Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses


VMware Advanced Security Training (Online On-Demand)

YOUR TRUSTED, ON-SITE AND HOME-STUDY TRAINING PARTNER
Have you told someone about RTEK 2000 today?

Home and Office Study at Affordable Price for VMware Advanced Security vSphere 5.5 Certification.
Product ID: RTK VM-Secure

VMware Advanced Security Training

The Best Alternative to In-Class Training:

VMware Trainer
  • Repeat as many times as you want;
  • Full Audio, Video, and Demonstration components;
  • Interactive Hands-on-lab Simulations;
  • Learn at your place
  • Schedule at your own pace and time!


best online training"I love the convenience of having the trainer at any time and schedule. You can always get back to the same lecture and repeat as many times as needed. I have passed a VMware exam on the first try. I have also used Transcender simulation software to test my knowledge before exam." Beth Marwin. Technical Support Engineer

Shortcuts to:

  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00! (Retail Price $495.50)
for 12-month online access


VMware Advanced Security vSphere 5.5 Training VMTraining Official Advanced VMware Security Training is complete preparation for the Certified Virtualization Security Expert™ (CVSE™) certification exam.

VMware Advanced Security vSphere 5.5 Training Imagine what may happen when a critical problem presents itself in the field and all you have is "basic" training. In the Advanced VMware Security course you receive the highest degree of training from our experienced IT professionals that have seen it all.

VMware Advanced Security vSphere 5.5 Training This course is far more advanced than any typical security course. Students will learn about the security protocols that administrators utilize to secure their environment and dive head first into the actual workings of the VMware environment. Students will learn about various threats and how to prevent and secure the VMware environment from them. It is recommended that students have an in-depth knowledge of VMware's ESX/ESXI virtualization environment.

The Expert Trainers:
Tim Pierson Tim Pierson

Tim Pierson has been a technical trainer and consultant for security and virtualization for the past 25 years. He has 29 industry technical certifications from CISCO, EC-Council, Microsoft and Novell. Tim has been a noted speaker at many industry events such as Infosec World 2010, Innatech and GISSA. He is a Contributing author of (VMware vSphere and Virtual Infrastructure Security Securing ESX in the Virtual Environment÷. He was named Instructor of the Year from EC-Council in 2009.

D. Anderson Duane Anderson

Duane Anderson - CVSE, CVE, Security+, CPTE, CPTC, CDFE, CEH, VMTraining Certified Instructor Duane has been working in the IT industry for the last two decades. He has primarily focused on security related matters such as Penetration Testing and Forensics. He has appeared as an expert witness in multiple court hearings on IT related matters. Duane has worked for or with most US and some foreign military branches, U.S government agencies, banking and regulatory industries and Fortune 500 companies. Duane contributed to the coordination and execution of IT counter-hacking and security courses for the US Marine Corps, US Army, US Air Force, U.S. Treasury, Sprint, IBM, Washington Mutual and Service Canada.

     
Course Outline

Chapter 01 - Primer and Reaffirming Our Knowledge
Primer and Reaffirming Our Knowledge
ESX Networking Components
How Virtual Ethernet Adapters Work
How Virtual Switches Work
VMsafe Overview
Current VMsafe Partners
Virtual Switch vs. Physical Switch
Spanning Tree Protocol Not Needed
Virtual Ports
Uplink Ports
Port Groups
Uplinks
Virtual Switch Correctness
VLANs in VMWare Infrastructure
NIC Teaming
Load Balancing
Failover Configurations
Normal Operation
Connection Fails
Signaling Process - Beaconing
Data Rerouted
Layer 2 Security Features
Forged Transmits
Managing the Virtual Network
Symmetric vs. Asymmetric Encryption
Demo - Security in vSwitches
Hashes
Demo - Hashes
Digital Signatures
Breaking SSL Traffic
Demo - Lab Environment
Demo - ARP Cache Poison
File System Structure
Kernel
Processes
Starting and Stopping Processes
Interacting with Processes
Accounts and Groups
Password & Shadow File Formats
Accounts and Groups (cont.)
Linux and UNIX Permissions
Demo - Intro to Linux
Set UID Programs
Logs and Auditing
Chapter 01 Review
Chapter 02 - Routing and the Security Design of VMware
Routing and the Security Design of Vmware
Security of Routing Data
How Traffic Routes Between VMs on ESX Hosts
Different vSwitches, Same Port Group and VLAN
Same vSwitch, Different Port Group and VLAN
Same vSwitch, Same Port Group and VLAN
Security Design of the VMware Infrastructure Architecture
VMware Infrastructure Architecture and Security Features
Virtualization Layer
CPU Virtualization
Memory Virtualization
Cloud Burst
Virtual Machines
Service Console
Virtual Networking Layer
Virtual Switches
Virtual Switch VLANs
Demo - Using VLAN¦s
Major Benefits of Using VLANs
Standard VLAN Tagging
Virtual Ports
Virtual Network Adapters
Virtualized Storage
VMware VirtualCenter
Chapter 02 Review
Chapter 03 - Remote DataStore Security
Remote DataStore Security
ESX / ESXi and Fibre Channel SAN Environment and Addressing
Mask and Zone SAN Resources Appropriately
LUN Masking and Zoning
Fiber Channel
DH-CHAP
Switch Link
What is FC-SP (Fiber Channel - Security Protocol)?
ESP Over Fiber Channel
Fiber Channel Attacks - The Basics
Steps in Securing Fiber Channel
iSCSI vs. Fiber Channel
ESX / ESXi and iSCSI SAN Environment and Addressing
Hardware vs. Software Initiators
iSCSI Security Features
Secure iSCSI Devices Through Authentication
Demo - Storage Security Settings
IPSec
IPSec Implementation
Steps in Securing iSCSI
Chapter 03 Review
Chapter 04 - Penetration Testing 101
Penetration Testing 101
What is a Penetration Test
Benefits of a Penetration Test
What Does a Hack Cost You?
Cost of a Hack - Example
Current Issues
Chained Exploit Example
Demo - Gonzalez Indictment
The Evolving Threat
Methodology for Penetration Testing / Ethical Hacking
Penetration Testing Methodologies
Types of Tests
Website Review
Demo - Website Review
Seven Management Errors
Some VMware Issues
Not Just About the Tools
Chapter 04 Review
Chapter 05 - Information Gathering, Scanning and Enumeration
Information Gathering, Scanning and Enumeration
What is the Hacker Wanting to Know?
Methods of Obtaining Information
Footprinting
Maltego
Maltego GUI
Demo - Maltego
Firecat v1.6.2
Demo - Firecat
FireFox Fully Loaded
Johnny.Ihackstuff.com hackersforcharity.org
Google and Query Operators
Google
Shodan - You Have to be Kidding Me!
Demo - Shodan
Introduction to Port Scanning
Popular Port Scanning Tools
ICMP Disabled
NMAP TCP Connect Scan
TCP Connect Port Scan
Nmap
Half-open Scan
Firewalled Ports
NMAP and Your VMware Servers
Additional NMAP Scans
NMAP UDP Scans
Demo - NMAP
UDP Port Scan
Enumeration Overview
Banner Grabbing
Banner Grabbing with Telnet
SuperScan 4 Tool: Banner Grabbing
DNS Enumeration
Zone Transfers
Backtrack DNS Enumeration
Active Directory Enumeration
LDAPMiner
Null Sessions
Syntax for a Null Session
Viewing Shares
Enumeration with Cain and Abel
NAT Dictionary Attack Tool
THC-Hydra
Injecting Abel Service
Demo - Cain
Chapter 05 Review
Chapter 06 - Penetration Testing and the Tools of the Trade
Penetration Testing and the Tools of the Trade
Vulnerabilities in Network Services
BackTrack4
Vulnerability Scanners
Nessus
Nessus Report
Saint
SAINT - Sample Report
OpenVAS
OpenVAS Infrastructure
OpenVAS Client
Demo - OpenVAS
Windows Password Cracking
Syskey Encryption
Cracking Techniques
Rainbow Tables
Disabling Auditing
Clearing the Event log
NTFS Alternate Data Stream
Stream Explorer
Encrypted Tunnels
Port Monitoring Software
RootKit
The Metasploit Project
Defense in Depth
Meterpreter
VASTO
VASTO Modules
Fuzzers
SaintExploit at a Glance
Core Impact Overview
Core Impact
Total Exploits from NVD Included in the Penetration Testing Tool
Wireshark
TCP Stream Re-assembling
ARP Cache Poisoning
ARP Cache Poisoning (Linux)
Cain and Abel
Ettercap
Chapter 06 Review
Chapter 07 - DMZ Virtualization and Common Attack Vectors
DMZ Virtualization and Common Attack Vectors
DMZ Virtualization with VMware Infrastructure
Virtualized DMZ Networks
Three Typical Virtualized DMZ Configurations
Partially Collapsed DMZ with Separate Physical Trust Zones
Partially Collapsed DMZ with Virtual Separation of Trust Zones
Fully Collapsed
Best Practices for Achieving a Secure Virtualized DMZ Deployment
Harden and Isolate the Service Console
Clearly Label Networks for Each Zone within the DMZ
Set Layer 2 Security Options on Virtual Switches
Enforce Separation of Duties
Use ESX Resource Management Capabilities
Regularly Audit Virtualized DMZ Configuration
Common Attack Vectors
How We Understand Fake Certificate Injection to Work
Generic TLS Renegotiation Prefix Injection Vulnerability
Testing for a Renegotiation Vulnerability
Vulnerability Requirements
Generic Example
Patched Server with Disabled Renegotiation
Demo - SSL Renegotiation Test
Schmoo Con 2010: Virtualization Vulnerabilities Found!
Schmoo Con 2010: Timeline
Schmoo Con 2010: Identification
Schmoo Con 2010: Server Log In
Schmoo Con 2010: Server on the Internet
Schmoo Con 2010: Vulnerability
Schmoo Con 2010: Redirection Proxy
Schmoo Con 2010: Vulnerable Versions
Schmoo Con 2010: Gueststealer
Chapter 07 Review
Chapter 08 - Hardening Your ESX Server
Hardening Your ESX Server
Section 1 - Virtual Machines
Secure Virtual Machines as You Would Secure Physical Machines
Disable Unnecessary or Superfluous Functions
Take Advantage of Templates
Prevent Virtual Machines from Taking Over Resources
Isolate Virtual Machine Networks
Example Network Architecture
Arp Cache Poisoning
VM Segmentation
Minimize Use of the vSphere Console
Virtual Machine Files and Settings
Disable Copy and Paste Operations
Limit Data Flow from the Virtual Machine to the Datastore
SetInfo Hazard
Do Not Use Nonpersistent Disks
Ensure Unauthorized Devices are Not Connected
Prevent UnAuthorized Removal or Connection of Devices
Avoid Denial of Service Caused by Virtual Disk Modification Operations
Specify the Guest Operating System Correctly
Verify Proper File Permissions for Virtual Machine Files
Demo - Security on your Virtual Machines
Section 2 - Configuring the ESX/ESXi Host
Configuring the Service Console in ESX
Demo - Control VIC Access
Demo - Service Console Administration
Configure the Firewall for Maximum Security Demo - Firewall Configuration
Limit the Software and Services Running in the Service Console
Processes Running in SC
Use vSphere Client and vCenter to Administer the Hosts Instead of Service Console
Use a Directory Service for Authentication
Demo - AD Integration
Strictly Control Root Privileges
Control Access to Privileged Capabilities
Demo - SSH Access and SUDO
Establish a Password Policy for Local User Accounts
ESX/Linux User Authentication
Configuring ESX Authentication
ESX Authentication Settings
Reusing Passwords
Configuring Password Complexity
Do Not Manage the Service Console as a Linux Host
Maintain Proper Logging
ESX4 Log File Locations
Maintain Proper Logging (cont.)
ESX Log Files
Establish and Maintain File System Integrity
Secure the SNMP Configuration
Protect Against the Root File System Filling Up
Disable Automatic Mounting of USB Devices
Isolate the Infrastructure-related Networks
VLAN1
Configure Encryption for Communication Between Clients and ESX/ESXi
Label Virtual Networks Clearly
Do Not Create a Default Port Group
Do Not Use Promiscuous Mode on Network Interfaces
Protect Against MAC Address Spoofing
Secure the ESX/ESXi Host Console
Chapter 08 Review
Chapter 09 - Hardening Your ESXi Server
Hardening Your ESXi Server
Differences: VMware ESX vs. ESXi
Differences: VMware ESX and ESXi
Configuring Host-level Management in ESXi
ESXi -Strictly Control Root Privileges
Control Access to Privileged Capabilities ESXi
DCUI
Control Access to Privileged Capabilities ESXi (cont.)
Maintain Proper Logging - ESXi
Establish and Maintain Configuration File Integrity ESXi
Ensure Secure Access to CIM
Audit or Disable Technical Support Mode
Chapter 09 Review
Chapter 10 - Hardening Your vCenter Server
Hardening Your vCenter Server
VirtualCenter
Set Up the Windows Host for Virtual Center with Proper Security
Limit Network Connectivity to Virtual Center
Use Proper Security Measures When Configuring the Database for Virtual Center
Enable Full and Secure Use of Certificate-based Encryption
Default Certificates
Replacing Server-Certificates
vCenter Log Files and Rotation
Collecting vCenter Log Files
Use VirtualCenter Custom Roles
Document and Monitor Changes to the Configuration
VirtualCenter Add-on Components
VMware Update Manager
VMware Converter Enterprise
VMware Guided Consolidation
General Considerations
Client Components
Verify the Integrity of VI Client
Monitor the Usage of VI Client Instances
Avoid the Use of Plain-Text Passwords
vShield Zones Overview
vShield VM Wall Features
vShield VM Flow Features
Demo - vShield Zones
Chapter 10 Review
Chapter 11 - 3rd Party Mitigation Tools
3rd Party Mitigation Tools
Virtualization: Greater Flexibility, Diminished Control
Making Sense of the Virtualization Security Players
1K View of Players
In-depth Look - Authors Picks HyTrust Appliance
HyTrust Appliance - Key Capabilities (cont.): Unified Access Control
HyTrust Appliance - Key Capabilities (cont.): Policy Management
HyTrust Appliance - Key Capabilities (cont.): Audit-quality Logging
HyTrust Appliance - Key Capabilities (cont.): Hypervisor Hardening
In-depth Look - Authors Picks Catbird
Catbird - Policy-driven Security
Catbird - Continuous Compliance
What's Missing?
Making Sense of It All
Chapter 11 Review
Course Closure

Package Includes:

  • 12 Months Online On-Demand Access featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable courseware
  • Mobile Access via iPhones and iPads
  • Proven technique- Actual Exam Secrets Review
  • Free 1 Year Upgrade Policy

Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.