وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

vSphere 8: Implementing vSphere Security Best Practices

سرفصل های دوره

This course teaches the best practices for securing a vSphere infrastructure, including securing ESXi, vCenter Server, and vSphere virtual machines. You’ll also learn how to implement vSphere Certificate Manager, utilize host profiles, and more.


1. Course Overview
  • 1. Course Overview

  • 2. Introduction
  • 1. Introduction
  • 2. Pluralsights Learning Path for vSphere 8
  • 3. What This Course Covers

  • 3. Best Practices for vSphere Security
  • 1. Introduction
  • 2. What Are Best Practices
  • 3. Using the vSphere Security Configuration Guide (SCG)
  • 4. Analyzing vSphere for Best Practices
  • 5. What This Module Covered

  • 4. Managing vSphere Security Certificates
  • 1. Introduction
  • 2. Why Do You Need Security Certificates
  • 3. Understanding the VMware Certificate Authority (VMCA)
  • 4. How to Install the VMCA Root Certificate in Your Browser
  • 5. Understanding Hybrid Mode
  • 6. Replacing Self-signed Certificates with CA-signed Certificates
  • 7. What This Module Covered

  • 05. Enabling SSO and Active Directory Integration
  • 01. Introduction
  • 02. Differentiate Available Authentication Methods with VMware vCenter
  • 03. Adding an ESXi Host to a Directory Service
  • 04. Understanding vSphere Identity Federation
  • 05. ConfigureManage Active Directory Authentication
  • 06. Understanding vSphere Single Sign-on (SSO)
  • 07. EnableDisable Single Sign-on (SSO) Users
  • 08. Logging in to vSphere with Windows Session Credentials
  • 09. Configuring Single Sign-on (SSO) Policies
  • 10. Enabling vCenter Enhanced Linked Mode
  • 11. What This Module Covered

  • 06. Configuring and Administering Role-based Access Control
  • 01. Introduction
  • 02. Compare and Contrast Default SystemSample Roles
  • 03. Determine How Permissions are Applied and Inherited in vCe
  • 04. View and Sort User and Group Lists
  • 05. CreateCloneEdit vCenter Server Roles
  • 06. AddModifyRemove Permissions for Users and Groups on vCente
  • 07. Apply a Role to a UserGroup and to an Object or Group of O
  • 08. Compare and Contrast Propagated and Explicit Permission As
  • 09. Determine the Appropriate Set of Privileges for Common Tas
  • 10. What This Module Covered

  • 07. Securing ESXi Hosts
  • 01. Introduction
  • 02. Control Access to Hosts
  • 03. EnableConfigureDisable Services in the ESXi Firewall
  • 04. Configure a Custom ESXi Firewall Rule
  • 05. Enable Lockdown Mode
  • 06. Securing SSH and ESXi Shell
  • 07. Password Security and Account Lockout
  • 08. Understanding Secure Boot for ESXi
  • 09. Securing ESXi with Trusted Platform Module (TPM)
  • 10. Understanding vSphere Trust Authority
  • 11. What This Module Covered

  • 8. Securing vCenter Server
  • 1. Introduction
  • 2. Controlling Access to vCenter
  • 3. Limiting Network Access
  • 4. vCenter Password Lockout
  • 5. Using vCenter Server Profiles
  • 6. Controlling MOB Access
  • 7. Control Datastore Browser Access
  • 8. What This Module Covered

  • 9. Securing Virtual Machines
  • 1. Introduction
  • 2. Controlling Access to Virtual Machines
  • 3. Control VMware Tools Installation
  • 4. Control VM Data Access
  • 5. Control VM Device Connections
  • 6. Configure Network Security Policies
  • 7. vSGXSecure Enclaves
  • 8. What This Module Covered

  • 10. Securing vSphere with Encryption
  • 1. Introduction
  • 2. Understanding vSphere Encryption
  • 3. Understanding Key Providers
  • 4. Configuring vSphere Native Key Provider
  • 5. Encrypting Virtual Machines
  • 6. Encrypting Storage
  • 7. Encrypting vMotion
  • 8. What This Module Covered

  • 11. Customizing Host Profile Settings
  • 1. Introduction
  • 2. Understanding Host Profiles
  • 3. CreateEditRemove a Host Profile from an ESXi Host
  • 4. Attach and Apply a Host Profile to ESXi Hosts in a Cluster
  • 5. Perform Compliance Scanning and Remediation of ESXi Hosts and Clusters
  • 6. Customizing Host Profiles
  • 7. Scheduling Compliance Checks
  • 8. Import and Export a Host Profile
  • 9. What This Module Covered

  • 12. Next Steps
  • 1. Next Steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 28039
    حجم: 698 مگابایت
    مدت زمان: 278 دقیقه
    تاریخ انتشار: ۱۹ دی ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید