SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Hacking Uncovered: VMware®
                                                                                                          5 Day, Hands-On Bootcamp
                                                                                                                   Why You Need This!
                                                                                                                     class, I thought I knew how to secure our virtual environ-
                                                                                                                     ment. I realized after this class how vulnerable our
                                                                                                                     infrastructure is.” - Alex W, Sr. Network Administrator
                                                                                                                                 • If you are using any remote storage
                                                                                                                                   (iSCSI, NFS, Fibre Channel), this class
                                                                                                                                   will show how an attacker can redi-
                                                                                                                                   rect, then copy or even change infor-
    Virtualization technologies are                                                                                                mation before it arrives at the desti-
      not secure “out of the box”                                                                                                  nation!

A critical and often overlooked aspect of migrating to a virtualized                                                             • Detect potential threats, how to
environment is setting up security properly. Virtualization technologies                                                           defend and defeat them, and how to
are not secure “out of the box” and VMware® is no exception. The Hack-
ing Uncovered: VMware® course focuses on where the vulnerabilities lie                                                             establish a solid foundation to build
and how to reduce the attack surfaces in a virtualized environment.                                                                secure virtual data centers from the
                                                                                                                                   ground up.
This course goes beyond the typical security protocols administrators
use to secure their current environments and dives much deeper into the                                                          • Any regular user inside your network
actual workings and shortcomings of the VMware® environment.
                                                                                                                                   can take full control of your ESX hosts
                                                                                                                                   if they know the right exploits.
“These guys are like the Darth Vaders of the
 network world. I'm glad they are on our side
 since this was a security course. Our instructor                                                                                • By taking control of your virtual
 was amazing and by far the best guy we've                                                                                         environment a hacker could disable
 seen here. This guy is world class.” – Jim B., CIO                                                                                ALL your VMs at one time.

This course was designed and developed from the perspective of
how a hacker will get into your VMware® Environment by a Licensed                                                                                                   -
Penetration Tester and hacking Guru with a long history of vulnerability                                                           mation and ensure compliance with
audits with: US Dept. of Homeland Security, US Government Agencies                                                                 HIPPA, SOX, or STIG standards and
(NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants,
law enforcement agencies, fortune 500 companies, universities, and
                                                                                                                                   regulations.
many foreign governments.
                                                                                                                                  “This was some of the best
                                          Contact us to Enroll!
                                     TekSource Corporate Learning                                                                   training I've ever had.”
                                       36 Lombard St., Suite 600                                                                                    William L.
                                         Toronto, ON M5C 2X3

                 info@teksource.ca | (647)827-0488
     and other countries, and may not be used without written permission. VMware is a registered trademark of VMware, Inc.
       in the United States and/or other countries. All other trademarks are the property of their respective owners. Global
 © 2009 VMTraining Solutions is not associated with any product or vendor in this advertisement and/or course.
               Training
On-Site and

Hacking Uncovered:                                                                                        Online Classes Available.
                                                                                                            Call for More Details!



VMware®                                                           Covers VMware’s® VI 3 and
                                                                     vSphere 4 Products!

                     CVSE1021 - A Five Day, Hands-on Bootcamp
                            1 Five Day Hands-on Bootcamp
                                  F v ay      n o
Chapter 1 – Primer and Reaffirming our Knowledge
  • ESX Networking Components
  • Virtual Ethernet Adapters and How They Work
  • Virtual Switches and How They Work                                   • Alternate Data Streams, Encrypted Tunnels
                                                                                                             , Metasploit, Fuzzers
  • VLANs in VMWare Infrastructure
                                                                           SaintExploit, Core Impact, Wireshark
  • Layer 2 Security Features & File System Structure
                                                                         • ARP Cache Poisoning, Hash Algorithm
  • Managing the Virtual Network with “VirtualCenter”
  • Kernel, Processes, Account and Groups                              Chapter 8 – Hardening your ESX Server
  • Linux and UNIX Permissions
                                                                         • Configuring the ESX/ESXi Host
                                                                         • VirtualCenter, Client Components
                                                                         • The Basics of SAN Security, Part I, Increasing Security Concerns
                                                                         • Security Domains, Switch-to-Switch Domain
  • What is the Cost of a Hack?                                          • Data Integrity and Security
  • Current Issues and the Evolving Threat                               • Security Management Part 2
                                                                         • Fibre Channel Security Management
  • Common Management Errors

                                                                         • SAN Access, SAN Security Benefits
                                                                         • Controller-based Mapping, WWN Privileged Access
  • How traffic is routed between Virtual Machines on ESX hosts            • Redundancy, Management
  • Security Design of the VMware Infrastructure 3 Architecture
  • VMware Infrastructure Architecture and Security Features             • Netcat
                                                                         • Executable Wrappers

                                                                         • BPMTK




  • Virtualized DMZ Networks


   Deployment
                                                                  Show that you are an expert at securing
Chapter 6 – Remote DataStore Security
  • Mask and Zone SAN Resources

  • Securing iSCSI, iFCP and FCIP over IP networks                  Don’t let your company’s
                                                                     network be a victim of
                                                                         fraud or theft!
                                                                       Contact us to Enroll!
                                                                  TekSource Corporate Learning
                                                                    36 Lombard St., Suite 600
                                                                      Toronto, ON M5C 2X3                                        © 2009 VMTraining

Mais conteúdo relacionado

Mais procurados

Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecuritydrewz lin
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesBulent Buyukkahraman
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
Cloudop security
Cloudop securityCloudop security
Cloudop securitywardspan
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...Nevales Networks
 

Mais procurados (20)

Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing Services
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
Cloudop security
Cloudop securityCloudop security
Cloudop security
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...
 

Semelhante a Hacking Uncovered V Mware

Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Cloud Security for Life Science R&D
Cloud Security for Life Science R&DCloud Security for Life Science R&D
Cloud Security for Life Science R&DChris Dagdigian
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsJames Wickett
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...David Etue
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraftenigma0x3
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0kimwisniewski
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Alex Cachia
 

Semelhante a Hacking Uncovered V Mware (20)

V Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate BootcampV Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate Bootcamp
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
vSphere Security
vSphere SecurityvSphere Security
vSphere Security
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Cloud Security for Life Science R&D
Cloud Security for Life Science R&DCloud Security for Life Science R&D
Cloud Security for Life Science R&D
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Hacking Uncovered V Mware

  • 1. Hacking Uncovered: VMware® 5 Day, Hands-On Bootcamp Why You Need This! class, I thought I knew how to secure our virtual environ- ment. I realized after this class how vulnerable our infrastructure is.” - Alex W, Sr. Network Administrator • If you are using any remote storage (iSCSI, NFS, Fibre Channel), this class will show how an attacker can redi- rect, then copy or even change infor- Virtualization technologies are mation before it arrives at the desti- not secure “out of the box” nation! A critical and often overlooked aspect of migrating to a virtualized • Detect potential threats, how to environment is setting up security properly. Virtualization technologies defend and defeat them, and how to are not secure “out of the box” and VMware® is no exception. The Hack- ing Uncovered: VMware® course focuses on where the vulnerabilities lie establish a solid foundation to build and how to reduce the attack surfaces in a virtualized environment. secure virtual data centers from the ground up. This course goes beyond the typical security protocols administrators use to secure their current environments and dives much deeper into the • Any regular user inside your network actual workings and shortcomings of the VMware® environment. can take full control of your ESX hosts if they know the right exploits. “These guys are like the Darth Vaders of the network world. I'm glad they are on our side since this was a security course. Our instructor • By taking control of your virtual was amazing and by far the best guy we've environment a hacker could disable seen here. This guy is world class.” – Jim B., CIO ALL your VMs at one time. This course was designed and developed from the perspective of how a hacker will get into your VMware® Environment by a Licensed - Penetration Tester and hacking Guru with a long history of vulnerability mation and ensure compliance with audits with: US Dept. of Homeland Security, US Government Agencies HIPPA, SOX, or STIG standards and (NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants, law enforcement agencies, fortune 500 companies, universities, and regulations. many foreign governments. “This was some of the best Contact us to Enroll! TekSource Corporate Learning training I've ever had.” 36 Lombard St., Suite 600 William L. Toronto, ON M5C 2X3 info@teksource.ca | (647)827-0488 and other countries, and may not be used without written permission. VMware is a registered trademark of VMware, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. Global © 2009 VMTraining Solutions is not associated with any product or vendor in this advertisement and/or course. Training
  • 2. On-Site and Hacking Uncovered: Online Classes Available. Call for More Details! VMware® Covers VMware’s® VI 3 and vSphere 4 Products! CVSE1021 - A Five Day, Hands-on Bootcamp 1 Five Day Hands-on Bootcamp F v ay n o Chapter 1 – Primer and Reaffirming our Knowledge • ESX Networking Components • Virtual Ethernet Adapters and How They Work • Virtual Switches and How They Work • Alternate Data Streams, Encrypted Tunnels , Metasploit, Fuzzers • VLANs in VMWare Infrastructure SaintExploit, Core Impact, Wireshark • Layer 2 Security Features & File System Structure • ARP Cache Poisoning, Hash Algorithm • Managing the Virtual Network with “VirtualCenter” • Kernel, Processes, Account and Groups Chapter 8 – Hardening your ESX Server • Linux and UNIX Permissions • Configuring the ESX/ESXi Host • VirtualCenter, Client Components • The Basics of SAN Security, Part I, Increasing Security Concerns • Security Domains, Switch-to-Switch Domain • What is the Cost of a Hack? • Data Integrity and Security • Current Issues and the Evolving Threat • Security Management Part 2 • Fibre Channel Security Management • Common Management Errors • SAN Access, SAN Security Benefits • Controller-based Mapping, WWN Privileged Access • How traffic is routed between Virtual Machines on ESX hosts • Redundancy, Management • Security Design of the VMware Infrastructure 3 Architecture • VMware Infrastructure Architecture and Security Features • Netcat • Executable Wrappers • BPMTK • Virtualized DMZ Networks Deployment Show that you are an expert at securing Chapter 6 – Remote DataStore Security • Mask and Zone SAN Resources • Securing iSCSI, iFCP and FCIP over IP networks Don’t let your company’s network be a victim of fraud or theft! Contact us to Enroll! TekSource Corporate Learning 36 Lombard St., Suite 600 Toronto, ON M5C 2X3 © 2009 VMTraining