C)VSE – Certified Virtualisation Security Engineer

C)VSE - Certified Virtualisation Security Engineer

 

Certified Virtualization Security Engineer Career Track

 

Certified Virtualization Security Engineer Career Track

 

This fast paced, deep dive, hands-on course provides not only the foundation needed for highly secure deployment of VMware vSphere, it also provides a complete understanding of the CIA triad as it relates to virtualisation. This course will cover everything from design, configuration, best practices, performance monitoring, and just about everything in between! We endeavour to provide an understanding of what can and cannot be performed to secure your virtualised datacentre!

Exam Information

Students Will:

  • Have learned the pros, cons, best practices, and skills of virtualization.
  • Be able to design, secure, deploy, and manage virtual machines.
  • Be ready to sit for the C)VSE exam.

 

Accreditations & Acknowledgements

Accreditation And Certifications

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Key Data

Course Title: Certified Virtualization Security Engineer

Duration: 4 Days

Language: English

Class Format Options:

  • Instructor-led classroom
  • Instructor-led Online Training

Prerequisites:

Network+ Certification or Equivalent KnowledgeTwo Years’ Experience with Microsoft or Linux ServersBasic Virtualization/Cloud KnowledgeCertified Virtualization Engineer or equivalent knowledge

Student Materials:

  • Student Workbook –400+ Pages
  • Student Lab Guide –200+ Pages

Certification Exams

Certified Virtualization Security Engineer

CEUs: 32

Who Should Attend?

Virtualization and Cloud Administrators and Engineers, Virtualization and Cloud Security Engineers, System Administrators and Engineers

Course Outline

  • Module 1 - Virtualization and Cloud Overview
  • Module 2 - vSphere Monitoring and Performance (Availability Constraints)
  • Module 3 - vSphere Native Security
  • Module 4 - vSphere Security Risks
  • Module 5 - Designing for Security
  • Module 6 - Hardening vSphere
  • Module 7 - Managing Risk and Compliance
  • Module 8 - Third Party Mitigation Solutions & Scanning
  • Module 14 - Advanced Management of Desktop Pools

Course Objectives

  • The Datacenter is under attack and mistakes made in implementing the virtual platform can lead to a major attack. It has happened before and will again.
  • Every day we read about new methods of attacking Infrastructure as a Service such as Amazon, now learn how a properly designed virtual layer can aid in mitigating some of these attacks.
  • Learn how Confidentiality can be improved with some awesome features implemented in vSphere.
  • Learn how Integrity can be maintained with a proper design and implementation of VMware vSphere.
  • Learn now Availability is designed into the VMware vSphere architecture and how you can improve and maintain this.
  • Spend some time performing a few hacks, and a lot of time implementing a secure architecture with hands on labs
  • Much of your time will be hands on!

X
X