticality: vCenter Operations (VMware).
      • Risk mapping.
      • Supervision and monitoring, alarms.
      • ACL, simple authentication, roles and privileges.
      • Social engineering.
      • BYOD, Shadow IT (Rogue IT).
      • Virtual infrastructure hardening plan.
      • Management of updates and backups.
    • 956
    • 14 h

    Submit your review

    Translated By Google Translate