VMware

Introducing the VMware Security Solution Fundamentals

Summary:  
Register Now
- Format: Self-Paced
- Length: 1 Hours
Overview:
This free eLearning course provides the background information needed to work with the products included in the VMware Security Solution. The course begins with a review of basic security methodologies and how virtualization affects security. References for follow-on reading are provided for students less familiar with these concepts. Next, the course discusses the VMware security strategy. Each product in the VMware Security Solution is introduced by discussing the limitations of traditional security controls and describing how the products in the solution address these limitations. The course concludes with a list of relevant security and compliance online resources.

Objectives:    After this course, you should be able to:
•  Recognize the process and strategies that security managers use to  manage risks to information and information systems
•  Name ways that virtualization affects security and compliance
•  List the top vulnerabilities applicable to virtual environments
•  Explain the basic strategy to protect a virtual environment
•  Name the main purpose of each product included in the VMware security solution
•  For each product in the VMware security solution, discuss how key features address the challenges of securing virtual environments with traditional security controls.
•  Find additional security and compliance resources posted on vmwrae.com
 
Prerequisites:    None
 
Outline:    Quick review of security concepts and methodology

       -  IT security and compliance objectives and process
       -  Control principles
       -  Types of security tools

     How virtualization affects security

       -  Common and unlikely vulnerabilities
       -  Main security and compliance concerns hindering cloud adoption

    Platform security

       -   Summary of platform security architecture
       -   What VMware is doing to make the platform secure

    Defense-in-depth security architecture in virtual environments

       -  Challenges of traditional approaches
       -  Introducing the VMware vShield solution
       -  Use cases

    Configuration management in virtual environments

       -  Challenges of traditional approaches
       -  Introducing VMware Configuration Manager
       -  Use cases

    VMware security and compliance online resources