Course Overview
You will receive the information, abilities, and resources necessary to become proficient in setting up, managing, and troubleshooting the VMware NSX-TTM Data Center for intrinsic security during this five-day hands-on training session. The Distributed Firewall and Gateway Firewall, Distributed and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX® IntelligenceTM, and VMware NSX® Network Detection and ResponseTM are just a few of the security features in the NSX-T Data Center that are covered in this course.
Prerequisites
Additionally, you ought to be aware of or grasp the following:
- Thorough familiarity with TCP/IP services and protocols.
- Network security expertise and practical experience, including:
- L2 through L7 firewalling
- Intrusion detection and prevention systems
- Malware prevention systems
- Knowledge of and working experience with VMware vSphere® environments and KVM-based Environments
Audience Profile
- Experienced system administrators and network administrators
- Network and security professionals who currently or have worked with enterprise networks
Learning Objectives
By the end, you ought to be able to accomplish the following goals:
- Describe key terms linked to information security.
- Describe the various firewall configurations and use scenarios.
- Describe how intrusion detection and prevention systems function.
- Differentiate between methods for malware prevention.
- Describe the portfolio of VMware's intrinsic security.
- Use segmentation provided by VMware NSX® to implement zero-trust security.
- Manage user and role access.
- Set up and manage time-based policies, identity firewalls, and distributed firewalls.
- Set up and address Gateway Security issues.
- To manage NSX firewalls, use VMware vRealize® Network InsightTM and VMware vRealize® Log InsightTM for NSXTM.
- Describe the grouping, tagging, and rule setting security best practises.
- Explain the east-west and north-south service insertion.
- Explain endpoint security.
- Set up and maintain IDS/IPS.
- NSX Application Platform deployment.
- Set up and address NSX Malware Prevention issues.
- Describe the capabilities of NSX Intelligence and NSX Network Detection and Response
Content Outline
- Introductions and course logistics
- Course objectives
- Define information-security-related concepts
- Explain the different types of firewalls and their use cases
- Describe the operation of IDS/IPS
- Differentiate between Malware Prevention approaches
- Define the VMware intrinsic security strategy
- Describe the VMware intrinsic security portfolio
- Explain how NSX-T Data Center aligns with the intrinsic security strategy
- Outline what Zero-Trust Security is.
- Outline a Zero-Trust Architecture's five pillars.
- Describe the use cases for NSX segmentation.
- Describe the procedures necessary to implement NSX segmentation and enforce zero-trust.
- Connect VMware Identity ManagerTM and NSX-T Data Center.
- Connect LDAP and NSX-T Data Center.
- Describe the NSX-T Data Center's native users and roles.
- Create your own user roles and assign them.
- Configure Distributed Firewall rules and policies
- Describe the NSX Distributed Firewall architecture
- Troubleshoot common problems related to NSX Distributed Firewall
- Configure time-based policies
- Configure Identity Firewall rules
- Configure Gateway Firewall rules and policies
- Describe the architecture of the Gateway Firewall
- Identify and troubleshoot common Gateway Firewall issues
- Configure TLS Inspection to decrypt traffic for both internal and external services
- Configure URL filtering and identify common configuration issues
- Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls
- Explain best security practices related to grouping, tagging, and rule configuration
- Describe network retrospection.
- Describe the east-west and north-south service insertion architectures and procedures.
- Address east-west and north-south service insertion issues.
- Describe endpoint security.
- Describe the endpoint protection architecture and workflows.
- Investigate endpoint security issues.
- Give an overview of the MITRE ATT&CK framework.
- Explain the various stages of a cyber attack.
- Describe the use of NSX security solutions to thwart online threats.
- Set up and maintain Distributed IDS/IPS.
- Set up and maintain North-South IDS/IPS
- Describe the NSX Application Platform and its use cases
- Identify the topologies supported for the deployment of the NSX Application Platform
- Deploy NSX Application Platform
- Explain the NSX Application Platform architecture and services
- Validate the NSX Application Platform deployment and troubleshoot common issues
- Identify NSX Malware Prevention use cases.
- Recognize the elements of the architecture for NSX Malware Prevention.
- Describe the known and unknown file packet flows for NSX Malware Prevention.
- Set up NSX Malware Prevention for north-south and east-west traffic.
- Describe NSX Intelligence and its use cases
- Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities
- Describe NSX Network Detection and Response and its use cases
- Explain the architecture of NSX Network Detection and Response in the NSX-T Data Center
- Describe the visualization capabilities of NSX Network Detection and Response
FAQs
A: Radiant Techlearning is headquartered in the Electronic city & technology hub of Northern India, Noida, surrounded by several large multinational, medium & small Software companies. We have offices located all across the country and partners across the globe.
A: For participants' hands-on practise, Radiant Techlearning includes a data centre with a virtual training environment. With the use of a remote desktop connection, participants can effortlessly access these laboratories over the cloud. You may learn from anywhere and in any time zone with radiant virtual laboratories.
A: The learners will be enthralled as we engage them in the natural world and Oriented industry projects during the training program. These projects will improve your skills and knowledge and give you a better experience. These real-time projects will help you a lot in your future tasks and assignments.
A: To know about the fees details, you can email us at training@radianttechlearning.com with your requirement in detail containing the below information
In the case of Self/ Individual
- Training Program
- Training Mode (Online/ Classroom)
- Location (in case of the classroom):
- Background (Education/ Technology/ Year of experience, etc. )
- Training Timeline
In the case of Corporate Training
- Training Program of Participants
- Training Mode (Online/ Classroom)
- Location (in case of the classroom):
- Participant’s Background (Education/ Technology/ Year of experience, etc.)
- Training Timeline
- Expectations from the training program
A:
- Experienced system administrators and network administrators
- Network and security professionals who work with enterprise networks
A: This course has a duration of 5 days.
A: No. These training programs are helping to improve your skills & knowledge of the technology, which would allow you to land your dream job by learning them.
Our training program will maximize your ability and chances of getting a successful job. You have to select a position according to your convenience. Your performance in the training program and interview is crucial for getting a good job.
A: Yes, your employer can pay your fees.
A: The learners will be enthralled as we engage them in the natural world and Oriented industry projects during the training program. These projects will improve your skills and knowledge and give you a better experience. These real-time projects will help you a lot in your future tasks and assignments.