Certified Virtualization Security Expert, Part 2 of 6: Routing and Security
Interactive

Certified Virtualization Security Expert, Part 2 of 6: Routing and Security

Biz Library
Updated Jan 21, 2020

This course takes a look at how traffic routs and from the perspective of the hacker and how to manipulate or inspect and change it. It then moves into VM's and ESX hosts on both the same switches or port groups. Then SAN security with both fiber channel and iSCSI, and zoning. It will finish up with Security features of iSCSI, authentication and the steps in securing it. This course contains the following lessons:

Lesson 1:

  • How Traffic Routes between VMs on ESX Hosts
  • Different vSwitches, Same Port Group and VLAN
  • Same vSwitch, Different Port Group and VLAN
  • VMWare Security Design
  • VMWare Infrastructure Architecture and Security
  • The Virtualization Layer
  • Virtualization Layer Continued
  • More Virtualization Layer
  • CPU Virtualization
  • Normal Operation
  • Buffer Overflow.

Lesson 2:

  • CPU Virtualization
  • Memory Virtualization
  • Transparent Page Sharing
  • VMware's Transparent Page Sharing
  • Cloud Burst
  • VM Isolation
  • Protecting VMs.

Lesson 3:

  • Service Console
  • Risk Mitigation in the Service Console
  • Virtual Networking Layer and Virtual Switches
  • Virtual Switch VLANs and
  • Demo: Tagging VLANs
  • Benefits of VLANs
  • Tagging VLANs
  • Virtual Ports
  • Virtualized Storage
  • VMware Virtual Center
  • Virtual Center Certificate
  • VMWare Virtual Center Continued.

Lesson 4:

  • Zoning and Lun Masking
  • Zooming and Lun Masking Continued
  • Port Zoning
  • Hard, Soft, and WWN Zoning
  • Fiber Channel
  • DH-CHAP
  • ESP over Fiber Channel
  • Fiber Channel Attacks: The Basics
  • Steps in Securing Fiber Channel
  • iSCSI vs. Fiber Channel
  • ESX/ESXi and iSCSI SAN Environment and Addressing
  • Hardware vs. Software Initiators
  • Demo: Security Settings
  • IPSec
  • Securing iSCSI Devices.