Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools
with experts Duane Anderson, Tim Pierson
Course description
This course finishes out the series by taking a look at the differences between ESX and ESXi. It discusses Root privileges, controlled access, and securing SNMP configuration. This course discusses how to audit or disable tech support mode and provides an overview of third party security players as add-ons such as: Catbird, Altor, HyTrust, Reflex and Tripwire.
Prerequisites
This is part 6 of the series.
Learning Paths
This course will help you prepare for the following certification and exam:
Certified Virtualization Security Expert
Meet the experts
Duane has been working in the IT industry for over two decades. He has primarily focused on security related matters such as
Penetration Testing and Forensics. He has appeared as an expert witness
in multiple court hearings on IT related matters. Duane has worked for
or with most US and some foreign military branches, U.S government
agencies, banking and regulatory industries and Fortune 500 companies.
Duane contributed to the coordination and execution of IT
counter-hacking & security courses for the US Marine Corps, US Army,
US Air Force, U.S. Treasury, Sprint, IBM, Washington Mutual and Service
Canada.
Tim one of the World’s leading trainers in technology,
networks, virtualization and, applications. He has been a technical trainer and consultant for security and virtualization for the past 25 years. He has 29 industry technical certifications from CISCO, Microsoft and Novell. Tim has been a noted speaker at many industry events such as Infosec World 2010, Innatech and GISSA. He is a contributing author of VMware vSphere and Virtual Infrastructure Security Securing ESX in the Virtual Environment.
networks, virtualization and, applications. He has been a technical trainer and consultant for security and virtualization for the past 25 years. He has 29 industry technical certifications from CISCO, Microsoft and Novell. Tim has been a noted speaker at many industry events such as Infosec World 2010, Innatech and GISSA. He is a contributing author of VMware vSphere and Virtual Infrastructure Security Securing ESX in the Virtual Environment.
Course outline
Hardening VirtualCenter and Third Party Mitigation
Hardening VirtualCenter (31:06)
- Introduction (00:21)
- Set up the Windows Host for VirtualCenter (01:33)
- Limit Network Connectivity to VirtualCenter (01:07)
- Proper Security Measures (01:41)
- Certificate-Based Encryption (04:46)
- vCenter Log Files and Rotation (00:52)
- Collecting vCenter Log Files (00:50)
- VirtualCenter Custom Roles (01:34)
- Document and Minitor Changes to the Configuration (00:30)
- VirtualCenter Add-on Components (01:21)
- VMware Update Manager (01:36)
- VMware Converter (02:05)
- VMware Guided Consolidation (01:17)
- General Considerations (01:13)
- Client Components (00:38)
- Verify the Integrity of the VI Client (02:23)
- Monitor the Usage of VI Client Instances (01:13)
- Avoid the Use of Plain-Text Passwords (02:11)
- vShield Zones Overview (01:30)
- vShield VM Wall and Flow Features (02:06)
- Summary (00:08)
Hardening VirtualCenter Demo (25:48)
- Introduction (00:08)
- Demo: vShield Manager (05:16)
- Demo: Deploy OVF Template (04:56)
- Demo: Configure Install Parameters (06:05)
- Demo: Add vShield Plugin (03:53)
- Demo: Datacenter Changes (05:19)
- Summary (00:08)
Hardening Virtual Center Demo Part 2 (30:32)
- Introduction (00:08)
- Demo: Verify Protection (05:01)
- Demo: Zenmap (06:11)
- Demo: Deny the vSphere Client at the DataCenter (03:58)
- Demo: Communicating from Inside the Data Center (05:28)
- Demo: Scanning (04:27)
- Demo: VM Flow (05:08)
- Summary (00:08)
Third Party Mitigation Tools (22:26)
- Introduction (00:18)
- The Virtualization Security Players (01:02)
- 1K View of Altor (01:04)
- 1K View of Catbird and Hytrust (03:15)
- 1K View of Reflex (01:47)
- 1K View of Trend Microsystems (01:26)
- 1K View of Tripwire (00:45)
- In-Depth Look at HyTrust (01:11)
- HyTrust Key Capabilities: Unified Access Control (00:56)
- HyTrust Key Capaibilties: Policy Management (01:09)
- HyTrust Key Capabilities: Audit-Quality Logging (01:57)
- In-Depth Look at Catbird (02:51)
- Trust Zones (00:57)
- Catbird: Continuous Compliance (00:41)
- What's Missing (00:35)
- Making Sense of It All (02:16)
- Summary (00:08)