وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

vSphere 7: Implementing vSphere Security Best Practices

سرفصل های دوره

This course will teach you the best practices for securing your VMware vSphere infrastructure, including hosts, vCenter, and virtual machines.


01. Course Overview
  • 01. Course Overview

  • 02. Introduction
  • 02. Introduction
  • 03. Pluralsights Learning Path for vSphere 7
  • 04. What This Course Covers

  • 03. Best Practices for vSphere Security
  • 05. Introduction
  • 06. What Are Best Practices
  • 07. Using the vSphere Security Configuration Guide SCG
  • 08. Analyzing vSphere for Best Practices
  • 09. What This Module Covered

  • 04. Managing vSphere Security Certificates
  • 10. Introduction
  • 11. Why Do You Need Security Certificates
  • 12. Understanding the VMware Certificate Authority VMCA
  • 13. How to Install the VMCA Root Certificate in Your Browser
  • 14. Understanding Hybrid Mode
  • 15. Replacing Self-signed Certificates with CA-signed Certificates
  • 16. What This Module Covered

  • 05. Enabling SSO and Active Directory Integration
  • 17. Introduction
  • 18. Differentiate Available Authentication Methods with VMware vCenter
  • 19. Adding an ESXi Host to a Directory Service
  • 20. Understanding vSphere Identity Federation
  • 21. Configure Manage Active Directory Authentication
  • 22. Understanding vSphere Single Sign-on SSO
  • 23. Enable Disable Single Sign-on SSO Users
  • 24. Logging in to vSphere with Windows Session Credentials
  • 25. Configuring Single Sign-on SSO Policies
  • 26. Enabling vSphere Enhanced Linked Mode
  • 27. What This Module Covered

  • 06. Configuring and Administering Role-based Access Control
  • 28. Introduction
  • 29. Compare and Contrast Default System Sample Roles
  • 30. Determine How Permissions Are Applied and Inherited in vCenter Server
  • 31. View and Sort User and Group Lists
  • 32. Create Clone Edit vCenter Server Roles
  • 33. Add Modify Remove Permissions for Users and Groups on vCenter Server Inventory Objects
  • 34. Apply a Role to a User Group and to an Object or Group of Objects
  • 35. Compare and Contrast Propagated and Explicit Permission Assignments
  • 36. Determine the Appropriate Set of Privileges for Common Tasks in vCenter Server
  • 37. What This Module Covered

  • 07. Securing ESXi Hosts
  • 39. Control Access to Hosts
  • 40. Enable Configure Disable Services in the ESXi Firewall
  • 41. Configure a Custom ESXi Firewall Rule
  • 42. Enable Lockdown Mode
  • 43. Securing SSH and ESXi Shell
  • 44. Password Security and Account Lockout
  • 45. Understanding Secure Boot for ESXi
  • 46. Securing ESXi with Trusted Platform Module TPM
  • 47. Understanding vSphere Trust Authority
  • 48. What This Module Covered

  • 08. Securing vCenter Server
  • 49. Introduction
  • 50. Controlling Access to vCenter
  • 51. Limiting Network Access
  • 52. vCenter Password Lockout
  • 53. Using vCenter Server Profiles
  • 54. Controlling MOB Access
  • 55. Control Datastore Browser Access
  • 56. What This Module Covered

  • 09. Securing Virtual Machines
  • 57. Introduction
  • 58. Controlling Access to Virtual Machines
  • 59. Control VMware Tools Installation
  • 60. Control VM Data Access
  • 61. Control VM Device Connections
  • 62. Configure Network Security Policies
  • 63. vSGX Secure Enclaves in vSphere 7
  • 64. What This Module Covered

  • 10. Securing vSphere with Encryption
  • 65. Introduction
  • 66. Understanding vSphere Encryption
  • 67. Understanding Key Providers
  • 68. Configuring vSphere Native Key Provider
  • 69. Encrypting Virtual Machines
  • 70. Encrypting Storage
  • 71. Encrypting vMotion
  • 72. What This Module Covered

  • 11. Customizing Host Profile Settings
  • 73. Introduction
  • 74. Understanding Host Profiles
  • 75. Create Edit Remove a Host Profile from an ESXi Host
  • 76. Attach and Apply a Host Profile to ESXi Hosts in a Cluster
  • 77. Perform Compliance Scanning and Remediation of ESXi Hosts and Clusters
  • 78. Customizing Host Profiles
  • 79. Scheduling Compliance Checks
  • 80. Import Export a Host Profile
  • 81. What This Module Covered

  • 12. Next Steps
  • 82. Next Steps

  • Exercise Files
      02
    • introduction-slides.pdf
      03
    • best-practices-for-vsphere-security-slides.pdf
      04
    • managing-vsphere-security-certificates-slides.pdf
      05
    • enabling-sso-and-active-directory-integration-slides.pdf
      06
    • configuring-and-administering-role-based-access-control-slides.pdf
      07
    • securing-esxi-hosts-slides.pdf
      08
    • securing-vcenter-server-slides.pdf
      09
    • securing-virtual-machines-slides.pdf
      10
    • securing-vsphere-with-encryption-slides.pdf
      11
    • customizing-host-profile-settings-slides.pdf
      12
    • next-steps-slides.pdf
    139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 12173
    حجم: 621 مگابایت
    مدت زمان: 260 دقیقه
    تاریخ انتشار: 28 اردیبهشت 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید