VMware NSX-T Data Center for Intrinsic Security
This five-day, hands-on VMware NSX-T Security training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T™ Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including distributed and gateway firewall, Intrusion Detection and Prevention (IDS/IPS), VMware NSX® Intelligence™, and Network Detection and Response (NDR).
In addition, you are presented with common configuration issues and given a methodology to resolve them.
Product Alignment:
VMware NSX-T Data Center 3.1
Objetivos
Define information security related concepts
Explain different types of firewalls and their use cases
Describe the operation of Intrusion Detection and Intrusion Prevention Systems
Describe the VMware intrinsic security portfolio
Implement Zero-Trust Security using VMware NSX® segmentation
Configure User and Role Management
Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies
Configure and troubleshoot Gateway Security
Use VMware vRealize® Log Insight™, VMware vRealize® Network Insight™, and NSX Intelligence to operate NSX firewalls and generate security recommendations
Explain security best practices related to grouping, tagging, and rule configuration
Describe North-South and East-West service insertion
Describe Endpoint Protection
Configure and troubleshoot Distributed IDS/IPS
Describe the capabilities of Network Detection and Response
Ciberseguridad
Disponible en formato e-learning
Disponible en formato presencial
Disponible en formato a distancia
Descargar la información del curso
Subvención disponible
A través de Fundae, cumpliendo requisitos.
Duración
25 horas
- Dificultad 50%
- Nivel alcanzado 80%
Dirigido a
Experienced security administrators
Conocimientos requeridos
You should also have the following understanding or knowledge:
Good understanding of TCP/IP services and protocols
Knowledge and working experience of network security, including:
– L2-L7 Firewalling
– Intrusion Detection and Prevention Systems
Knowledge and working experience of VMware vSphere® environments and KVM-based environments
The VMware Certified Technical Associate – Network Virtualization is recommended.
Temario
1 Course Introduction
Introductions and course logistics
Course objectives
2 Security Basics
Define information security related concepts
Explain different types of firewalls and their use cases
Describe the operation of Intrusion Detection and Intrusion Prevention Systems
3 VMware Intrinsic Security
Define VMware intrinsic security strategy
Describe VMware intrinsic security portfolio
Explain how NSX-T Data Center aligns in the intrinsic security strategy
4 Implementing Zero-Trust Security
Define Zero-Trust Security
Describe the five pillars of a Zero-Trust Architecture
Define NSX segmentation and its use cases
Describe the steps needed to enforce Zero-Trust with NSX segmentation
5 User and Role Management
Integrate NSX-T Data Center and VMware Identity Manager™
Integrate NSX-T Data Center and LDAP
Describe the native users and roles in NSX-T Data Center
Create and assign custom user roles
6 Distributed Firewall
Configure Distributed Firewall rules and policies
Describe the Distributed Firewall architecture
Troubleshoot common problems related to Distributed Firewall
Configure time-based policies
Configure Identity Firewall rules
7 Gateway Security
Configure gateway firewall rules and policies
Describe the architecture of the gateway firewall
Identify and troubleshoot common gateway firewall issues
Configure URL analysis and identify common configuration issues
8 Operating Internal Firewalls
Use vRealize Log Insight, vRealize Network Insight, and NSX Intelligence to operate NSX firewalls
Explain NSX Intelligence visualization and recommendation capabilities
Explain security best practices related to grouping, tagging, and rule configuration
9 Network Introspection
Explain network introspection
Describe the architecture and workflows of North-South and East-West service insertion
Troubleshoot North-South and East-West service insertion
10 Endpoint Protection
Explain Endpoint Protection
Describe the architecture and workflows of endpoint protection
Troubleshoot endpoint protection
11 Advanced Threat Prevention
Describe the MITRE ATT&CK Framework
Explain the different phases of a cyber attack
Describe how NSX security solutions can be used to protect against cyber attacks
Configure and troubleshoot Distributed IDS/IPS
Describe the capabilities of Network Detection and Response
Comentarios recientes