Loading

Alison's New App is now available on iOS and Android! Download Now

Diploma in Virtualization Security -Advanced VMware Security

Learn about ESX Networking, the virtual environment penetration test, and server hardening in this free online course.

Publisher: Workforce Academy Partnership
Virtualization Security -Advanced VMware is a free online course from Alison that analyses ESX Networking and the components of the virtual machine in addition to the penetration testing of the virtual environment. Learners who take the course will get to learn about the prevention of common attack vectors, the methods of hardening the ESX server, and the virtual center server. Register for this course and begin your next learning journey today!
Diploma in Virtualization Security -Advanced VMware Security
  • Duration

    15-20 Hours
  • Students

    182
  • Accreditation

    CPD

Description

Modules

Outcome

Certification

View course modules

Description

Certified Virtualization Security Expert is a free online course from Alison that provides cybersecurity enthusiasts as well as learners, an advanced update understanding of ESX Networking and the elements of the virtual machine. You also be taught about the penetration testing of the virtual environment and the way of hardening the virtual center. Do you seek to figure out how hackers gain access to vital information from a network and ways to prevent these attacks? Then this course is for you! In this course, the components and applications of the ESX network along with the working principles of the virtual Ethernet adapters and virtual switches will be introduced to you. Learners will be taught the applications of various ports and VLANs in VMWare infrastructure. Learn about the errors and corrections in the management of a virtual network. Study the types, pros, and cons of encryption in addition to the types of hashes. You will be taught about Linux as the base operating system for VMWare in addition to the high-level map of the file system, its modular architecture, kernel, and processes. Learners who take this course will gain vital knowledge of password file management in Linux as well as digital signatures and breaking the SSL traffic. The ways to manipulate traffic routes between VMWares on the ESX hosts will also be taught in this course. You will study the generic method the VMWare ESX Server uses to virtualize hardware components. Learn also about the virtualization layer, CPU virtualization, ram allocation, and memory virtualization.

Furthermore, this course covers the ESX/ESXi together with the Fibre Channel SAN Environment and Addressing. You will learn about the basic attacks and securing of the fiber channel. The concept and benefits of a penetration test in addition to the cost of a hack will also be explained in this course. Study the evolving threats and methodology for penetration testing. Learn about the methods of obtaining information and what the hacker wants to know. Footprinting, the GUI of Maltego in addition to Firecat tools will be outlined in this course. Taking this course provides a modern description of query operators and the uses of Shodan. You will learn about the scanning tools and concept of port scanning together with the types and applications of NMAP scans. Gain an overview and types of enumeration as well as attack tools like the NAT dictionary attack Tool, banner grabbing, Injecting Abel service. You will learn the vulnerabilities in the network services in addition to the application of Backtrack4 and various types of vulnerability scanners. Study the password cracking techniques and the functions of a rainbow table. Learn about data streaming, port monitoring software, and Meterpreter. You will gain up-to-date knowledge of the applications and modules of VASTO along with tools used in managing security vulnerability. Learn about ARP cache poisoning and core impact.

Lastly, security options, resource management capabilities, and common attack vectors will be covered in this course along with the deployment of the virtualized DMZ configurations. If you seek to gain a proper understanding of DMZ virtualization, then this course is best for you as the types, deployment, cons, and pros of the virtualized DMZ configurations are extensively covered. Moreso, the timeline, identification, vulnerabilities, and server log-in discussed in Schmoo Con 2010 will also be highlighted in this course. You will learn about securing virtual machines and file permission. You will study the configuration of the service console in ESX and Firewall in addition to the processes running in the service console. Study the configuration of the ESX/Linux user authentication and proper file logging. Learn about the SNMP configuration along with the disabling of auto-mounting of USB devices. The security measures in setting up the host and database for a virtual center along with the ways to harden an ESXi server will also be covered in this topic. Finally, the VMware converter enterprise, vShield zones overview, and 3rd Party Mitigation Tools will be discussed in this course. This course will be of great benefit to learners, students, researchers, enthusiastic penetration testers, ethical hackers, and all who have interests in virtual network security. Register for this course today and begin your learning journey!

Start Course Now

Careers