VMware NSX-T Data Center for Intrinsic Security

This five-day, hands-on VMware NSX-T Security training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T™ Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including distributed and gateway firewall, Intrusion Detection and Prevention (IDS/IPS), VMware NSX® Intelligence™, and Network Detection and Response (NDR).

In addition, you are presented with common configuration issues and given a methodology to resolve them.

Product Alignment:

VMware NSX-T Data Center 3.1

Objetivos

By the end of the course, you should be able to meet the following objectives:

Define information security related concepts
Explain different types of firewalls and their use cases
Describe the operation of Intrusion Detection and Intrusion Prevention Systems
Describe the VMware intrinsic security portfolio
Implement Zero-Trust Security using VMware NSX® segmentation
Configure User and Role Management
Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies
Configure and troubleshoot Gateway Security
Use VMware vRealize® Log Insight™, VMware vRealize® Network Insight™, and NSX Intelligence to operate NSX firewalls and generate security recommendations
Explain security best practices related to grouping, tagging, and rule configuration
Describe North-South and East-West service insertion
Describe Endpoint Protection
Configure and troubleshoot Distributed IDS/IPS
Describe the capabilities of Network Detection and Response

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Descargar la información del curso

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
25 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

Experienced security administrators

Conocimientos requeridos

You should also have the following understanding or knowledge:

Good understanding of TCP/IP services and protocols
Knowledge and working experience of network security, including:
– L2-L7 Firewalling

– Intrusion Detection and Prevention Systems

Knowledge and working experience of VMware vSphere® environments and KVM-based environments

The VMware Certified Technical Associate – Network Virtualization is recommended.

Temario

1 Course Introduction

Introductions and course logistics
Course objectives
2 Security Basics

Define information security related concepts
Explain different types of firewalls and their use cases
Describe the operation of Intrusion Detection and Intrusion Prevention Systems
3 VMware Intrinsic Security

Define VMware intrinsic security strategy
Describe VMware intrinsic security portfolio
Explain how NSX-T Data Center aligns in the intrinsic security strategy
4 Implementing Zero-Trust Security

Define Zero-Trust Security
Describe the five pillars of a Zero-Trust Architecture
Define NSX segmentation and its use cases
Describe the steps needed to enforce Zero-Trust with NSX segmentation
5 User and Role Management

Integrate NSX-T Data Center and VMware Identity Manager™
Integrate NSX-T Data Center and LDAP
Describe the native users and roles in NSX-T Data Center
Create and assign custom user roles
6 Distributed Firewall

Configure Distributed Firewall rules and policies
Describe the Distributed Firewall architecture
Troubleshoot common problems related to Distributed Firewall
Configure time-based policies
Configure Identity Firewall rules
7 Gateway Security

Configure gateway firewall rules and policies
Describe the architecture of the gateway firewall
Identify and troubleshoot common gateway firewall issues
Configure URL analysis and identify common configuration issues
8 Operating Internal Firewalls

Use vRealize Log Insight, vRealize Network Insight, and NSX Intelligence to operate NSX firewalls
Explain NSX Intelligence visualization and recommendation capabilities
Explain security best practices related to grouping, tagging, and rule configuration
9 Network Introspection

Explain network introspection
Describe the architecture and workflows of North-South and East-West service insertion
Troubleshoot North-South and East-West service insertion
10 Endpoint Protection

Explain Endpoint Protection
Describe the architecture and workflows of endpoint protection
Troubleshoot endpoint protection
11 Advanced Threat Prevention

Describe the MITRE ATT&CK Framework
Explain the different phases of a cyber attack
Describe how NSX security solutions can be used to protect against cyber attacks
Configure and troubleshoot Distributed IDS/IPS
Describe the capabilities of Network Detection and Response

Solicita información del curso

Esta web utiliza cookies propias y de terceros para su correcto funcionamiento y para fines analíticos. Contiene enlaces a sitios web de terceros con políticas de privacidad ajenas que podrás aceptar o no cuando accedas a ellos. Al hacer clic en el botón Aceptar, acepta el uso de estas tecnologías y el procesamiento de tus datos para estos propósitos. Ver Política de cookies
Privacidad