وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

vSphere 8: Implementing vSphere Security Best Practices

سرفصل های دوره

This course teaches the best practices for securing a vSphere infrastructure, including securing ESXi, vCenter Server, and vSphere virtual machines. You’ll also learn how to implement vSphere Certificate Manager, utilize host profiles, and more.


1. Course Overview
  • 1. Course Overview

  • 2. Introduction
  • 1. Introduction
  • 2. Pluralsights Learning Path for vSphere 8
  • 3. What This Course Covers

  • 3. Best Practices for vSphere Security
  • 1. Introduction
  • 2. What Are Best Practices
  • 3. Using the vSphere Security Configuration Guide (SCG)
  • 4. Analyzing vSphere for Best Practices
  • 5. What This Module Covered

  • 4. Managing vSphere Security Certificates
  • 1. Introduction
  • 2. Why Do You Need Security Certificates
  • 3. Understanding the VMware Certificate Authority (VMCA)
  • 4. How to Install the VMCA Root Certificate in Your Browser
  • 5. Understanding Hybrid Mode
  • 6. Replacing Self-signed Certificates with CA-signed Certificates
  • 7. What This Module Covered

  • 05. Enabling SSO and Active Directory Integration
  • 01. Introduction
  • 02. Differentiate Available Authentication Methods with VMware vCenter
  • 03. Adding an ESXi Host to a Directory Service
  • 04. Understanding vSphere Identity Federation
  • 05. ConfigureManage Active Directory Authentication
  • 06. Understanding vSphere Single Sign-on (SSO)
  • 07. EnableDisable Single Sign-on (SSO) Users
  • 08. Logging in to vSphere with Windows Session Credentials
  • 09. Configuring Single Sign-on (SSO) Policies
  • 10. Enabling vCenter Enhanced Linked Mode
  • 11. What This Module Covered

  • 06. Configuring and Administering Role-based Access Control
  • 01. Introduction
  • 02. Compare and Contrast Default SystemSample Roles
  • 03. Determine How Permissions are Applied and Inherited in vCe
  • 04. View and Sort User and Group Lists
  • 05. CreateCloneEdit vCenter Server Roles
  • 06. AddModifyRemove Permissions for Users and Groups on vCente
  • 07. Apply a Role to a UserGroup and to an Object or Group of O
  • 08. Compare and Contrast Propagated and Explicit Permission As
  • 09. Determine the Appropriate Set of Privileges for Common Tas
  • 10. What This Module Covered

  • 07. Securing ESXi Hosts
  • 01. Introduction
  • 02. Control Access to Hosts
  • 03. EnableConfigureDisable Services in the ESXi Firewall
  • 04. Configure a Custom ESXi Firewall Rule
  • 05. Enable Lockdown Mode
  • 06. Securing SSH and ESXi Shell
  • 07. Password Security and Account Lockout
  • 08. Understanding Secure Boot for ESXi
  • 09. Securing ESXi with Trusted Platform Module (TPM)
  • 10. Understanding vSphere Trust Authority
  • 11. What This Module Covered

  • 8. Securing vCenter Server
  • 1. Introduction
  • 2. Controlling Access to vCenter
  • 3. Limiting Network Access
  • 4. vCenter Password Lockout
  • 5. Using vCenter Server Profiles
  • 6. Controlling MOB Access
  • 7. Control Datastore Browser Access
  • 8. What This Module Covered

  • 9. Securing Virtual Machines
  • 1. Introduction
  • 2. Controlling Access to Virtual Machines
  • 3. Control VMware Tools Installation
  • 4. Control VM Data Access
  • 5. Control VM Device Connections
  • 6. Configure Network Security Policies
  • 7. vSGXSecure Enclaves
  • 8. What This Module Covered

  • 10. Securing vSphere with Encryption
  • 1. Introduction
  • 2. Understanding vSphere Encryption
  • 3. Understanding Key Providers
  • 4. Configuring vSphere Native Key Provider
  • 5. Encrypting Virtual Machines
  • 6. Encrypting Storage
  • 7. Encrypting vMotion
  • 8. What This Module Covered

  • 11. Customizing Host Profile Settings
  • 1. Introduction
  • 2. Understanding Host Profiles
  • 3. CreateEditRemove a Host Profile from an ESXi Host
  • 4. Attach and Apply a Host Profile to ESXi Hosts in a Cluster
  • 5. Perform Compliance Scanning and Remediation of ESXi Hosts and Clusters
  • 6. Customizing Host Profiles
  • 7. Scheduling Compliance Checks
  • 8. Import and Export a Host Profile
  • 9. What This Module Covered

  • 12. Next Steps
  • 1. Next Steps
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 34555
    حجم: 698 مگابایت
    مدت زمان: 278 دقیقه
    تاریخ انتشار: 11 اردیبهشت 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید