SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Advanced VMware® Security
                                                                                                           5 Day, Hands-On Bootcamp
                                                                                                                     Why You Need This!
                                                                                                                       “After taking VMware’s® Install and Con gure and the DSA
                                                                                                                       class, I thought I knew how to secure our virtual environ-
                                                                                                                       ment. I realized after this class how vulnerable our
                                                                                                                       infrastructure is.” - Alex W, Sr. Network Administrator
                                                                                                                                     • If you are using any remote storage
                                                                                                                                       (iSCSI, NFS, Fibre Channel), this class
                                                                                                                                       will show how an attacker can redi-
   Virtualization technologies are                                                                                                     rect, then copy or even change infor-
                                                                                                                                       mation before it arrives at the desti-
     not secure “out of the box”                                                                                                       nation!

A critical and often overlooked aspect of migrating to a virtualized                                                                 • Detect potential threats, how to
environment is setting up security properly. Virtualization technologies                                                               defend and defeat them, and how to
are not secure “out of the box” and VMware® is no exception. The
Advanced VMware® Security course focuses on where the vulnerabilities                                                                  establish a solid foundation to build
lie and how to reduce the attack surfaces in a virtualized environment.                                                                secure virtual data centers from the
                                                                                                                                       ground up.
This course goes beyond the typical security protocols administrators
use to secure their current environments and dives much deeper into the                                                              • Any regular user inside your network
actual workings and shortcomings of the VMware® environment.
                                                                                                                                       can take full control of your ESX hosts
                                                                                                                                       if they know the right exploits.
“These guys are like the Darth Vaders of the
 network world. I'm glad they are on our side
 since this was a security course. Our instructor                                                                                    • By taking control of your virtual
 was amazing and by far the best guy we've                                                                                             environment a hacker could disable
 seen here. This guy is world class.” – Jim B., CIO                                                                                    ALL your VMs at one time.

This course was designed and developed from the perspective of                                                                       • Prevent theft of confidential records,
how a hacker will get into your VMware® Environment by a Licensed                                                                      proprietary files, or sensitive infor-
Penetration Tester and hacking Guru with a long history of vulnerability                                                               mation and ensure compliance with
audits with: US Dept. of Homeland Security, US Government Agencies                                                                     HIPPA, SOX, or STIG standards and
(NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants,
law enforcement agencies, fortune 500 companies, universities, and
                                                                                                                                       regulations.
many foreign governments.
                                                                                                                                     “This was some of the best
                                                                                                                                       training I've ever had.”
                                                                                                                                                     William L.
                                                                             36 Lombard Street, Suite 600
                                                                             Toronto, Ontario M5C 2X3                                     Call TekSource Today!
                                                                             Phone: 647-827-0488
                                                                                                                                              (647) 827-0488
     VMware is a registered trademark of VMware, Inc. in the United States and/or other countries. All other trademarks are the
  property of their respective owners. TekSource is not associated with any product or vendor in this advertisement and/or course.
 © 2009 VMTraining                                                                                                                         www.teksource.ca
Advanced VMware®
                                                                                                                  On-Site and
                                                                                                            Online Classes Available.
                                                                                                             Call for More Details!




Security                                                            Covers VMware’s® VI 3 and
                                                                       vSphere 4 Products!

                     CVSE1021 - A Five Day, Hands-on Bootcamp
Chapter 1 – Primer and Reaffirming our Knowledge                           Chapter 7 – Penetration Testing and the Tools of the Trade

  • ESX Networking Components                                              • Vulnerabilities in Network Services & Assessment Scanners
  • Virtual Ethernet Adapters and How They Work                            • Windows Password Cracking, Disabling Auditing
  • Virtual Switches and How They Work                                     • Alternate Data Streams, Encrypted Tunnels
                                                                           • Port Monitoring Software, Rootkits, Metasploit, Fuzzers
  • VLANs in VMWare Infrastructure
                                                                             SaintExploit, Core Impact, Wireshark
  • NIC Teaming, Failover Configurations
                                                                           • Penetration Testing Tool Comparison
  • Layer 2 Security Features & File System Structure
                                                                           • ARP Cache Poisoning, Hash Algorithm
  • Managing the Virtual Network with “VirtualCenter”
  • Kernel, Processes, Account and Groups                               Chapter 8 – Hardening your ESX Server
  • Linux and UNIX Permissions
                                                                           • Hardening Your ESX Server, ESX, ESXi Best Practices
  • Trust Relationships, Logs and Auditing
                                                                           • Configuring the ESX/ESXi Host
Chapter 2 – Penetration Testing 101                                        • VirtualCenter, Client Components
                                                                           • The Basics of SAN Security, Part I, Increasing Security Concerns
  • What is a Penetration Test amd the benefits?                            • Security Domains, Switch-to-Switch Domain
  • What is the Cost of a Hack?                                            • Data Integrity and Security
  • Current Issues and the Evolving Threat                                 • Security Management Part 2
  • Pen Testing Methodology, Types of Tests, Website Review                • Fibre Channel Security Management
  • Common Management Errors                                               • Authentication and Authorization
                                                                           • Configuration Management
Chapter 3 – Routing and the Security Design of VMware                      • SAN Access, SAN Security Benefits
  • Security of Routing Data                                               • Controller-based Mapping, WWN Privileged Access
  • How traffic is routed between Virtual Machines on ESX hosts              • Redundancy, Management
  • Security Design of the VMware Infrastructure 3 Architecture            • Distributing Malware, Malware Capabilities
  • VMware Infrastructure Architecture and Security Features               • Netcat
                                                                           • Executable Wrappers
Chapter 4 – Information Gathering, Scanning and                            • Avoiding Detection
Enumeration                                                                • BPMTK
                                                                           • What is SQL Injection?
  • What information does the hacker gather?                               • Why SQL Injection?
  • Methods of Obtaining Information                                       • Attacking Database Servers
  • Footprinting Defined, Google Hacking
  • Introduction to Port Scanning & Tools
  • Enumeration Overview

Chapter 5 – DMZ Virtualization
  • Virtualized DMZ Networks
  • Three Typical Virtualized DMZ Configurations
  • Best Practices for Achieving a Secure Virtualized DMZ
    Deployment
                                                                   Show that you are an expert at securing
Chapter 6 – Remote DataStore Security
                                                                    your network by getting your Certi ed
  • Mask and Zone SAN Resources                                   Virtualization Security Expert Certi cation.
  • Fiber Channel, Attacking Fiber Channel
  • Securing iSCSI, iFCP and FCIP over IP networks                    Don’t let your company’s
                                                                       network be a victim of
                                                                           fraud or theft!

                                                                    Call TekSource Today!
                                                                       (647) 827-0488
                                                                     www.teksource.ca

Contenu connexe

Tendances

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesBulent Buyukkahraman
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Lumension
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Barco CineCare Web
Barco CineCare WebBarco CineCare Web
Barco CineCare WebBarco
 
Hints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSHints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSCA Nimsoft
 
Hints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSHints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSCA Nimsoft
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised EnvironmentPeter Wood
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityBooz Allen Hamilton
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkawayrichardebowers
 

Tendances (15)

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing Services
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
Barco CineCare Web
Barco CineCare WebBarco CineCare Web
Barco CineCare Web
 
Hints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSHints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCS
 
Hints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCSHints and Tips for Monitoring Cisco UCS
Hints and Tips for Monitoring Cisco UCS
 
Security in a Virtualised Environment
Security in a Virtualised EnvironmentSecurity in a Virtualised Environment
Security in a Virtualised Environment
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 

Similaire à Advanced VMware Security 5 Day Hands-On Bootcamp

Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsJames Wickett
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use CasesKevin Groat
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersIben Rodriguez
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPace IT at Edmonds Community College
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraftenigma0x3
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...David kankam
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudOnline Tech
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 

Similaire à Advanced VMware Security 5 Day Hands-On Bootcamp (20)

Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
V Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate BootcampV Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate Bootcamp
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
NSX 9 Core Use Cases
NSX 9 Core Use CasesNSX 9 Core Use Cases
NSX 9 Core Use Cases
 
Cloud.pptx
Cloud.pptxCloud.pptx
Cloud.pptx
 
Xen Community Update 2011
Xen Community Update 2011Xen Community Update 2011
Xen Community Update 2011
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Cloud of tomorrow
Cloud of tomorrowCloud of tomorrow
Cloud of tomorrow
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 

Dernier

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 

Dernier (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 

Advanced VMware Security 5 Day Hands-On Bootcamp

  • 1. Advanced VMware® Security 5 Day, Hands-On Bootcamp Why You Need This! “After taking VMware’s® Install and Con gure and the DSA class, I thought I knew how to secure our virtual environ- ment. I realized after this class how vulnerable our infrastructure is.” - Alex W, Sr. Network Administrator • If you are using any remote storage (iSCSI, NFS, Fibre Channel), this class will show how an attacker can redi- Virtualization technologies are rect, then copy or even change infor- mation before it arrives at the desti- not secure “out of the box” nation! A critical and often overlooked aspect of migrating to a virtualized • Detect potential threats, how to environment is setting up security properly. Virtualization technologies defend and defeat them, and how to are not secure “out of the box” and VMware® is no exception. The Advanced VMware® Security course focuses on where the vulnerabilities establish a solid foundation to build lie and how to reduce the attack surfaces in a virtualized environment. secure virtual data centers from the ground up. This course goes beyond the typical security protocols administrators use to secure their current environments and dives much deeper into the • Any regular user inside your network actual workings and shortcomings of the VMware® environment. can take full control of your ESX hosts if they know the right exploits. “These guys are like the Darth Vaders of the network world. I'm glad they are on our side since this was a security course. Our instructor • By taking control of your virtual was amazing and by far the best guy we've environment a hacker could disable seen here. This guy is world class.” – Jim B., CIO ALL your VMs at one time. This course was designed and developed from the perspective of • Prevent theft of confidential records, how a hacker will get into your VMware® Environment by a Licensed proprietary files, or sensitive infor- Penetration Tester and hacking Guru with a long history of vulnerability mation and ensure compliance with audits with: US Dept. of Homeland Security, US Government Agencies HIPPA, SOX, or STIG standards and (NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants, law enforcement agencies, fortune 500 companies, universities, and regulations. many foreign governments. “This was some of the best training I've ever had.” William L. 36 Lombard Street, Suite 600 Toronto, Ontario M5C 2X3 Call TekSource Today! Phone: 647-827-0488 (647) 827-0488 VMware is a registered trademark of VMware, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. TekSource is not associated with any product or vendor in this advertisement and/or course. © 2009 VMTraining www.teksource.ca
  • 2. Advanced VMware® On-Site and Online Classes Available. Call for More Details! Security Covers VMware’s® VI 3 and vSphere 4 Products! CVSE1021 - A Five Day, Hands-on Bootcamp Chapter 1 – Primer and Reaffirming our Knowledge Chapter 7 – Penetration Testing and the Tools of the Trade • ESX Networking Components • Vulnerabilities in Network Services & Assessment Scanners • Virtual Ethernet Adapters and How They Work • Windows Password Cracking, Disabling Auditing • Virtual Switches and How They Work • Alternate Data Streams, Encrypted Tunnels • Port Monitoring Software, Rootkits, Metasploit, Fuzzers • VLANs in VMWare Infrastructure SaintExploit, Core Impact, Wireshark • NIC Teaming, Failover Configurations • Penetration Testing Tool Comparison • Layer 2 Security Features & File System Structure • ARP Cache Poisoning, Hash Algorithm • Managing the Virtual Network with “VirtualCenter” • Kernel, Processes, Account and Groups Chapter 8 – Hardening your ESX Server • Linux and UNIX Permissions • Hardening Your ESX Server, ESX, ESXi Best Practices • Trust Relationships, Logs and Auditing • Configuring the ESX/ESXi Host Chapter 2 – Penetration Testing 101 • VirtualCenter, Client Components • The Basics of SAN Security, Part I, Increasing Security Concerns • What is a Penetration Test amd the benefits? • Security Domains, Switch-to-Switch Domain • What is the Cost of a Hack? • Data Integrity and Security • Current Issues and the Evolving Threat • Security Management Part 2 • Pen Testing Methodology, Types of Tests, Website Review • Fibre Channel Security Management • Common Management Errors • Authentication and Authorization • Configuration Management Chapter 3 – Routing and the Security Design of VMware • SAN Access, SAN Security Benefits • Security of Routing Data • Controller-based Mapping, WWN Privileged Access • How traffic is routed between Virtual Machines on ESX hosts • Redundancy, Management • Security Design of the VMware Infrastructure 3 Architecture • Distributing Malware, Malware Capabilities • VMware Infrastructure Architecture and Security Features • Netcat • Executable Wrappers Chapter 4 – Information Gathering, Scanning and • Avoiding Detection Enumeration • BPMTK • What is SQL Injection? • What information does the hacker gather? • Why SQL Injection? • Methods of Obtaining Information • Attacking Database Servers • Footprinting Defined, Google Hacking • Introduction to Port Scanning & Tools • Enumeration Overview Chapter 5 – DMZ Virtualization • Virtualized DMZ Networks • Three Typical Virtualized DMZ Configurations • Best Practices for Achieving a Secure Virtualized DMZ Deployment Show that you are an expert at securing Chapter 6 – Remote DataStore Security your network by getting your Certi ed • Mask and Zone SAN Resources Virtualization Security Expert Certi cation. • Fiber Channel, Attacking Fiber Channel • Securing iSCSI, iFCP and FCIP over IP networks Don’t let your company’s network be a victim of fraud or theft! Call TekSource Today! (647) 827-0488 www.teksource.ca