Course Title: Virtualization Security, 1st Edition



Similar documents
Course Title: Disaster Recovery, 1st Edition

Networking for Caribbean Development

VMware vsphere 5.0 Boot Camp

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Implementing and Managing Windows Server 2008 Hyper-V

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

Virtualization. Michael Tsai 2015/06/08

Reader s Choice Preferred product

Virtualization Technologies. Embrace the new world of healthcare

VMware vsphere 5.1 Advanced Administration

Parallels Virtuozzo Containers

VMware vsphere: Install, Configure, Manage [V5.0]

Installing & Using KVM with Virtual Machine Manager COSC 495

MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V

Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor

Acronis Backup & Recovery 11.5

IOS110. Virtualization 5/27/2014 1

SCO Virtualization Presentation to Customers

CLOUD COMPUTING & SECURITY -A PRACTICAL APPROACH

An Esri White Paper January 2010 ArcGIS Server and Virtualization

CXD Citrix XenDesktop 5 Administration

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

M6422A Implementing and Managing Windows Server 2008 Hyper-V

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)

Outline SSS Microsoft Windows Server 2008 Hyper-V Virtualization

9/26/2011. What is Virtualization? What are the different types of virtualization.

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

Citrix XenServer 7 Feature Matrix

Vmware Training. Introduction

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

Using Intelligent Power Manager (IPM) & Intelligent Power Protector (IPP) on Virtual Desktop Infrastructure (VDI)

CXS Citrix XenServer 6.0 Administration

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

CMB-207-1I Citrix XenApp and XenDesktop Fast Track

CVE-401/CVA-500 FastTrack

VMware vsphere: [V5.5] Admin Training

Comparing Free Virtualization Products

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

Goliath Performance Monitor Prerequisites v11.6

VMWARE COURSE OUTLINE. Revision 1.0 Prepared by: See CY

BLACKBOARD LEARN TM AND VIRTUALIZATION Anand Gopinath, Software Performance Engineer, Blackboard Inc. Nakisa Shafiee, Senior Software Performance

In addition to their professional experience, students who attend this training should have technical knowledge in the following areas.

Course Outline: Course 6331: Deploying and Managing Microsoft System Center Virtual Machine Manager Learning Method: Instructor-led Classroom Learning

Always On Infrastructure for Software as a Ser vice

Servervirualisierung mit Citrix XenServer

Operating Systems Virtualization mechanisms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Protecting your Data in a New Generation Virtual and Physical Environment

NE-20247D Configuring and Deploying a Private Cloud

To join the audio portion of this webcast: meeting code

Deployment Options for Microsoft Hyper-V Server

Server Virtualization Ready to expand your commitment to virtualization? Here s what to look for in evaluating VMware, Microsoft and Citrix.

Acronis Backup Product Line

VDI Best Practices with Citrix XenDesktop.

Virtualization with Windows

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Created on May 20, 2015

Course Syllabus. Implementing and Managing Windows Server 2008 Hyper-V. Key Data. Audience. At Course Completion. Prerequisites

Onboarding VMs to Cisco OpenStack Private Cloud

Marco Mantegazza WebSphere Client Technical Professional Team IBM Software Group. Virtualization and Cloud

Virtualization and the U2 Databases

Data Center Manager (DCM)

VMware VDR and Cloud Storage: A Winning Backup/DR Combination

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

VMsources Group Inc

Microsoft System Center Virtual Machine Manager 2008: Overview. Lee Chiang Yen Principal Trainer NetAssist Services

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

Enterprise Cloud VM Image Import User Guide. Version 1.0

Intro to Virtualization

Virtualization for Cloud Computing

Virtualization: Know your options on Ubuntu. Nick Barcet. Ubuntu Server Product Manager

How to Backup and Restore a VM using Veeam

Course: CXD-202 Implementing Citrix XenDesktop Administration

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0

Planning and Designing Microsoft Virtualization Solutions

Citrix XenServer-6.2 Administration Training

Top 3 VMware Certifications You Must Get - And How To Pass the First Time VMware Certification

Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.

Version 2.0. VMGuru.nl Erik Scholten

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

Citrix XenApp-7.6 Administration Training. Course

Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

Technical and commercial comparison of Citrix XenServer and VMware

NVIDIA GRID OVERVIEW SERVER POWERED BY NVIDIA GRID. WHY GPUs FOR VIRTUAL DESKTOPS AND APPLICATIONS? WHAT IS A VIRTUAL DESKTOP?

Virtualization Case Study

SEP sesam Backup & Disaster Recovery Overview

TGL VMware Presentation. Guangzhou Macau Hong Kong Shanghai Beijing

Bitdefender GravityZone Sales Presentation

TROUBLESHOOTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCT)

Transcription:

Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press

Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised of two books that are designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. The series when used in its entirety helps prepare readers to take and succeed on the E CDR and E CVT, Disaster Recovery and Virtualization Technology certification exam from EC- Council. The EC-Council Certified Disaster Recovery and Virtualization Technology professional will have a better understanding of how to set up disaster recovery plans using traditional and virtual technologies to ensure business continuity in the event of a disaster. Certificate Info Virtualization Security Who Should Attend? This course will significantly benefit Network administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. Course Duration: 2 days (9:00 5:00) CPE/ECE Qualification 16 ECE Credits awarded for attendance (1 for each classroom hour) Suggested Retail: $799 USD Page 2 of 7 Virtualization Security Copyright by EC-Council Press

Required Courseware: Visit www.cengage.com/community/eccouncil and click on Training Workshops for ordering details. What s included? Physical Courseware 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate Course + Supplement Cost: See the Training Workshops section at www.cengage.com/community/eccouncil for current pricing information. Related Certificates: Disaster Recovery Page 3 of 7 Virtualization Security Copyright by EC-Council Press

1. Introduction to Virtualization Course Briefing: Virtualization is the pooling and sharing of technology resources, including servers, storage, and networking. Through virtualization, resources can be allocated across the organization s applications and processes. This module explains about the virtualization techniques and various vendors offering virtualization. This module also explains various uses and types of virtualization. It also discusses different system virtualization techniques such as Full Virtualization Paravirtualization, Hosted Virtualization, Emulation and Translation, Hardware Assisted Virtualization etc. Various scenarios portray the success stories of organization. It also details various benefits of virtualization in the datacenter and discusses how to manage the physical and virtual systems. It also discusses some important topics such as Parallelism, Cloud computing, and Software-as-a- Service (SaaS). 2. VMware ESXi on Linux This module depicts VMware s approach to virtualization and tells how to choose and install guest operating systems. This module details the steps required to install VMware Server. It also indicates what to look out for after the installation. This module also describes VMware ESXi, its architecture, components, different management models, etc. This module also differentiates ESX 3 and ESXi and details VMware Site Recovery Manager API and its methods. It also shows how to set users, groups, permissions, and roles. VMware virtualization module helps in building a recovery plan, a step by step procedure, which includes creating, editing, managing, testing, pausing, resuming, or cancelling a Test. It also describes how to run a recovery plan. 3. Microsoft Virtualization At Microsoft, virtualization means helping IT departments to maximize ROI and cost savings across the enterprise, and powerfully improving business continuity. Microsoft provides a complete suite of technologies to enable an integrated, end-to-end, and virtualized infrastructure. Microsoft virtualization module familiarizes you with the different types of Microsoft virtualization technologies such as desktop, storage, application, and backup and recovery. This module also describes how virtualization helps to achieve disaster recovery with effective disaster planning and recovery solution. 4. Citrix Xen Virtualization Citrix XenServer is server virtualization that makes datacenters more agile and efficient through faster application delivery, higher levels of availability, and improved utilization of IT resources. XenServer delivers the advanced features required by mission critical workloads without sacrificing the ease-of-use necessary for wide-scale deployments. This module explains Xen virtualization and its types such as CPU, Memory, and I/O. This module describes how to deploy and configure Xen, and details the system requirements. This module also provides necessary information for installing Xen on free Linux distribution. Page 4 of 7 Virtualization Security Copyright by EC-Council Press

5. Sun Virtualization This module discusses virtualization using the Solaris operating system and gives an overview of Sun xvm Server architecture. This discusses the working of Sun xvm Server. This module also describes Sun xvm server and domains and their interactions. This module lists the supported virtualization modes, hardware platform for running Sun xvm, and guest configurations. This module gives an introduction to Sun xvm server storage libraries and discusses library management techniques such as updating the information in a storage library, editing properties of a storage library, uploading an ISO image to a library, uploading an appliance image to a library, importing an image to a library, creating a new NFS library, setting up the NFSv4 domain on a Solaris system, and sharing file systems for access by Sun xvm Server clients. 6. Red Hat Enterprise Linux Virtualization This module familiarizes you with Installing Red Hat Enterprise Linux Virtualization and Red Hat Virtualization packages on the host. This module gives details about how to install guests operating systems. Many Red Hat Virtualization tools are presented in this module. This module describes how to customize Red Hat Virtualization scripts. This module discusses troubleshooting Red Hat Virtualization and Para-virtualized Drivers. This module gives tips and trick about how to automatically start domains during the host system boot. 7. NoMachine NoMachine NX is an enterprise-class solution for secure remote access, desktop virtualization, and hosted desktop deployment built around the self-designed and self-developed NX suite of components. This module gives an overview of NoMachine technology and briefs about the NX way of caching. This module discusses various components of NX and its working. NX web tools such as the NX Server Manager, NX Builder, and NX Web Companion are presented in this module. This module also describes how to install NX client and NX Node on the server machine. 8. Virtualization Security This module helps understand the importance of virtualization security. It will be useful in recognizing common attacks on virtual machines, understanding the top virtualization security concerns, and helps secure a virtual server environment. Page 5 of 7 Virtualization Security Copyright by EC-Council Press

Course Outline Chapter 1: Introduction to Virtualization Introduction to Virtualization Virtualization Types of Virtualization Virtualization Techniques Virtualization Security Issues Virtualization Vendors Chapter 2: VMware ESXi on Linux Introduction to VMware ESXi on Linux VMware and Business Continuity VMware and Disaster Recovery VMware ESX VMware vsphere VMware vcenter Server Security for ESX Server 3i Systems Chapter 3: Microsoft Virtualization Introduction to Microsoft Virtualization Virtualization with Hyper-V Hyper-V installation Installing a virtual machine Creating Hyper-V server virtual networks Configuring virtual networks Adding a network adapter to a VM Chapter 4: Citrix Xen Virtualization Introduction to Citrix Xen Virtualization Virtual Server Product Comparison Citrix XenServer 5 XenCenter Xen Security Citrix XenApp Business Continuity Page 6 of 7 Virtualization Security Copyright by EC-Council Press

Chapter 5: Sun Virtualization Introduction to Sun Virtualization Sun Virtualization Features Sun Desktop Virtualization Sun xvm Ops Center Sun xvm VirtualBox Sun Virtual Desktop Infrastructure Software Security Concerns with Sun Virtualization Chapter 6: Red Hat Enterprise Linux Virtualization Introduction to Red Hat Enterprise Linux Virtualization Red Hat Enterprise Linux Virtualization Basics Installing Red Hat Enterprise Linux Virtualization Installing Guest Operating Systems Configuring Red Hat Enterprise Linux Virtualization Chapter 7: NoMachine Introduction to NoMachine NX system architecture Installing NX Client Configuring the NX client Setting up NX client sessions Installing NX Node Installing NX Server Chapter 8: Virtualization Security Introduction to Virtualization Security Virtualization Security Benefits Virtualization Issues Virtualization Costs Virtualization Security Checklist Page 7 of 7 Virtualization Security Copyright by EC-Council Press