top of page
top

VM-NSXTIS

VMware NSX-T Data Center for Intrinsic Security

Price
Duration

USD 3,090 excl. VAT

5 Days

cloud.jpg
PDF.jpg
PDF Outline

Who Should Attend

Who Should attend

• Experienced security

administrators

Prerequisits

Prerequisites

You should also have the following understanding or knowledge:
• Good understanding of TCP/IP services and protocols
• Knowledge and working experience of network security, including:
• L2-L7 Firewalling
• Intrusion Detection and Prevention Systems

• Knowledge and working experience of VMware vSphere® environments and KVM-based environments

The VMware Certified Technical Associate - Network Virtualization is recommended.

Overview

Overview

This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-TTM Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall,

Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX® Intelligence™, and VMware NSX® Network Detection and Response™.
In addition, you are presented with common configuration issues and given a methodology to resolve them.

Objectives

Course Objectives

By the end of the course, you should be able to meet the following objectives:

• Define information-security-related concepts
• Explain the different types of firewalls and their use cases
• Describe the operation of intrusion detection and intrusion prevention systems
• Differentiate between Malware Prevention approaches
• Describe the VMware intrinsic security portfolio
• Implement Zero-Trust Security using VMware NSX® segmentation
• Configure user and role management
• Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies

• Configure and troubleshoot Gateway Security
• Use VMware vRealize® Log Insight™ for NSX™ and VMware vRealize® Network Insight™ to operate NSX firewalls
• Explain the security best practices related to grouping, tagging, and rule configuration
• Describe north-south and east-west service insertion
• Describe endpoint protection
• Configure and troubleshoot IDS/IPS

Outlines

Course Outline

1 Course Introduction
• Introductions and course logistics
• Course objectives
2 Security Basics
• Define information-security-related concepts
• Explain the different types of firewalls and their use cases
• Describe the operation of IDS/IPS
• Differentiate between Malware Prevention approaches
3 VMware Intrinsic Security
• Define the VMware intrinsic security strategy
• Describe the VMware intrinsic security portfolio
• Explain how NSX-T Data Center aligns with the intrinsic security strategy
4 Implementing Zero-Trust Security
• Define Zero-Trust Security
• Describe the five pillars of a Zero-Trust Architecture
• Define NSX segmentation and its use cases
• Describe the steps needed to enforce Zero-Trust with NSX segmentation
5 User and Role Management
• Integrate NSX-T Data Center and VMware Identity Manager™
• Integrate NSX-T Data Center and LDAP
• Describe the native users and roles in NSX-T Data Center
• Create and assign custom user roles
6 Distributed Firewall
• Configure Distributed Firewall rules and policies
• Describe the NSX Distributed Firewall architecture
• Troubleshoot common problems related to NSX Distributed Firewall
• Configure time-based policies
• Configure Identity Firewall rules
7 Gateway Security
• Configure Gateway Firewall rules and policies
• Describe the architecture of the Gateway Firewall
• Identify and troubleshoot common Gateway Firewall issues
• Configure TLS Inspection to decrypt traffic for both internal and external services
• Configure URL filtering and identify common configuration issues

8 Operating Internal Firewalls
• Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls
• Explain security best practices related to grouping, tagging, and rule configuration
9 Network Introspection
• Explain network introspection
• Describe the architecture and workflows of northsouth and east-west service insertion
• Troubleshoot north-south and east-west service insertion
10 Endpoint Protection
• Explain endpoint protection
• Describe the architecture and workflows of endpoint protection
• Troubleshoot endpoint protection
11 Intrusion Detection and Prevention
• Describe the MITRE ATT&CK framework
• Explain the different phases of a cyber attack
• Describe how NSX security solutions can be used to protect against cyber attacks
• Configure and troubleshoot Distributed IDS/IPS
• Configure and troubleshoot North-South IDS/IPS
12 NSX Application Platform
• Describe NSX Application Platform and its use cases
• Identify the topologies supported for the deployment of NSX Application Platform
• Deploy NSX Application Platform
• Explain the NSX Application Platform architecture and services
• Validate the NSX Application Platform deployment and troubleshoot common issues
13 NSX Malware Prevention
• Identify use cases for NSX Malware Prevention
• Identify the components in the NSX Malware Prevention architecture
• Describe the NSX Malware Prevention packet flows for known and unknown files
• Configure NSX Malware Prevention for east-west and north-south traffic
14 NSX Intelligence and NSX Network Detection and Response
• Describe NSX Intelligence and its use cases
• Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities
• Describe NSX Network Detection and Response and its use cases
• Explain the architecture of NSX Network Detection and Response in NSX-T Data Center
• Describe the visualization capabilities of NSX Network Detection and Response

PDF.jpg

Further information
If you would like to know more about this course please contact us

reg1
Schedule
VMware_with Partners.jpg
VMware_with Partners.jpg
reg

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page