{"id":4028,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-vmware-nsx-t-data-center-for-intrinsic-security\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-vmware-nsx-t-data-center-for-intrinsic-security","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-vmware-nsx-t-data-center-for-intrinsic-security\/","title":{"rendered":"VMware NSX-T Data Center for Intrinsic Security"},"content":{"rendered":"

[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

VMware NSX-T Data Center for Intrinsic Security<\/h1>\n

This five-day, hands-on VMware NSX-T Security training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T\u2122 Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including distributed and gateway firewall, Intrusion Detection and Prevention (IDS\/IPS), VMware NSX\u00ae Intelligence\u2122, and Network Detection and Response (NDR).<\/p>\n

In addition, you are presented with common configuration issues and given a methodology to resolve them.<\/p>\n

Product Alignment:<\/p>\n

VMware NSX-T Data Center 3.1
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nBy the end of the course, you should be able to meet the following objectives:<\/p>\n

Define information security related concepts
\nExplain different types of firewalls and their use cases
\nDescribe the operation of Intrusion Detection and Intrusion Prevention Systems
\nDescribe the VMware intrinsic security portfolio
\nImplement Zero-Trust Security using VMware NSX\u00ae segmentation
\nConfigure User and Role Management
\nConfigure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies
\nConfigure and troubleshoot Gateway Security
\nUse VMware vRealize\u00ae Log Insight\u2122, VMware vRealize\u00ae Network Insight\u2122, and NSX Intelligence to operate NSX firewalls and generate security recommendations
\nExplain security best practices related to grouping, tagging, and rule configuration
\nDescribe North-South and East-West service insertion
\nDescribe Endpoint Protection
\nConfigure and troubleshoot Distributed IDS\/IPS
\nDescribe the capabilities of Network Detection and Response
\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Ciberseguridad<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato e-learning<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato presencial<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato a distancia<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Acceso al campus<\/strong><\/a><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-subvencionado-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Subvenci\u00f3n disponible<\/strong>
\nA trav\u00e9s de Fundae, cumpliendo requisitos.<\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-duracion-1-290×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Duraci\u00f3n<\/strong>
\n25 horas<\/p>\n

[\/et_pb_blurb][et_pb_counters _builder_version=\u00bb4.4.0″][et_pb_counter percent=\u00bb50″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Dificultad[\/et_pb_counter][et_pb_counter percent=\u00bb80″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Nivel alcanzado[\/et_pb_counter][\/et_pb_counters][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#eeeeee\u00bb min_height=\u00bb194px\u00bb custom_padding=\u00bb17px||19px|||\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbDirigido a\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-dirigido-a-300×268.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n

Experienced security administrators<\/p>\n<\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbConocimientos requeridos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-skils.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ custom_margin=\u00bb||-120px|||\u00bb child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n
\n

You should also have the following understanding or knowledge:<\/p>\n

Good understanding of TCP\/IP services and protocols
\nKnowledge and working experience of network security, including:
\n – L2-L7 Firewalling<\/p>\n

– Intrusion Detection and Prevention Systems<\/p>\n

Knowledge and working experience of VMware vSphere\u00ae environments and KVM-based environments<\/p>\n

The VMware Certified Technical Associate – Network Virtualization is recommended.\n<\/p><\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n

Temario<\/h2>\n

1 Course Introduction<\/p>\n

Introductions and course logistics
\nCourse objectives
\n2 Security Basics<\/p>\n

Define information security related concepts
\nExplain different types of firewalls and their use cases
\nDescribe the operation of Intrusion Detection and Intrusion Prevention Systems
\n3 VMware Intrinsic Security<\/p>\n

Define VMware intrinsic security strategy
\nDescribe VMware intrinsic security portfolio
\nExplain how NSX-T Data Center aligns in the intrinsic security strategy
\n4 Implementing Zero-Trust Security<\/p>\n

Define Zero-Trust Security
\nDescribe the five pillars of a Zero-Trust Architecture
\nDefine NSX segmentation and its use cases
\nDescribe the steps needed to enforce Zero-Trust with NSX segmentation
\n5 User and Role Management<\/p>\n

Integrate NSX-T Data Center and VMware Identity Manager\u2122
\nIntegrate NSX-T Data Center and LDAP
\nDescribe the native users and roles in NSX-T Data Center
\nCreate and assign custom user roles
\n6 Distributed Firewall<\/p>\n

Configure Distributed Firewall rules and policies
\nDescribe the Distributed Firewall architecture
\nTroubleshoot common problems related to Distributed Firewall
\nConfigure time-based policies
\nConfigure Identity Firewall rules
\n7 Gateway Security<\/p>\n

Configure gateway firewall rules and policies
\nDescribe the architecture of the gateway firewall
\nIdentify and troubleshoot common gateway firewall issues
\nConfigure URL analysis and identify common configuration issues
\n8 Operating Internal Firewalls<\/p>\n

Use vRealize Log Insight, vRealize Network Insight, and NSX Intelligence to operate NSX firewalls
\nExplain NSX Intelligence visualization and recommendation capabilities
\nExplain security best practices related to grouping, tagging, and rule configuration
\n9 Network Introspection<\/p>\n

Explain network introspection
\nDescribe the architecture and workflows of North-South and East-West service insertion
\nTroubleshoot North-South and East-West service insertion
\n10 Endpoint Protection<\/p>\n

Explain Endpoint Protection
\nDescribe the architecture and workflows of endpoint protection
\nTroubleshoot endpoint protection
\n11 Advanced Threat Prevention<\/p>\n

Describe the MITRE ATT&CK Framework
\nExplain the different phases of a cyber attack
\nDescribe how NSX security solutions can be used to protect against cyber attacks
\nConfigure and troubleshoot Distributed IDS\/IPS
\nDescribe the capabilities of Network Detection and Response
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

25 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[52,9,11],"tags":[],"class_list":["post-4028","post","type-post","status-publish","format-standard","hentry","category-ciberseguridad","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/4028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=4028"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/4028\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=4028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=4028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=4028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}