In this five-day seminar, we will focus on ESX and Hyper-V security. You will start with virtualization basics, hardware virtualization considerations, and different versions of ESX. We will examine best practices for securing ESX servers, access to the management console, ESX logging and other configuration issues to ensure ESX virtual server hosts are secure and stable. We will then review Hyper-V and best practices for securing a Hyper-V environment. Finally, we will tie all of these concepts together with a formulation of a suggested audit program of ESX/Hyper-V and the virtual server environment. Case studies using a combination of live demonstrations and exercises will reinforce important virtualization concepts and associated audit points addressed in real audit projects.
This course is available on-site at your location, or offered through open enrollment 5/18/20 - 5/20/20.
- Virtualization Basics, define virtualization, advantages and disadvantages of virtualization, hardware considerations, high availability, back-up strategies, ESX and Hyper-V, integrating virtualization and disaster recovery, potential hypervisor attacks, ESX and Hyper-V
- vSphere and ESXi Basics, ESXi Basics, ESXi Versions, ESXi OS Support, ESXi Hardware Considerations, ESXi Backup, Hardening ESXi, vCenter Security
- Hyper-V Basics, Hyper-V Basics, Hyper-V Versions, Hyper-V Guest OS Support, Hyper-V Host, Hardware Considerations, Hyper-V Clustering, Hyper-V Hardening
- Virtualization and Disaster Recovery, benefits of incorporating virtualization into your disaster recovery plan, physical versus virtual server recovery times, hyperconvergence and disaster recovery, architecting your production environment to simplify disaster recovery, Recovery Point Objectives (RPO), Recovery Time Objectives (RTO), testing your disaster recovery plan.
- Developing an Audit Program for ESX, auditing host hardware, auditing the host configuration, auditing virtual host, management computers, auditing the UPS configuration, auditing the backup, auditing the physical to virtual migrations, auditing clusters, auditing virtual servers.