Learn your way! Get started

Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools

with experts Duane Anderson, Tim Pierson


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 4/16/2018
Level Intermediate
Runtime 1h 49m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course finishes out the series by taking a look at the differences between ESX and ESXi. It discusses Root privileges, controlled access, and securing SNMP configuration. This course discusses how to audit or disable tech support mode and provides an overview of third party security players as add-ons such as: Catbird, Altor, HyTrust, Reflex and Tripwire.

Prerequisites

This is part 6 of the series.

Learning Paths

This course will help you prepare for the following certification and exam:
Certified Virtualization Security Expert

Meet the experts

Duane has been working in the IT industry for over two decades. He has primarily focused on security related matters such as Penetration Testing and Forensics. He has appeared as an expert witness in multiple court hearings on IT related matters. Duane has worked for or with most US and some foreign military branches, U.S government agencies, banking and regulatory industries and Fortune 500 companies. Duane contributed to the coordination and execution of IT counter-hacking & security courses for the US Marine Corps, US Army, US Air Force, U.S. Treasury, Sprint, IBM, Washington Mutual and Service Canada.

Tim one of the World’s leading trainers in technology,
networks, virtualization and, applications. He has been a technical trainer and consultant for security and virtualization for the past 25 years. He has 29 industry technical certifications from CISCO, Microsoft and Novell. Tim has been a noted speaker at many industry events such as Infosec World 2010, Innatech and GISSA. He is a contributing author of VMware vSphere and Virtual Infrastructure Security Securing ESX in the Virtual Environment.

Course outline



Hardening VirtualCenter and Third Party Mitigation

Hardening VirtualCenter (31:06)
  • Introduction (00:21)
  • Set up the Windows Host for VirtualCenter (01:33)
  • Limit Network Connectivity to VirtualCenter (01:07)
  • Proper Security Measures (01:41)
  • Certificate-Based Encryption (04:46)
  • vCenter Log Files and Rotation (00:52)
  • Collecting vCenter Log Files (00:50)
  • VirtualCenter Custom Roles (01:34)
  • Document and Minitor Changes to the Configuration (00:30)
  • VirtualCenter Add-on Components (01:21)
  • VMware Update Manager (01:36)
  • VMware Converter (02:05)
  • VMware Guided Consolidation (01:17)
  • General Considerations (01:13)
  • Client Components (00:38)
  • Verify the Integrity of the VI Client (02:23)
  • Monitor the Usage of VI Client Instances (01:13)
  • Avoid the Use of Plain-Text Passwords (02:11)
  • vShield Zones Overview (01:30)
  • vShield VM Wall and Flow Features (02:06)
  • Summary (00:08)
Hardening VirtualCenter Demo (25:48)
  • Introduction (00:08)
  • Demo: vShield Manager (05:16)
  • Demo: Deploy OVF Template (04:56)
  • Demo: Configure Install Parameters (06:05)
  • Demo: Add vShield Plugin (03:53)
  • Demo: Datacenter Changes (05:19)
  • Summary (00:08)
Hardening Virtual Center Demo Part 2 (30:32)
  • Introduction (00:08)
  • Demo: Verify Protection (05:01)
  • Demo: Zenmap (06:11)
  • Demo: Deny the vSphere Client at the DataCenter (03:58)
  • Demo: Communicating from Inside the Data Center (05:28)
  • Demo: Scanning (04:27)
  • Demo: VM Flow (05:08)
  • Summary (00:08)
Third Party Mitigation Tools (22:26)
  • Introduction (00:18)
  • The Virtualization Security Players (01:02)
  • 1K View of Altor (01:04)
  • 1K View of Catbird and Hytrust (03:15)
  • 1K View of Reflex (01:47)
  • 1K View of Trend Microsystems (01:26)
  • 1K View of Tripwire (00:45)
  • In-Depth Look at HyTrust (01:11)
  • HyTrust Key Capabilities: Unified Access Control (00:56)
  • HyTrust Key Capaibilties: Policy Management (01:09)
  • HyTrust Key Capabilities: Audit-Quality Logging (01:57)
  • In-Depth Look at Catbird (02:51)
  • Trust Zones (00:57)
  • Catbird: Continuous Compliance (00:41)
  • What's Missing (00:35)
  • Making Sense of It All (02:16)
  • Summary (00:08)