VMware vSphere
VM-SOSDDC
VMware Security Operations for the Software-Defined Data Center
Who should attend
- Experienced system administrators
- Cloud administrators
- System integrators
- Operational developers
Completion of one of the following:
- VMware vSphere: Install, Configure, Manage [V5.5 or V6]
- VMware vSphere: Fast Track
- Equivalent knowledge
Experience working at the command prompt and with scripting tools like
Windows PowerShell is highly recommended.
An understanding of corporate or enterprise network implementations.
Virtualization presents new opportunities for securing your data and systems. Virtualizing your data center often brings new challenges, requiring your IT staff to assume new, and sometimes unfamiliar, roles and responsibilities.
In the VMware Security Operations for the Software-Defined Data course, we teach you how to use the VMware Software-Defined Data Center product portfolio and tools to better manage administrator access, harden your VMware vSphere®
environment, and secure data at rest and in motion. We also discuss compliance and automation to help you ensure that your deployments align with your security policies.
By the end of the course, you should be able to meet the following
objectives:
- Describe the concepts involved in securing a software-defined data center (SDDC) and protecting the data in the data center
- Manage vSphere administrator access to hosts and the VMware vCenter Server™ system based on identified job roles and requirements
- Implement best-practice security of vSphere components based on organizational security policies
- Configure data protection for data at rest and data in motion
- Manage protection for virtual machines, endpoints, and networks
- Use microsegmentation to protect and manage multitier applications and network data
- Perform activity monitoring and logging, and explore relevant logs to meet compliance requirements
- Use VMware NSX® security groups, policies, and tags to automate deployment and security processes
- Use automation to respond to security-related events
If you would like to know more about this course please contact us