Imate žicu za učenje?

VMware vSphere 5 - Part 2: Securing Hosts, Internal Components, Certificate Use

In addition to securing against external threats you must also work to mitigate threats against the internal network components such as vLANs, switches, and iSCSI traffic within your vSphere Environment. This course describes how to protect internal components using ESXi Shell, Security Profiles. Firewalls, Lockdown mode, and encryption. Often times, the first time that you connect to a vCenter Server instance, you receive a Security Warning dialog box.This security warning appears because the vSphere Client uses HTTP over Secure Sockets Layer (HTTPS) to connect to vCenter Server while the vCenter Server is using a Secure Sockets Layer (SSL) certificate from an "untrusted" source. This course reviews ESXi SSL certificate options as well as explains the SSL certificate options available to correct errors security warning messages.

Target Audience
Systems engineers, system administrators, vSphere operators and support personnel working in virtualized server environments who have completed Datacenter Virtualization with vSphere 5: Part 1. Candidates who are seeking to learn about advanced features and configuration options available in the vSphere Enterprise product. This includes, configuring High Availability, Distributed Resource Scheduling, upgrading to vSphere 5 and auto deployment. A solid technical foundation in virtualization using vSphere coupled with strong network and administration skills are required as a prerequisite for this path.

Expected Duration (hours)

Lesson Objectives

VMware vSphere 5 - Part 2: Securing Hosts, Internal Components, Certificate Use

  • describe how to configure services from the Security Profile
  • describe how ESXi firewall and Lockdown mode provide security
  • recognize the options available when using firewall protection
  • describe how vLANS and switch settings can be used to protect standard switches
  • match the features of the encryption and authentication methods appropriately
  • describe best practice when securing components
  • secure ESXi hosts in a given scenario
  • describe the characteristics of ESXi certificate support
  • Trajanje: 
    1,5 h

    Koraci do učenja

    1Prijavi se

    Prijavite se, a ako nemate korisničko ime, registrirajte se.

    2Pronađi i upiši program

    Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.


    Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

    »Detaljne upute

    Trenutno nema programa koji imaju objavljene termine.