This 5-day training course teaches administrators how to secure their VMware environment. It covers identifying vulnerabilities, hardening ESX server security, and penetration testing techniques that hackers use to compromise VMware infrastructures. Attendees will learn how to prevent threats like unauthorized access to VMs, theft of sensitive data, and how remote storage systems can be exploited. The instructor is a licensed penetration tester who will show the common configuration errors that expose environments and tools used by hackers.
2. Advanced VMware®
On-Site and
Online Classes Available.
Call for More Details!
Security Covers VMware’s® VI 3 and
vSphere 4 Products!
CVSE1021 - A Five Day, Hands-on Bootcamp
Chapter 1 – Primer and Reaffirming our Knowledge Chapter 7 – Penetration Testing and the Tools of the Trade
• ESX Networking Components • Vulnerabilities in Network Services & Assessment Scanners
• Virtual Ethernet Adapters and How They Work • Windows Password Cracking, Disabling Auditing
• Virtual Switches and How They Work • Alternate Data Streams, Encrypted Tunnels
• Port Monitoring Software, Rootkits, Metasploit, Fuzzers
• VLANs in VMWare Infrastructure
SaintExploit, Core Impact, Wireshark
• NIC Teaming, Failover Configurations
• Penetration Testing Tool Comparison
• Layer 2 Security Features & File System Structure
• ARP Cache Poisoning, Hash Algorithm
• Managing the Virtual Network with “VirtualCenter”
• Kernel, Processes, Account and Groups Chapter 8 – Hardening your ESX Server
• Linux and UNIX Permissions
• Hardening Your ESX Server, ESX, ESXi Best Practices
• Trust Relationships, Logs and Auditing
• Configuring the ESX/ESXi Host
Chapter 2 – Penetration Testing 101 • VirtualCenter, Client Components
• The Basics of SAN Security, Part I, Increasing Security Concerns
• What is a Penetration Test amd the benefits? • Security Domains, Switch-to-Switch Domain
• What is the Cost of a Hack? • Data Integrity and Security
• Current Issues and the Evolving Threat • Security Management Part 2
• Pen Testing Methodology, Types of Tests, Website Review • Fibre Channel Security Management
• Common Management Errors • Authentication and Authorization
• Configuration Management
Chapter 3 – Routing and the Security Design of VMware • SAN Access, SAN Security Benefits
• Security of Routing Data • Controller-based Mapping, WWN Privileged Access
• How traffic is routed between Virtual Machines on ESX hosts • Redundancy, Management
• Security Design of the VMware Infrastructure 3 Architecture • Distributing Malware, Malware Capabilities
• VMware Infrastructure Architecture and Security Features • Netcat
• Executable Wrappers
Chapter 4 – Information Gathering, Scanning and • Avoiding Detection
Enumeration • BPMTK
• What is SQL Injection?
• What information does the hacker gather? • Why SQL Injection?
• Methods of Obtaining Information • Attacking Database Servers
• Footprinting Defined, Google Hacking
• Introduction to Port Scanning & Tools
• Enumeration Overview
Chapter 5 – DMZ Virtualization
• Virtualized DMZ Networks
• Three Typical Virtualized DMZ Configurations
• Best Practices for Achieving a Secure Virtualized DMZ
Deployment
Show that you are an expert at securing
Chapter 6 – Remote DataStore Security
your network by getting your Certi ed
• Mask and Zone SAN Resources Virtualization Security Expert Certi cation.
• Fiber Channel, Attacking Fiber Channel
• Securing iSCSI, iFCP and FCIP over IP networks Don’t let your company’s
network be a victim of
fraud or theft!
Call TekSource Today!
(647) 827-0488
www.teksource.ca