SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Hacking Uncovered: VMware®
                                                                                                          5 Day, Hands-On Bootcamp
                                                                                                                   Why You Need This!
                                                                                                                     class, I thought I knew how to secure our virtual environ-
                                                                                                                     ment. I realized after this class how vulnerable our
                                                                                                                     infrastructure is.” - Alex W, Sr. Network Administrator
                                                                                                                                 • If you are using any remote storage
                                                                                                                                   (iSCSI, NFS, Fibre Channel), this class
                                                                                                                                   will show how an attacker can redi-
                                                                                                                                   rect, then copy or even change infor-
    Virtualization technologies are                                                                                                mation before it arrives at the desti-
      not secure “out of the box”                                                                                                  nation!

A critical and often overlooked aspect of migrating to a virtualized                                                             • Detect potential threats, how to
environment is setting up security properly. Virtualization technologies                                                           defend and defeat them, and how to
are not secure “out of the box” and VMware® is no exception. The Hack-
ing Uncovered: VMware® course focuses on where the vulnerabilities lie                                                             establish a solid foundation to build
and how to reduce the attack surfaces in a virtualized environment.                                                                secure virtual data centers from the
                                                                                                                                   ground up.
This course goes beyond the typical security protocols administrators
use to secure their current environments and dives much deeper into the                                                          • Any regular user inside your network
actual workings and shortcomings of the VMware® environment.
                                                                                                                                   can take full control of your ESX hosts
                                                                                                                                   if they know the right exploits.
“These guys are like the Darth Vaders of the
 network world. I'm glad they are on our side
 since this was a security course. Our instructor                                                                                • By taking control of your virtual
 was amazing and by far the best guy we've                                                                                         environment a hacker could disable
 seen here. This guy is world class.” – Jim B., CIO                                                                                ALL your VMs at one time.

This course was designed and developed from the perspective of
how a hacker will get into your VMware® Environment by a Licensed                                                                                                   -
Penetration Tester and hacking Guru with a long history of vulnerability                                                           mation and ensure compliance with
audits with: US Dept. of Homeland Security, US Government Agencies                                                                 HIPPA, SOX, or STIG standards and
(NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants,
law enforcement agencies, fortune 500 companies, universities, and
                                                                                                                                   regulations.
many foreign governments.
                                                                                                                                  “This was some of the best
                                          Contact us to Enroll!
                                     TekSource Corporate Learning                                                                   training I've ever had.”
                                       36 Lombard St., Suite 600                                                                                    William L.
                                         Toronto, ON M5C 2X3

                 info@teksource.ca | (647)827-0488
     and other countries, and may not be used without written permission. VMware is a registered trademark of VMware, Inc.
       in the United States and/or other countries. All other trademarks are the property of their respective owners. Global
 © 2009 VMTraining Solutions is not associated with any product or vendor in this advertisement and/or course.
               Training
On-Site and

Hacking Uncovered:                                                                                        Online Classes Available.
                                                                                                            Call for More Details!



VMware®                                                           Covers VMware’s® VI 3 and
                                                                     vSphere 4 Products!

                     CVSE1021 - A Five Day, Hands-on Bootcamp
                            1 Five Day Hands-on Bootcamp
                                  F v ay      n o
Chapter 1 – Primer and Reaffirming our Knowledge
  • ESX Networking Components
  • Virtual Ethernet Adapters and How They Work
  • Virtual Switches and How They Work                                   • Alternate Data Streams, Encrypted Tunnels
                                                                                                             , Metasploit, Fuzzers
  • VLANs in VMWare Infrastructure
                                                                           SaintExploit, Core Impact, Wireshark
  • Layer 2 Security Features & File System Structure
                                                                         • ARP Cache Poisoning, Hash Algorithm
  • Managing the Virtual Network with “VirtualCenter”
  • Kernel, Processes, Account and Groups                              Chapter 8 – Hardening your ESX Server
  • Linux and UNIX Permissions
                                                                         • Configuring the ESX/ESXi Host
                                                                         • VirtualCenter, Client Components
                                                                         • The Basics of SAN Security, Part I, Increasing Security Concerns
                                                                         • Security Domains, Switch-to-Switch Domain
  • What is the Cost of a Hack?                                          • Data Integrity and Security
  • Current Issues and the Evolving Threat                               • Security Management Part 2
                                                                         • Fibre Channel Security Management
  • Common Management Errors

                                                                         • SAN Access, SAN Security Benefits
                                                                         • Controller-based Mapping, WWN Privileged Access
  • How traffic is routed between Virtual Machines on ESX hosts            • Redundancy, Management
  • Security Design of the VMware Infrastructure 3 Architecture
  • VMware Infrastructure Architecture and Security Features             • Netcat
                                                                         • Executable Wrappers

                                                                         • BPMTK




  • Virtualized DMZ Networks


   Deployment
                                                                  Show that you are an expert at securing
Chapter 6 – Remote DataStore Security
  • Mask and Zone SAN Resources

  • Securing iSCSI, iFCP and FCIP over IP networks                  Don’t let your company’s
                                                                     network be a victim of
                                                                         fraud or theft!
                                                                       Contact us to Enroll!
                                                                  TekSource Corporate Learning
                                                                    36 Lombard St., Suite 600
                                                                      Toronto, ON M5C 2X3                                        © 2009 VMTraining

Weitere ähnliche Inhalte

Was ist angesagt?

Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosNextel S.A.
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecuritydrewz lin
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesBulent Buyukkahraman
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Securityanniebrowny
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
Cloudop security
Cloudop securityCloudop security
Cloudop securitywardspan
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...Nevales Networks
 

Was ist angesagt? (20)

Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing Services
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
Cloudop security
Cloudop securityCloudop security
Cloudop security
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...
 

Ähnlich wie Hacking Uncovered V Mware

Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Cloud Security for Life Science R&D
Cloud Security for Life Science R&DCloud Security for Life Science R&D
Cloud Security for Life Science R&DChris Dagdigian
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsJames Wickett
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...David Etue
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeDigital Defense Inc
 
Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraftenigma0x3
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0kimwisniewski
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Alex Cachia
 

Ähnlich wie Hacking Uncovered V Mware (20)

V Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate BootcampV Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate Bootcamp
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
vSphere Security
vSphere SecurityvSphere Security
vSphere Security
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Cloud Security for Life Science R&D
Cloud Security for Life Science R&DCloud Security for Life Science R&D
Cloud Security for Life Science R&D
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...
 

Kürzlich hochgeladen

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 

Kürzlich hochgeladen (20)

ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 

Hacking Uncovered V Mware

  • 1. Hacking Uncovered: VMware® 5 Day, Hands-On Bootcamp Why You Need This! class, I thought I knew how to secure our virtual environ- ment. I realized after this class how vulnerable our infrastructure is.” - Alex W, Sr. Network Administrator • If you are using any remote storage (iSCSI, NFS, Fibre Channel), this class will show how an attacker can redi- rect, then copy or even change infor- Virtualization technologies are mation before it arrives at the desti- not secure “out of the box” nation! A critical and often overlooked aspect of migrating to a virtualized • Detect potential threats, how to environment is setting up security properly. Virtualization technologies defend and defeat them, and how to are not secure “out of the box” and VMware® is no exception. The Hack- ing Uncovered: VMware® course focuses on where the vulnerabilities lie establish a solid foundation to build and how to reduce the attack surfaces in a virtualized environment. secure virtual data centers from the ground up. This course goes beyond the typical security protocols administrators use to secure their current environments and dives much deeper into the • Any regular user inside your network actual workings and shortcomings of the VMware® environment. can take full control of your ESX hosts if they know the right exploits. “These guys are like the Darth Vaders of the network world. I'm glad they are on our side since this was a security course. Our instructor • By taking control of your virtual was amazing and by far the best guy we've environment a hacker could disable seen here. This guy is world class.” – Jim B., CIO ALL your VMs at one time. This course was designed and developed from the perspective of how a hacker will get into your VMware® Environment by a Licensed - Penetration Tester and hacking Guru with a long history of vulnerability mation and ensure compliance with audits with: US Dept. of Homeland Security, US Government Agencies HIPPA, SOX, or STIG standards and (NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants, law enforcement agencies, fortune 500 companies, universities, and regulations. many foreign governments. “This was some of the best Contact us to Enroll! TekSource Corporate Learning training I've ever had.” 36 Lombard St., Suite 600 William L. Toronto, ON M5C 2X3 info@teksource.ca | (647)827-0488 and other countries, and may not be used without written permission. VMware is a registered trademark of VMware, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. Global © 2009 VMTraining Solutions is not associated with any product or vendor in this advertisement and/or course. Training
  • 2. On-Site and Hacking Uncovered: Online Classes Available. Call for More Details! VMware® Covers VMware’s® VI 3 and vSphere 4 Products! CVSE1021 - A Five Day, Hands-on Bootcamp 1 Five Day Hands-on Bootcamp F v ay n o Chapter 1 – Primer and Reaffirming our Knowledge • ESX Networking Components • Virtual Ethernet Adapters and How They Work • Virtual Switches and How They Work • Alternate Data Streams, Encrypted Tunnels , Metasploit, Fuzzers • VLANs in VMWare Infrastructure SaintExploit, Core Impact, Wireshark • Layer 2 Security Features & File System Structure • ARP Cache Poisoning, Hash Algorithm • Managing the Virtual Network with “VirtualCenter” • Kernel, Processes, Account and Groups Chapter 8 – Hardening your ESX Server • Linux and UNIX Permissions • Configuring the ESX/ESXi Host • VirtualCenter, Client Components • The Basics of SAN Security, Part I, Increasing Security Concerns • Security Domains, Switch-to-Switch Domain • What is the Cost of a Hack? • Data Integrity and Security • Current Issues and the Evolving Threat • Security Management Part 2 • Fibre Channel Security Management • Common Management Errors • SAN Access, SAN Security Benefits • Controller-based Mapping, WWN Privileged Access • How traffic is routed between Virtual Machines on ESX hosts • Redundancy, Management • Security Design of the VMware Infrastructure 3 Architecture • VMware Infrastructure Architecture and Security Features • Netcat • Executable Wrappers • BPMTK • Virtualized DMZ Networks Deployment Show that you are an expert at securing Chapter 6 – Remote DataStore Security • Mask and Zone SAN Resources • Securing iSCSI, iFCP and FCIP over IP networks Don’t let your company’s network be a victim of fraud or theft! Contact us to Enroll! TekSource Corporate Learning 36 Lombard St., Suite 600 Toronto, ON M5C 2X3 © 2009 VMTraining