Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press
Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised of two books that are designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. The series when used in its entirety helps prepare readers to take and succeed on the E CDR and E CVT, Disaster Recovery and Virtualization Technology certification exam from EC- Council. The EC-Council Certified Disaster Recovery and Virtualization Technology professional will have a better understanding of how to set up disaster recovery plans using traditional and virtual technologies to ensure business continuity in the event of a disaster. Certificate Info Virtualization Security Who Should Attend? This course will significantly benefit Network administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. Course Duration: 2 days (9:00 5:00) CPE/ECE Qualification 16 ECE Credits awarded for attendance (1 for each classroom hour) Suggested Retail: $799 USD Page 2 of 7 Virtualization Security Copyright by EC-Council Press
Required Courseware: Visit www.cengage.com/community/eccouncil and click on Training Workshops for ordering details. What s included? Physical Courseware 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate Course + Supplement Cost: See the Training Workshops section at www.cengage.com/community/eccouncil for current pricing information. Related Certificates: Disaster Recovery Page 3 of 7 Virtualization Security Copyright by EC-Council Press
1. Introduction to Virtualization Course Briefing: Virtualization is the pooling and sharing of technology resources, including servers, storage, and networking. Through virtualization, resources can be allocated across the organization s applications and processes. This module explains about the virtualization techniques and various vendors offering virtualization. This module also explains various uses and types of virtualization. It also discusses different system virtualization techniques such as Full Virtualization Paravirtualization, Hosted Virtualization, Emulation and Translation, Hardware Assisted Virtualization etc. Various scenarios portray the success stories of organization. It also details various benefits of virtualization in the datacenter and discusses how to manage the physical and virtual systems. It also discusses some important topics such as Parallelism, Cloud computing, and Software-as-a- Service (SaaS). 2. VMware ESXi on Linux This module depicts VMware s approach to virtualization and tells how to choose and install guest operating systems. This module details the steps required to install VMware Server. It also indicates what to look out for after the installation. This module also describes VMware ESXi, its architecture, components, different management models, etc. This module also differentiates ESX 3 and ESXi and details VMware Site Recovery Manager API and its methods. It also shows how to set users, groups, permissions, and roles. VMware virtualization module helps in building a recovery plan, a step by step procedure, which includes creating, editing, managing, testing, pausing, resuming, or cancelling a Test. It also describes how to run a recovery plan. 3. Microsoft Virtualization At Microsoft, virtualization means helping IT departments to maximize ROI and cost savings across the enterprise, and powerfully improving business continuity. Microsoft provides a complete suite of technologies to enable an integrated, end-to-end, and virtualized infrastructure. Microsoft virtualization module familiarizes you with the different types of Microsoft virtualization technologies such as desktop, storage, application, and backup and recovery. This module also describes how virtualization helps to achieve disaster recovery with effective disaster planning and recovery solution. 4. Citrix Xen Virtualization Citrix XenServer is server virtualization that makes datacenters more agile and efficient through faster application delivery, higher levels of availability, and improved utilization of IT resources. XenServer delivers the advanced features required by mission critical workloads without sacrificing the ease-of-use necessary for wide-scale deployments. This module explains Xen virtualization and its types such as CPU, Memory, and I/O. This module describes how to deploy and configure Xen, and details the system requirements. This module also provides necessary information for installing Xen on free Linux distribution. Page 4 of 7 Virtualization Security Copyright by EC-Council Press
5. Sun Virtualization This module discusses virtualization using the Solaris operating system and gives an overview of Sun xvm Server architecture. This discusses the working of Sun xvm Server. This module also describes Sun xvm server and domains and their interactions. This module lists the supported virtualization modes, hardware platform for running Sun xvm, and guest configurations. This module gives an introduction to Sun xvm server storage libraries and discusses library management techniques such as updating the information in a storage library, editing properties of a storage library, uploading an ISO image to a library, uploading an appliance image to a library, importing an image to a library, creating a new NFS library, setting up the NFSv4 domain on a Solaris system, and sharing file systems for access by Sun xvm Server clients. 6. Red Hat Enterprise Linux Virtualization This module familiarizes you with Installing Red Hat Enterprise Linux Virtualization and Red Hat Virtualization packages on the host. This module gives details about how to install guests operating systems. Many Red Hat Virtualization tools are presented in this module. This module describes how to customize Red Hat Virtualization scripts. This module discusses troubleshooting Red Hat Virtualization and Para-virtualized Drivers. This module gives tips and trick about how to automatically start domains during the host system boot. 7. NoMachine NoMachine NX is an enterprise-class solution for secure remote access, desktop virtualization, and hosted desktop deployment built around the self-designed and self-developed NX suite of components. This module gives an overview of NoMachine technology and briefs about the NX way of caching. This module discusses various components of NX and its working. NX web tools such as the NX Server Manager, NX Builder, and NX Web Companion are presented in this module. This module also describes how to install NX client and NX Node on the server machine. 8. Virtualization Security This module helps understand the importance of virtualization security. It will be useful in recognizing common attacks on virtual machines, understanding the top virtualization security concerns, and helps secure a virtual server environment. Page 5 of 7 Virtualization Security Copyright by EC-Council Press
Course Outline Chapter 1: Introduction to Virtualization Introduction to Virtualization Virtualization Types of Virtualization Virtualization Techniques Virtualization Security Issues Virtualization Vendors Chapter 2: VMware ESXi on Linux Introduction to VMware ESXi on Linux VMware and Business Continuity VMware and Disaster Recovery VMware ESX VMware vsphere VMware vcenter Server Security for ESX Server 3i Systems Chapter 3: Microsoft Virtualization Introduction to Microsoft Virtualization Virtualization with Hyper-V Hyper-V installation Installing a virtual machine Creating Hyper-V server virtual networks Configuring virtual networks Adding a network adapter to a VM Chapter 4: Citrix Xen Virtualization Introduction to Citrix Xen Virtualization Virtual Server Product Comparison Citrix XenServer 5 XenCenter Xen Security Citrix XenApp Business Continuity Page 6 of 7 Virtualization Security Copyright by EC-Council Press
Chapter 5: Sun Virtualization Introduction to Sun Virtualization Sun Virtualization Features Sun Desktop Virtualization Sun xvm Ops Center Sun xvm VirtualBox Sun Virtual Desktop Infrastructure Software Security Concerns with Sun Virtualization Chapter 6: Red Hat Enterprise Linux Virtualization Introduction to Red Hat Enterprise Linux Virtualization Red Hat Enterprise Linux Virtualization Basics Installing Red Hat Enterprise Linux Virtualization Installing Guest Operating Systems Configuring Red Hat Enterprise Linux Virtualization Chapter 7: NoMachine Introduction to NoMachine NX system architecture Installing NX Client Configuring the NX client Setting up NX client sessions Installing NX Node Installing NX Server Chapter 8: Virtualization Security Introduction to Virtualization Security Virtualization Security Benefits Virtualization Issues Virtualization Costs Virtualization Security Checklist Page 7 of 7 Virtualization Security Copyright by EC-Council Press