Duration
30 days.
Prerequisites
This course has the following prerequisites:
- Equivalent knowledge and administration experience with ESXi and vCenter
- Experience with working at the command line is highly recommended.
Skills Gained
By the end of the course, you should be able to meet the following objectives:
- Identify recommendations for vCenter and ESXi security
- Explain the importance of the vSphere Security Configuration Guide
- Configure Lockdown Mode and ESXi firewall
- Identify the role of vTPM and VBS for securing VMs
- Recognize the rules for applying permissions on vCenter
- Identify the services used for vCenter Single Sign-On
- Implement Two-Factor Authentication on vCenter
- Describe the architecture of identity federation
- Use VMware Certificate Authority and VMware Endpoint Certificate Store to configure vSphere security certificate management
- Use the vSphere Client and CLI utilities to Manage and Troubleshoot vCenter Certificates
- Describe the components of a VM encryption architecture
- Recognize the role of the Key Management Server in vCenter
- Describe vSphere Trust Authority
- Configure vSphere Trust Authority
Who Can Benefit?
- System administrators and engineers
Outline for VMware vSphere: Security [V8]-On Demand Training
Outline
Course Introduction
- Introductions and course logistics
- Course objective
General Security Awareness
- Identify the security recommendations for vCenter
- Recognize strategies for securing the vSphere management network
- Identify the security recommendations for ESXi hosts
- Explain the importance of the vSphere Security Configuration Guide
- Explain the importance of VMware Security Advisories
Securing ESXi
- Explain how to navigate the Direct Console User Interface to configure an ESXi host
- Demonstrate how to configure the ESXi host settings
- Describe how UEFI Secure Boot functions in ESXi hosts
- Demonstrate how to configure the ESXi firewall
- Explain how to configure directory services to authenticate user logins
Securing VMs
- Identify the role of vTPM and VBS for securing VMs
- Describe the process of activating encrypted vSphere vMotion
vSphere Authentication
- Recognize the identity sources on your vCenter
- Define the term permission in the context of vCenter
- Identify the services used for vCenter Single Sign-On
- Identify methods for two-factor authentication on vCenter
- Configure identity federation
vSphere Certificate Authority
- Describe how to replace vCenter certificates in vSphere Certificate Manager
- Explain how the vSphere Client manages ESXi certificates
- Identify common certificate-related issues in vCenter
- Troubleshoot certificate-related issues in vCenter
VM Encryption
- Describe the components of a VM encryption architecture
- Explain the process of managing encrypted VMs
- List VM encryption events and alarms
Key Provides and the vSphere Trust Authority
- Recognize the role of the Key Provider in vCenter
- Describe vSphere Trust Authority
- List the use cases of vSphere Trust Authority
- Configure vSphere Trust Authority
Product Alignment
- VMware ESXi 8.0
- VMware vCenter 8.0