Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools
Interactive

Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools

LearnNow Online
Updated Aug 23, 2018

Course description

This course finishes out the series by taking a look at the differences between ESX and ESXi. It discusses Root privileges, controlled access, and securing SNMP configuration. This course discusses how to audit or disable tech support mode and provides an overview of third party security players as add-ons such as: Catbird, Altor, HyTrust, Reflex and Tripwire.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This is part 6 of the series.


Meet the experts

Tim Pierson

Tim one of the World’s leading trainers in technology,
networks, virtualization and, applications. He has been a technical trainer and consultant for security and virtualization for the past 25 years. He has 29 industry technical certifications from CISCO, Microsoft and Novell. Tim has been a noted speaker at many industry events such as Infosec World 2010, Innatech and GISSA. He is a contributing author of VMware vSphere and Virtual Infrastructure Security Securing ESX in the Virtual Environment.

Duane Anderson

Duane has been working in the IT industry for over two decades. He has primarily focused on security related matters such as Penetration Testing and Forensics. He has appeared as an expert witness in multiple court hearings on IT related matters. Duane has worked for or with most US and some foreign military branches, U.S government agencies, banking and regulatory industries and Fortune 500 companies. Duane contributed to the coordination and execution of IT counter-hacking & security courses for the US Marine Corps, US Army, US Air Force, U.S. Treasury, Sprint, IBM, Washington Mutual and Service Canada.

Video Runtime

109 Minutes

Time to complete

129 Minutes

Course Outline

Hardening VirtualCenter and Third Party Mitigation

Hardening VirtualCenter (31:06)

  • Introduction (00:21)
  • Set up the Windows Host for VirtualCenter (01:33)
  • Limit Network Connectivity to VirtualCenter (01:07)
  • Proper Security Measures (01:41)
  • Certificate-Based Encryption (04:46)
  • vCenter Log Files and Rotation (00:52)
  • Collecting vCenter Log Files (00:50)
  • VirtualCenter Custom Roles (01:34)
  • Document and Minitor Changes to the Configuration (00:30)
  • VirtualCenter Add-on Components (01:21)
  • VMware Update Manager (01:36)
  • VMware Converter (02:05)
  • VMware Guided Consolidation (01:17)
  • General Considerations (01:13)
  • Client Components (00:38)
  • Verify the Integrity of the VI Client (02:23)
  • Monitor the Usage of VI Client Instances (01:13)
  • Avoid the Use of Plain-Text Passwords (02:11)
  • vShield Zones Overview (01:30)
  • vShield VM Wall and Flow Features (02:06)
  • Summary (00:08)

Hardening VirtualCenter Demo (25:48)

  • Introduction (00:08)
  • Demo: vShield Manager (05:16)
  • Demo: Deploy OVF Template (04:56)
  • Demo: Configure Install Parameters (06:05)
  • Demo: Add vShield Plugin (03:53)
  • Demo: Datacenter Changes (05:19)
  • Summary (00:08)

Hardening Virtual Center Demo Part 2 (30:32)

  • Introduction (00:08)
  • Demo: Verify Protection (05:01)
  • Demo: Zenmap (06:11)
  • Demo: Deny the vSphere Client at the DataCenter (03:58)
  • Demo: Communicating from Inside the Data Center (05:28)
  • Demo: Scanning (04:27)
  • Demo: VM Flow (05:08)
  • Summary (00:08)

Third Party Mitigation Tools (22:26)

  • Introduction (00:18)
  • The Virtualization Security Players (01:02)
  • 1K View of Altor (01:04)
  • 1K View of Catbird and Hytrust (03:15)
  • 1K View of Reflex (01:47)
  • 1K View of Trend Microsystems (01:26)
  • 1K View of Tripwire (00:45)
  • In-Depth Look at HyTrust (01:11)
  • HyTrust Key Capabilities: Unified Access Control (00:56)
  • HyTrust Key Capaibilties: Policy Management (01:09)
  • HyTrust Key Capabilities: Audit-Quality Logging (01:57)
  • In-Depth Look at Catbird (02:51)
  • Trust Zones (00:57)
  • Catbird: Continuous Compliance (00:41)
  • What's Missing (00:35)
  • Making Sense of It All (02:16)
  • Summary (00:08)
;