VMware Security Operations for the Software-Defined Data Center/2V0-602

Download Course Contents

VMware Security Operations for the Software-Defined Data Center Course Overview

In this course, you will learn how to use the VMware Software-Defined Data Center product portfolio and tools to better manage administrator access, harden your VMware vSphere® environment, and secure data at rest and in motion. You will also learn compliance and automation to help you ensure that your deployments align with your security policies.

Target Audience

  • Experienced system administrators
  • Cloud administrators
  • System integrators
  • Operational developers

This is a Rare Course and it can be take up to 3 weeks to arrange the training.

  • 1. Do you have limited Window for training?
  • 2. Can you only spend 4-hours per day?
  • 3. Do you want to start training immediately?
  • If your answer is yes to any one of the above, you need 1-on-1- Training
The 1-on-1 Advantage
Methodology
Flexible Dates
4-Hour Sessions
  • View video
  • The course will be free if we are not able to start within 7 days of booking.
  • Only applicable for courses on which this logo appears.

Your will learn:

Module 1: Course Introduction
  • Introductions and course logistics
  • Course objectives
  • Key IT security principles for the SDDC
  • Differences between securing traditional infrastructures and virtual infrastructures
  • Identity and access management concepts for the SDDC
  • Methods to secure your virtual infrastructure components
  • EUC and mobile computing risks
  • Guest operating system access security
  • Hardening concepts and how they apply to virtual infrastructure components
  • Role-based access control concepts for vSphere and View
  • Configuring role-based access control for ESXi, vCenter Server, and View
  • Configuring vSphere single sign-on for administrative access
  • Password hardening options
  • Configuring ESXi local user management and integration with Active Directory
  • ESXi security profiles and access to services
  • ESXi host hardening
  • Implementing lockdown mode on ESXi hosts
  • Configuring ESXi host-based firewall settings
  • vCenter Server hardening
  • Tools to reduce infrastructure vulnerabilities
  • Implementing hardening best practices based on the vSphere Hardening Guide
  • Data encryption technology
  • Data-at-rest encryption options for server and desktop virtual machines
  • View endpoint protection best practices
  • Datastore security options
  • View PCoIP encryption
  • VMware Operating System Optimization Tool for desktop and server virtual machines
  • Introducing VMware AirWatch for mobile and desktop security
  • VMware AirWatch and VMware NSX integration
  • Configuring vSphere security certificate management using VMware Certificate Authority and VMware Endpoint Certificate services
  • Using the Certificate Automation Tool to manage vSphere certificates
  • Establishing and using an IPsec VPN
  • Using the VMware Endpoint Certificate Store
  • Managing network data in an SDDC
  • Security policies and settings of vSphere switches
  • Configuring vSphere advanced security features for distributed switches
  • Using the VMware NSX distributed firewall and distributed router to implement microsegmentation
  • Protecting and managing north-south traffic with VMware NSX® Edge™ services gateway and physical firewalls
  • Managing access to the vSphere management network
  • Using VMware NSX® Virtual Switch™ features to implement network security
  • Designing clusters and racks to minimize vulnerabilities
  • Limiting access to vSphere management networks
  • Hardening network infrastructure components
  • Securing virtual machine guest operating systems
  • Mobile device security with VMware AirWatch
  • Using VMware NSX with Service Composer for Endpoint Protection
  • Using distributed firewalls and microsegmentation to isolate and protect virtual machines
  • Using VMware NSX identity-based firewalls to control network traffic based on Active Directory user IDs
  • Additional VMware NSX functionality using integration with third-party solutions
  • Using vRealize Log Insight to identify and analyze security-related log entries
  • Implementing a distributed logging environment
  • vRealize Configuration Manager compliance checkers
  • vRealize Configuration Manager compliance monitoring
  • Using VMware functions and tools to enforce consistent organizational security policies during infrastructure deployment
  • Automating responses to security events
  • Implementing security automation with security groups, security policies, and security tags
  • Automatically applying security settings to newly provisioned virtual machines based on VMware NSX security policies
Live Online Training (Duration : 40 Hours) Fee On Request
Group Training Date On Request
1-on-1 Training
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Classroom Training
Duration : On Request
Fee : On Request
On Request
Classroom Training is available. Enquire for the fee Click
Ultra-Fast Track

If you can't spare 40 hours. We can offer you an Ultra-Fast Track for 20 hours

Course Prerequisites
  • Completion of one of the following:
    • VMware vSphere: Install, Configure, Manage [V5.5 or V6]
    • VMware vSphere: Fast Track
    • Equivalent knowledge
  • Experience working at the command prompt and with scripting tools like Windows PowerShell is highly recommended.
  • An understanding of corporate or enterprise network implementations.

By the end of the course, you should be able to meet the following objectives:

  • Describe the concepts involved in securing a software-defined data center (SDDC) and protecting the data in the data center
  • Manage vSphere administrator access to hosts and the VMware vCenter Server™ system based on identified job roles and requirements
  • Implement best-practice security of vSphere components based on organizational security policies
  • Configure data protection for data at rest and data in motion
  • Manage protection for virtual machines, endpoints, and networks
  • Use micro segmentation to protect and manage multitier applications and network data
  • Perform activity monitoring and logging, and explore relevant logs to meet compliance requirements
  • Use VMware NSX® security groups, policies, and tags to automate deployment and security processes
  • Use automation to respond to security-related events

Request More Information

Add Name and Email Address of participant (If different from you)

FAQ's


Yes, fee excludes local taxes.
The Fee includes:
  • Official courseware
Yes, Koenig Solutions is a VMware accredited training centre