Post Description
Section 1: Course Introduction
Lesson 1 - Getting Started with VMware vSphere Security Design Training
Lesson 2 - About Your Instructors
Lesson 3 - Introduction to Information Security Concepts
Section 2: Information Security Concepts
Lesson 4 - Security Priorities in a Virtual Environment
Lesson 5 - Security Technologies
Section 3: Security in Virtual Networks
Lesson 6 - vNetwork Security Architecture
Lesson 7 - Securing vNetwork Configuration
Section 4: Protecting vCenter
Lesson 8 - Working with SSL Certificates
Lesson 9 - Hardening the vCenter Server System
Section 5: Protecting ESX/ESXi Host Systems
Lesson 10 - ESX and ESXi Security Architecture
Lesson 11 - Controlling Access to Storage
Lesson 12 - Hardening ESX and ESXi Host Systems
Section 6: Hardening Virtual Machines
Lesson 13 - Virtual Machine Security Architecture
Lesson 14 - Hardening Virtual Machines - Best Practices
Section 7: Standardizing ESX/ESXi Host Configurations
Lesson 15 - Using Host Profiles to Standardize ESX/ESXi Configuration
Lesson 16 - Keeping Hosts and VMs Secure with Update Manager
Section 8: vSphere Logging and Event Monitoring
Lesson 17 - Understanding and Managing vSphere Logs
Section 9: Getting Started with Top vSphere Security Tools
Lesson 18 - vShield: Zones, App, and Edge
Lesson 19 - vShield: Endpoint and Trend Micro Deep Security
Lesson 20 - Hytrust Appliance
Lesson 21 - Compliance and vCenter Configuration Manager
Section 10: Course Conclusion
Lesson 22 - Next Steps
DIT IS EEN SPOT!
RESPECT voor de ORIGINELE POSTER!
Nu zelf ook aan het binnenhalen, nog niet getest!
Comments # 0