-
Please login to continue
-
Sign Up For Free
Join the World’s Largest Free Learning Community
- Already have an Alison account? Log In
orThis is the name that will appear on your Certification
-
Forgot password?
Please enter you email address and we will mail you a link to reset your password.
10
Modules
59
Topics
15-20
hours
Modules (10)
Resources ()
-
learn about esx networking, vmware penetration test, and server hardening in this free course.
-
Module 1
Primer and Reaffirming Our Knowledge
Resources availableThis module discusses the components of the ESX network as well as the applications of various ports and VLANs in VMWare infrastructure. This module also analysis the concept of encryption, Linux as the base operating system for VMWare, and password file management in Linux.Primer and Reaffirming Our Knowledge - Learning Outcomes
Start TopicESX Networking and Virtual Components
Start TopicPorts and Virtual Network Management
Start TopicEncryption and Security
Start TopicLinux File System
Start TopicLinux Storage and Password Management
Start TopicPrimer and Reaffirming Our Knowledge - Lesson Summary
Start TopicPrimer and Reaffirming Our Knowledge - Assessment
Start Assessment -
Module 2
Routing and the Security Design of VMware
Resources availableThis module analyses the ways to manipulate traffic routes between VMWare on the ESX hosts and the generic method the VMWare ESX Server uses to virtualize hardware components. This module also explains RAM allocation and memory virtualization in addition to the elements of the VMWare virtual center.Routing and the Security Design of VMware - Learning Outcomes
Start TopicData Routing Security
Start TopicVirtualization
Start TopicMemory Virtualization and Virtual Network Layer
Start TopicVLANs and Virtual Elements
Start TopicRouting and the Security Design of VMware - Lesson Summary
Start TopicRouting and the Security Design of VMware - Assessment
Start Assessment -
Module 3
Remote DataStore Security
Resources availableThis module analyses the Environment and Addressing of the ESX/ESXi in addition to the Fibre Channel SAN. This module also discusses the basic attacks and securing of the fibre channel as well as the comparison of the iSCSI to the fibre channel. LUN masking and zoning along with IPSec implementation will also be covered.Remote DataStore Security - Learning Outcomes
Start TopicZoning and Fibre Channel
Start TopicFibre Channel Attack, iSCSI, and IPSec
Start TopicRemote DataStore Security - Lesson Summary
Start TopicRemote DataStore Security - Assessment
Start Assessment -
Module 4
Penetration Testing 101
Resources availableThis module outlines the benefits of a penetration test, the cost of a hack as well as the currents issues, and evolving threats in our networks. This module also discusses the methodology and types of penetration testing in addition to VMWare issues.Penetration Testing 101 - Learning Outcomes
Start TopicBenefits of Penetration Testing
Start TopicPenetration Testing Methodology
Start TopicPenetration Testing 101 - Lesson Summary
Start TopicPenetration Testing 101 - Assessment
Start Assessment -
Module 5
Information Gathering, Scanning and Enumeration
Resources availableThis module analyses the methods of obtaining information along with the various websites used for security queries and the concept of port scanning. This module explains the overview of enumeration in addition to various types of NMAP scans and attack tools.Information Gathering, Scanning and Enumeration - Learning Outcomes
Start TopicObtaining Information
Start TopicQuery Operators
Start TopicPort Scanning
Start TopicEnumeration and Network Attack Tools
Start TopicInformation Gathering, Scanning and Enumeration - Lesson Summary
Start TopicInformation Gathering, Scanning and Enumeration - Assessment
Start Assessment -
Module 6
Penetration Testing and the Tools of the Trade
Resources availableThis module outlines the vulnerabilities in the network services and types of vulnerability scanners in addition to the password cracking techniques. This module discusses the applications and modules of VASTO as well as ARP cache poisoning.Penetration Testing and the Tools of the Trade - Learning Outcomes
Start TopicVulnerability Scanners
Start TopicCracking and Defence Techniques
Start TopicManaging Vulnerability
Start TopicPenetration Testing and the Tools of the Trade - Lesson Summary
Start TopicPenetration Testing and the Tools of the Trade - Assessment
Start Assessment -
Module 7
DMZ Virtualization and Common Attack Vectors
Resources availableThis module explains the DMZ virtualization, common attack vectors, fake certificate injection as well as vulnerability requirements. This module discusses the timeline, identification, vulnerabilities, and server log-in discussed in schmoo con 2010.DMZ Virtualization and Common Attack Vectors - Learning Outcomes
Start TopicDMZ Virtualization
Start TopicCommon Attack Vectors
Start TopicSchmoo Con 2010
Start TopicDMZ Virtualization and Common Attack Vectors - Lesson Summary
Start TopicDMZ Virtualization and Common Attack Vectors - Assessment
Start Assessment -
Module 8
Hardening Your ESX Server
Resources availableThis module explains the methods of securing virtual machines, file permission, and configuring the service console in ESX. this module also discusses the configuration of the ESX/Linux user authentication as well as SNMP configuration, proper file logging, and root privileges.Hardening Your ESX Server - Learning Outcomes
Start TopicVirtual Machines
Start TopicConfiguring the ESX/ESXi Host
Start TopicPassword Complexity and Proper Logging
Start TopicSNMP Configuration
Start TopicHardening Your ESX Server - Lesson Summary
Start TopicHardening Your ESX Server - Assessment
Start Assessment -
Module 9
ESXi Server and vCenter Server Hardening
Resources availableThis module describes the procedures to harden an ESXi server and the security measures in setting up a virtual center. This module also discusses the VMware converter enterprise and guided consolidation in addition to the 3rd Party Mitigation Tools.ESXi Server and vCenter Server Hardening - Learning Outcomes
Start TopicHardening Your ESXi Server
Start TopicSecurity Setup of the Virtual Center
Start TopicVMware Consolidation and vShield
Start Topic3rd Party Mitigation Tools
Start TopicESXi Server and vCenter Server Hardening - Lesson Summary
Start TopicESXi Server and vCenter Server Hardening - Assessment
Start Assessment -
course assessment: Diploma in Virtualization Security -Advanced VMware Security
-
Module 10
Course assessment
Resources available