Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 4


This course focuses on “where the vulnerabilities lie” and how to reduce the attack surfaces in the virtualized environment. It goes beyond the typical security protocols administrators use to secure their environments & delves much deeper into the...


 
Course Outline
A critical and often overlooked aspect of migrating to a virtualized environment is security and setting up security properly. Like physical machines, virtualization technologies are not secure “out of the box” and VMware is no exception. The Advanced Virtualization Security course focuses on “where the vulnerabilities lie” and how to reduce the attack surfaces in the virtualized environment. It goes beyond the typical security protocols administrators use to secure their environments and delves much deeper into the actual working (and short comings) of the VMware environment.

Students will take a 360 degree look at the potential threats, how to defend and defeat them, and establish a solid foundation to build secure virtual data centers from the ground up.

Course Objectives · Learn the actual internal workings of VMware, and compare them to physical and virtual devices.
· Discover how to securely set up port groups and VLANS.
· Understand the aspect of securing failover configurations
· Distinguish between Denial of Service Failovers that wide open failovers and closed failovers.
· Dive deep into the different layers of security and explore features to include how traffic routes between VM’s and different hosts, common denominators of Physical and Virtual Environments, and how to make the virtual environment the most secure.
· Walk away knowing how to secure a VMware environment in a DMZ and how to protect yourself from the common vulnerabilities of VMware attack surfaces from the eyes of an attacker.
· Receive in depth information on how to harden you ESX environment, and comprehensively understand all aspects of how to do that.
· Demonstrate their proficiency in class working on a state-of-the-art data center and performing hands-on labs to reinforce the learning objectives.
· Course developed and taught by a Licensed Penetration Tester who has a long history of vulnerability audits with US National Security Teams and audits of many foreign governments.
· Designed and taught from the perspective of how an attacker would get into your Virtual Environment from an attacker who has done JUST THAT!

Course Outline Chapter 1 - Primer and reaffirming our knowledge
· Overview
· ESX Networking Components
· Virtual Switches and How They Work
· Virtual Switches vis-a-vis Physical Switch
· Why The Spanning Tree Protocol is Superfluous
· What are Virtual Ports and Why Should we be Concerned?
· VMWare so-called "Uplink Ports" and their interaction with the Physical equivalent
· Concept of Port Groups - They are out of this (physical) world!
· Uplinks
· Virtual Switch Correctness
· Virtual Ethernet Adapters and How They Work
· VLANs in VMware Infrastructure
· Load Balancing
· NIC Teaming
· Failover Configurations
· Layer 2 Security Features
· Managing the Virtual Network with "VirtualCenter"
· File System Structure
· Kernel
· When do the processes start?
· Starting and Stopping Processes
· Interacting with Processes
· Processes
· Password and Shadow File Formats
· Account and Groups
· Set UID Programs
· Linux and Unix Permissions
· Trust Relationships
· Logs and Auditing

Chapter 2 - Penetration Testing 101
· Overview
· What is a Penetration Test?
· Benefits of a Penetration test
· Example
· What is the Cost of a Hack?
· Malware/Virus
· Active Zombies
· Hash Collisions
· SQL Injection
· Identity Theft
· Social Engineering, EXploits and Chained Exploits
· Chained Exploit Example
· Current Issues
· The Evolving Threat
· Pen Testing Methodology
· Types of Tests
· Website Review
· Common Management Errors
· It's not Just about the Tools!

Chapter 3 - Routing and the Security Design of VMware
· Overview
· Security of Routing Data
· Different vSwitches, same port group and VLAN
· Same vSwitch, different port group and VLAN
· Same vSwitch, same port group and VLAN
· How traffic is routed Between Virtual Machines on ESX host
· Security Design of the VMware Infrastructure 3 Architecture
· Virtualization Layer
· CPU Virtualization
· Buffer overflow
· Memory Virtualization
· Virtual Machines
· Service Console
· Virtual Networking Layer
· Virtual Switches
· Virtual Switch LANs
· Virtual Ports
· Virtual Network Adapters
· Virtual Switch Isolation
· Virtual Switch Correctness
· Virtualized Storage
· SAN Security
· VMware Virtual Center
· VMware Infrastructure Architecture and Security Features

Chapter 4 – Information Gathering, Scanning and Enumeration
· Overview
· What information does the hacker gather?
· Methods of Obtaining Information
· Maltego
· Firefox Add
· Footprinting Defined
· Google Hacking
· Introduction to Port Scanning
· NMAP
· TCP Connect Port Scan
· Half-Open Scan
· Firewalled Ports
· Service Version Detection
· Additional NMAP Scans
· UDP Scans
· Port Scanning Tools
· Web Server Banner Grabbing
· Telnet
· SuperScan4
· SMTP Server Banner
· DNS Enumeration
· Zone Transfers
· Backtrack Tools
· Active Directory Enumeration
· LDAP miner
· Null Sessions
· Enumeration with Cain and Abel
· NAT Dictionary Attack Tool
· THC-Hydra
· Cool Stuff with Cain
· Enumeration Overview

Chapter 5 – DMZ Virtualization
· Overview
· Virtualized DMZ Networks
· Typical Virtualized DMZ
· Partially Collapsed DMZ with Separate Physical Trust
· Zones
· Partially Collapsed DMZ with Virtual Separation of Trust
· Zones
· Fully Collapsed DMZ
· Three Typical Virtualized DMZ Configurations
· Harden and Isolate the Service Console
· Clearly Label Networks for each Zone within the DMZ
· Set Layer 2 Security Options on Virtual Switches
· Enforce Separation of Duties
· Use ESX Resource Management Capabilities
· Regularly Audit Virtualized DMZ Configuration
· Best Practices for Achieving a Secure Virtualized DMZ Deployment

Chapter 6 – Remote DataStore Security
· Overview
· LUN Masking
· SAN Zoning
· Port Zoning
· Hard and Soft Zoning
· WWN Zoning
· Mask and Zone SAN Resources
· Classes of Attacks against SANs
· Fiber Channel – Security Protocol
· ESP over Fiber Channel
· DH-CHAP
· Switch Link
· Fiber Channel
· Attacking Fiber Channel
· Securing iSCSI, iFCP and FCIP over IP networks

Chapter 7 – Penetration Testing and the Tools of the Trade
· Overview
· Vulnerabilities in Network Services
· Nessus
· Saint
· Vulnerability Assessment Scanners
· Syskey Encryption
· Cracking Techniques
· Cryptanalysis
· Windows Password Cracking
· Clearing the Event Log
· Disabling Auditing
· Stream Explorer
· Alternate Data Streams
· Encrypted Tunnels
· Port Monitoring Software
· Rootkits
· Metasploit
· Fuzzers
· SaintExploit
· Core Impact
· Penetration Testing Tool Comparison
· Wireshark
· Cain and Abel
· Ettercap
· Breaking SSL Traffic
· ARP Cache Poisoning
· MD5 Hash Collisions
· Hash Algorithm

Chapter 8 – Hardening your ESX Server
· Overview
· Hardening Your ESX Server
· Virtual Machines
· Secure Virtual Machines as You Would Secure Physical Machines
· Disable Unnecessary or Superfluous Functions
· Take Advantage of Templates
· Prevent Virtual Machines from Taking Over Resources
· Isolate Virtual Machine Networks
· Arp Cache Poisoning
· VM Segmentation
· Minimize Use of the VI ConsoleVirtual Machine Files and Settings
· Disable Copy and Paste Operations Between the Guest Operating
System and Remote Console
· Limit Data Flow from the Virtual Machine to the Datastore
· SetInfo Hazard
· Do Not Use Nonpersistent Disks
· Ensure Unauthorized Devices are Not Connected
· Prevent Unauthorized Removal or Connection of Devices
· Avoid Denial of Service Caused by Virtual Disk Modification
Operations
· Specify the Guest Operating System Correctly
· Verify Proper File Permissions for Virtual Machine Files
· Configuring the Service Console in ESX 3.5
· Configure the Firewall for Maximum Security
· Limit the Software and Services Running in the Service Console
· Use VI Client and VirtualCenter to Administer the Hosts Instead of
Service Console
· Use a Directory Service for Authentication
· Strictly Control Root Privileges
· Control Access to Privileged Capabilities
· Establish a Password Policy for Local User Accounts
· Do Not Manage the Service Console as if it were a Linux Host
· Maintain Proper Logging
· Establish and Maintain File System Integrity
· Secure the SNMP Configuration
· Protect against the Root File System Filling Up
· Disable Automatic Mounting of USB Devices
· ESX Best Practices
· Configuring Host-level Management in ESXi 3.5
· Strictly Control Root Privileges
· Control Access to Privileged Capabilities
· Maintain Proper Logging
· Establish and Maintain Configuration File Integrity
· Secure the SNMP Configuration
· Ensure Secure Access to CIM
· Audit or Disable Technical Support Mode
· Best Practices ESXi
· Isolate the Infrastructure-related Networks
· Configure Encryption for Communication between Clients and
ESX/ESXi
· Label Virtual Networks Clearly
· Do Not Create a Default Port Group
· Do Not Use Promiscuous Mode on Network Interfaces
· Protect against MAC Address Spoofing
· Secure the ESX/ESXi Host Console
· Mask and Zone SAN Resources Appropriately
· Secure iSCSI Devices through Authentication
· Configuring the ESX/ESXi Host
· Set Up the Windows Host for VirtualCenter with Proper Security
· Limit Administrative Access
· Limit Network Connectivity to VirtualCenter
· Use Proper Security Measures when Configuring the Database for
VirtualCenter
· Enable Full and Secure Use of Certificate-based Encryption
· VirtualCenter Server Certificates Replacement
· Pre-Installation
· During Installation
· Post-Installation
· Use VirtualCenter Custom Roles
· Document and Monitor Changes to the Configuration
· VirtualCenter Add-on Components
· VMware Update Manager
· VMware Converter Enterprise
· VMware Guided Consolidation
· General Considerations
· VirtualCenter
· Restrict the use of Linux-based Clients
· Verify the Integrity of VI Client
· Monitor the Usage of VI Client Instances
· Avoid the Use of Plain-Text Passwords
· Client Components

Appendix:
· The Basics of SAN Security, Part I
· Increasing Security Concerns
· Administrator-to-Security Management Domain
· Host-to-Switch Domain
· Security Management-to-Fabric Domain
· Security Domains
· Switch-to-Switch Domain
· So What Is Zoning?
· Zoning Types
· Configuring Zoning Components
· LUN Masking
· Persistent Binding
· Security Technologies
· Host-to-Fabric
· Summary and Conclusions
· Data Integrity and Security
· Security Management Part 2
· Fibre Channel Security Management
· Authentication and Authorization
· Configuration Management
· SAN Access
· SAN Security Benefits
· Host-Based and Switch Based Mapping
· Controller-based Mapping
· WWN Privileged Access
· Redundancy
· Management
· Summary and Conclusions

· Appendix 1 – Malware
· Distributing Malware
· Malware Capabilities
· Netcat Switches
· Netcat
· Executable Wrappers
· Avoiding Detection
· BPMTK

· Appendix 2 – SQL Injection
· What is SQL Injection?
· Why SQL Injection?
· SQL Ping2
· osql.ex
· Attacking Database Servers
Prerequisites & Certificates
Pre-Requisites

Certificates offered

It is exclusive to TekSource, Hours 8-6pm, lunch included. This price does NOT include the exam. The exam is $295.00.


Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course, will be subject to a 15% administration fee, and course ware fees where applicable. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.

Map & Reviews
TekSource Corporate Learning
[ View Provider's Profile ]

Reviews
 

This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
A quick note to say thanks very much for the information I garnered at the course. The training was very informative and practical; the handout material contains a lot of information that will be helpful in future.
Reviewed by 2014
I found the course to be useful and easy to follow. Would use their service again.
Reviewed by 2014
I really enjoyed this training session, I found it incredible helpful for our needs of customizing our CRM. The instructor was good
Reviewed by 2013
By choice, and as I didn't want to disturb the man next to me, I didn't ask to many questions of the instructor. I realize that taking the same course at the same time would have been ideal, but I understand why we were put in the same space. I had a few computer glitches which shuffled the course material around a bit which I eventually found a work around for. A lot of material for one day and I did find myself paying attention to the clock to make sure I finished at a reasonable time.
Reviewed by 2012
very well organized and flexible. Helped me with my specific needs. Steve was very helpful.
Reviewed by 2012
I thought that the course content was excellent, it covered a wide variety of new features in 2010 at a sufficeint level of detail. The video instructor was also very diliegent about highlighting the various ribbon features and showing alternate methods of completing a task. This teaching method may not be for everyone, but I enjoyed the ability to learn at my own pace, without being slowed down by questions that were not relevant to me. It would be nice to have better control over the video streaming in order to skip over/ahead on topics that are familiar to the user.
Reviewed by 2012
the instructor was very knowledgeable, and most importantly patient.
Reviewed by 2012
Found that the advance training was where my level was at already on most items (wishing there was a super advanced training). Found the ‘instructor’ not to be conversant on the program I was being trained on (probably the same level as I was) which was frustrating. He did ask other personnel which did have more knowledge but did not give me a clear answer (said it was part of the limits of the program and what I was looking for was very customized, duh this is why I took the advanced) He was willing to go over the ideas of tables and relationships with me which was not covered in the course, which I was thankful for. The course did delivered though what it had said it would and it was good to get reinforcement on what I had learned on my own, that I was on the right track.
Reviewed by 2012
The course was really useful for me.
Reviewed by 2012
over all it is a good experience and I learnt something out of it.
Reviewed by 2012
Course content was not as comprehensive as I'd hoped. Would have liked more indepth lessons about macros.
Reviewed by 2012
It would be great to separate two different session for the topic. It was usufull and meantime it was too much information.
Reviewed by 2012
Hi, There was one problem with the flow. I'm not completely sure as to how best to describe it but basically, it didn't flow from one module to the next. Specifically, if I was in a particular module (say the introduction or first sub-module) and it completed, I was not automatically taken to the next sub-module within the overall module (a module being a section of the course). Feel free to give me a call to discuss at 416-686-3141.
Reviewed by 2012
The first hour of the course was difficult due to the noisy environment. There were 3 separate software platforms being mentored by 2 instructors simultaneously. As each required unique start up instructions, it was very difficult to concentrate on the video teaching for my session in spite of the headphones as there was a significant amount of background noise. I suggest that future sessions that are mentored rather than led be done as dedicated sessions (i.e. only 1 software platform being taught at a time) to minimize the impact of this situation. Additionally, the 2 instructors had side conversations that had nothing to do with teaching the sessions and needed to be asked not to do this as I found it was hindering my ability to listen to the video lesson. Unwilling to crank the volume on the headset, I could hear them clearly over the top of the lesson I was listening to.
Reviewed by 2012
Everyone was extremely laid back, kind and courteous. I felt very comfortable and no matter who you were in contact with, all employees were approachable.
Reviewed by 2012
While the instructor had a basic understanding of Project 2010, he did not have "advanced" knowledge which was the level of the course. He had not really used the software in "real life" so didn't have any context. Whenever I had questions, he looked for answers from microsoft.com (I could have done the same). I was hoping the instructor would provided added knowledge to what I was learning from the videos.
Reviewed by 2012
Fantastic and very relevant. The instructor was very pleasant and helpful.
Reviewed by 2012
Too many mistakes made in the videos, this made it confusing about what to follow and what to avoid. Seminar presenter got off-topic too much which made me pressed for time.
Reviewed by 2011
There really is not enough time in one day to do all the exersizes in the training manual, watch all the videos, take the quizzes, and discuss specifc issues with the instructor. I would suggest improving the video intruction to actual take you through some of the exersizes rather than leaving you to do it on your own, because you really only learn by doing.
Reviewed by 2011
Thought the directions in the book exercises exercises could be written a little clearer.
Reviewed by 2011
My second course with TekSource and it's always an enjoyable experience. It's a nice clean office environment close to the subway. And the staff is excellent and helpful.
Reviewed by 2011
Not instructor led hence one star rating
Reviewed by 2011
The only somewhat critical comment I have is that it can be difficult to concentrate when the mentor is explaining to another student. In a small classroom setting, I guess that is just a reality of mentor-assisted training.
Reviewed by 2011
Steve Meggenson understand French. He helped me a lot with my documents from work. Now I know how to use Access for my work. I should take this course 5 years ago! But, it's not too late! I want to take the monitored or coach course with Steve again because he can read and understand french!
Reviewed by 2011
I wish that there had been more examples and more exercises for pivot tables and vlook up. They are very valuable tools.
Reviewed by 2011
Very positive experience.
Reviewed by 2011
need-to-train-a-group-banner

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 461 times.