Certified Virtualization Security Expert (Advanced VMware Security) Series!

Overview: This series covers everything you need to know becoming a Certified Virtualization Security Expert. Students will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools.

Series Taught By:  Tim Pierson and Duane Anderson

Available CEUs for Course Series Completion: 18
Students can earn up to 18 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

$150.00Add to cart

Course Modules

(Duration: 2h 38m)

  1. Workbook (Pdf)
  2. Primer and Reaffirming Our Knowledge
  3. ESX Networking Components
  4. How Virtual Ethernet Adapters Work
  5. How Virtual Switches Work
  6. VMsafe Overview
  7. Current VMsafe Partners
  8. Virtual Switch vs. Physical Switch
  9. Spanning Tree Protocol Not Needed
  10. Virtual Ports
  11. Uplink Ports
  12. Port Groups
  13. Uplinks
  14. Virtual Switch Correctness
  15. VLANs in VMWare Infrastructure
  16. NIC Teaming
  17. Load Balancing
  18. Failover Configurations
  19. Normal Operation
  20. Connection Fails
  21. Signaling Process – Beaconing
  22. Data Rerouted
  23. Layer 2 Security Features
  24. Forged Transmits
  25. Managing the Virtual Network
  26. Symmetric vs. Asymmetric Encryption
  27. Demo – Security in vSwitches
  28. Hashes
  29. Demo – Hashes
  30. Digital Signatures
  31. Breaking SSL Traffic
  32. Demo – Lab Environment
  33. Demo – ARP Cache Poison
  34. File System Structure
  35. Kernel
  36. Processes
  37. Starting and Stopping Processes
  38. Interacting with Processes
  39. Accounts and Groups
  40. Password & Shadow File Formats
  41. Accounts and Groups (cont.)
  42. Linux and UNIX Permissions
  43. Demo – Intro to Linux
  44. Set UID Programs
  45. Logs and Auditing
  46. Chapter 01 Review
  47. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 21m)

  1. Workbook (Pdf)
  2. Routing and the Security Design of VMware
  3. Security of Routing Data
  4. How Traffic Routes Between VMs on ESX Hosts
  5. Different vSwitches, Same Port Group and VLAN
  6. Same vSwitch, Different Port Group and VLAN
  7. Same vSwitch, Same Port Group and VLAN
  8. Security Design of the VMware Infrastructure Architecture
  9. VMware Infrastructure Architecture and Security Features
  10. Virtualization Layer
  11. CPU Virtualization
  12. Memory Virtualization
  13. Cloud Burst
  14. Virtual Machines
  15. Service Console
  16. Virtual Networking Layer
  17. Virtual Switches
  18. Virtual Switch VLANs
  19. Demo – Using VLAN’s
  20. Major Benefits of Using VLANs
  21. Standard VLAN Tagging
  22. Virtual Ports
  23. Virtual Network Adapters
  24. Virtualized Storage
  25. VMware VirtualCenter
  26. Chapter 02 Review
  27. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 39m)

  1. Workbook (Pdf)
  2. Remote DataStore Security
  3. ESX / ESXi and Fibre Channel SAN Environment and Addressing
  4. Mask and Zone SAN Resources Appropriately
  5. LUN Masking and Zoning
  6. Fiber Channel
  7. DH-CHAP
  8. Switch Link
  9. What is FC-SP (Fiber Channel – Security Protocol)?
  10. ESP Over Fiber Channel
  11. Fiber Channel Attacks – The Basics
  12. Steps in Securing Fiber Channel
  13. iSCSI vs. Fiber Channel
  14. ESX / ESXi and iSCSI SAN Environment and Addressing
  15. Hardware vs. Software Initiators
  16. iSCSI Security Features
  17. Secure iSCSI Devices Through Authentication
  18. Demo – Storage Security Settings
  19. IPSec
  20. IPSec Implementation
  21. Steps in Securing iSCSI
  22. Chapter 03 Review
  23. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 16m)

  1. Workbook (Pdf)
  2. Penetration Testing 101
  3. What is a Penetration Test
  4. Benefits of a Penetration Test
  5. What Does a Hack Cost You?
  6. Cost of a Hack – Example
  7. Current Issues
  8. Chained Exploit Example
  9. Demo – Gonzalez Indictment
  10. The Evolving Threat
  11. Methodology for Penetration Testing / Ethical Hacking
  12. Penetration Testing Methodologies
  13. Types of Tests
  14. Website Review
  15. Demo – Website Review
  16. Seven Management Errors
  17. Some VMware Issues
  18. Not Just About the Tools
  19. Chapter 04 Review
  20. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 47m)

  1. Workbook (Pdf)
  2. Information Gathering, Scanning and Enumeration
  3. What is the Hacker Wanting to Know?
  4. Methods of Obtaining Information
  5. Footprinting
  6. Maltego
  7. Maltego GUI
  8. Demo – Maltego
  9. Firecat v1.6.2
  10. Demo – Firecat
  11. FireFox Fully Loaded
  12. Johnny.Ihackstuff.com hackersforcharity.org
  13. Google and Query Operators
  14. Google
  15. Shodan – You Have to be Kidding Me!
  16. Demo – Shodan
  17. Introduction to Port Scanning
  18. Popular Port Scanning Tools
  19. ICMP Disabled
  20. NMAP TCP Connect Scan
  21. TCP Connect Port Scan
  22. Nmap
  23. Half-open Scan
  24. Firewalled Ports
  25. NMAP and Your VMware Servers
  26. Additional NMAP Scans
  27. NMAP UDP Scans
  28. Demo – NMAP
  29. UDP Port Scan
  30. Enumeration Overview
  31. Banner Grabbing
  32. Banner Grabbing with Telnet
  33. SuperScan 4 Tool: Banner Grabbing
  34. DNS Enumeration
  35. Zone Transfers
  36. Backtrack DNS Enumeration
  37. Active Directory Enumeration
  38. LDAPMiner
  39. Null Sessions
  40. Syntax for a Null Session
  41. Viewing Shares
  42. Enumeration with Cain and Abel
  43. NAT Dictionary Attack Tool
  44. THC-Hydra
  45. Injecting Abel Service
  46. Demo – Cain
  47. Chapter 05 Review
  48. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 29m)

  1. Workbook (Pdf)
  2. Penetration Testing and the Tools of the Trade
  3. Vulnerabilities in Network Services
  4. BackTrack4
  5. Vulnerability Scanners
  6. Nessus
  7. Nessus Report
  8. Saint
  9. SAINT – Sample Report
  10. OpenVAS
  11. OpenVAS Infrastructure
  12. OpenVAS Client
  13. Demo – OpenVAS
  14. Windows Password Cracking
  15. Syskey Encryption
  16. Cracking Techniques
  17. Rainbow Tables
  18. Disabling Auditing
  19. Clearing the Event log
  20. NTFS Alternate Data Stream
  21. Stream Explorer
  22. Encrypted Tunnels
  23. Port Monitoring Software
  24. RootKit
  25. The Metasploit Project
  26. Defense in Depth
  27. Meterpreter
  28. VASTO
  29. VASTO Modules
  30. Fuzzers
  31. SaintExploit at a Glance
  32. Core Impact Overview
  33. Core Impact
  34. Total Exploits from NVD Included in the Penetration Testing Tool
  35. Wireshark
  36. TCP Stream Re-assembling
  37. ARP Cache Poisoning
  38. ARP Cache Poisoning (Linux)
  39. Cain and Abel
  40. Ettercap
  41. Chapter 06 Review
  42. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 52m)

  1. Workbook (Pdf)
  2. DMZ Virtualization and Common Attack Vectors
  3. DMZ Virtualization with VMware Infrastructure
  4. Virtualized DMZ Networks
  5. Three Typical Virtualized DMZ Configurations
  6. Partially Collapsed DMZ with Separate Physical Trust Zones
  7. Partially Collapsed DMZ with Virtual Separation of Trust Zones
  8. Fully Collapsed
  9. Best Practices for Achieving a Secure Virtualized DMZ Deployment
  10. Harden and Isolate the Service Console
  11. Clearly Label Networks for Each Zone within the DMZ
  12. Set Layer 2 Security Options on Virtual Switches
  13. Enforce Separation of Duties
  14. Use ESX Resource Management Capabilities
  15. Regularly Audit Virtualized DMZ Configuration
  16. Common Attack Vectors
  17. How We Understand Fake Certificate Injection to Work
  18. Generic TLS Renegotiation Prefix Injection Vulnerability
  19. Testing for a Renegotiation Vulnerability
  20. Vulnerability Requirements
  21. Generic Example
  22. Patched Server with Disabled Renegotiation
  23. Demo – SSL Renegotiation Test
  24. Schmoo Con 2010: Virtualization Vulnerabilities Found!
  25. Schmoo Con 2010: Timeline
  26. Schmoo Con 2010: Identification
  27. Schmoo Con 2010: Server Log In
  28. Schmoo Con 2010: Server on the Internet
  29. Schmoo Con 2010: Vulnerability
  30. Schmoo Con 2010: Redirection Proxy
  31. Schmoo Con 2010: Vulnerable Versions
  32. Schmoo Con 2010: Gueststealer
  33. Chapter 07 Review
  34. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 3h 2m)

  1. Workbook (Pdf)
  2. Hardening Your ESX Server
  3. Section 1 – Virtual Machines
  4. Secure Virtual Machines as You Would Secure Physical Machines
  5. Disable Unnecessary or Superfluous Functions
  6. Take Advantage of Templates
  7. Prevent Virtual Machines from Taking Over Resources
  8. Isolate Virtual Machine Networks
  9. Example Network Architecture
  10. Arp Cache Poisoning
  11. VM Segmentation
  12. Minimize Use of the vSphere Console
  13. Virtual Machine Files and Settings
  14. Disable Copy and Paste Operations
  15. Limit Data Flow from the Virtual Machine to the Datastore
  16. SetInfo Hazard
  17. Do Not Use Nonpersistent Disks
  18. Ensure Unauthorized Devices are Not Connected
  19. Prevent UnAuthorized Removal or Connection of Devices
  20. Avoid Denial of Service Caused by Virtual Disk Modification Operations
  21. Specify the Guest Operating System Correctly
  22. Verify Proper File Permissions for Virtual Machine Files
  23. Demo – Security on your Virtual Machines
  24. Section 2 – Configuring the ESX/ESXi Host
  25. Configuring the Service Console in ESX
  26. Demo – Control VIC Access
  27. Demo – Service Console Administration
  28. Configure the Firewall for Maximum Security
  29. Demo – Firewall Configuration
  30. Limit the Software and Services Running in the Service Console
  31. Processes Running in SC
  32. Use vSphere Client and vCenter to Administer the Hosts Instead of Service Console
  33. Use a Directory Service for Authentication
  34. Demo – AD Integration
  35. Strictly Control Root Privileges
  36. Control Access to Privileged Capabilities
  37. Demo – SSH Access and SUDO
  38. Establish a Password Policy for Local User Accounts
  39. ESX/Linux User Authentication
  40. Configuring ESX Authentication
  41. ESX Authentication Settings
  42. Reusing Passwords
  43. Configuring Password Complexity
  44. Do Not Manage the Service Console as a Linux Host
  45. Maintain Proper Logging
  46. ESX4 Log File Locations
  47. Maintain Proper Logging (cont.)
  48. ESX Log Files
  49. Establish and Maintain File System Integrity
  50. Secure the SNMP Configuration
  51. Protect Against the Root File System Filling Up
  52. Disable Automatic Mounting of USB Devices
  53. Isolate the Infrastructure-related Networks
  54. VLAN1
  55. Configure Encryption for Communication Between Clients and ESX/ESXi
  56. Label Virtual Networks Clearly
  57. Do Not Create a Default Port Group
  58. Do Not Use Promiscuous Mode on Network Interfaces
  59. Protect Against MAC Address Spoofing
  60. Secure the ESX/ESXi Host Console
  61. Chapter 08 Review
  62. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 20m)

  1. Workbook (Pdf)
  2. Hardening Your ESXi Server
  3. Differences: VMware ESX vs. ESXi
  4. Differences: VMware ESX and ESXi
  5. Configuring Host-level Management in ESXi
  6. ESXi -Strictly Control Root Privileges
  7. Control Access to Privileged Capabilities ESXi
  8. DCUI
  9. Control Access to Privileged Capabilities ESXi (cont.)
  10. Maintain Proper Logging – ESXi
  11. Establish and Maintain Configuration File Integrity ESXi
  12. Ensure Secure Access to CIM
  13. Audit or Disable Technical Support Mode
  14. Chapter 09 Review
  15. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 28m)

  1. Workbook (Pdf)
  2. Hardening Your vCenter Server
  3. VirtualCenter
  4. Set Up the Windows Host for Virtual Center with Proper Security
  5. Limit Network Connectivity to Virtual Center
  6. Use Proper Security Measures When Configuring the Database for Virtual Center
  7. Enable Full and Secure Use of Certificate-based Encryption
  8. Default Certificates
  9. Replacing Server‐Certificates
  10. vCenter Log Files and Rotation
  11. Collecting vCenter Log Files
  12. Use VirtualCenter Custom Roles
  13. Document and Monitor Changes to the Configuration
  14. VirtualCenter Add-on Components
  15. VMware Update Manager
  16. VMware Converter Enterprise
  17. VMware Guided Consolidation
  18. General Considerations
  19. Client Components
  20. Verify the Integrity of VI Client
  21. Monitor the Usage of VI Client Instances
  22. Avoid the Use of Plain-Text Passwords
  23. vShield Zones Overview
  24. vShield VM Wall Features
  25. vShield VM Flow Features
  26. Demo – vShield Zones
  27. Chapter 10 Review
  28. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 25m)

  1. Workbook (Pdf)
  2. 3rd Party Mitigation Tools
  3. Virtualization: Greater Flexibility, Diminished Control
  4. Making Sense of the Virtualization Security Players
  5. 1K View of Players
  6. In-depth Look – Authors Picks HyTrust Appliance
  7. HyTrust Appliance – Key Capabilities (cont.): Unified Access Control
  8. HyTrust Appliance – Key Capabilities (cont.): Policy Management
  9. HyTrust Appliance – Key Capabilities (cont.): Audit-quality Logging
  10. HyTrust Appliance – Key Capabilities (cont.): Hypervisor Hardening
  11. In-depth Look – Authors Picks Catbird
  12. Catbird – Policy-driven Security
  13. Catbird – Continuous Compliance
  14. What’s Missing?
  15. Making Sense of It All
  16. Chapter 11 Review
  17. Course Closure
  18. Review Quiz (Number of attempts allowed: Unlimited)
This course includes
  • about 15.22 hours on-demand video
  • 11 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!