VMware vSphere 6.5 Security
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to configure security settings using vSphere 6.5. Explore SSO, user authentication, host security, and encryption. Prepare for the VMware Certified Professional exam.
Learn how to administer the critical security components of vSphere 6.5, the data center virtualization platform from VMware. This course covers core vSphere security concepts, topics which are part of the VMware Certified Professional exam. Instructor Rick Crisci starts the course by demonstrating single sign-on (SSO) setup, followed by user role and permission configuration using vCenter. Then he explains how to secure virtual machines, harden host servers, and select encryption options. Explore ESXi, vMotion, and more, as he demonstrates common tasks that you may need to perform as a vSphere system administrator.
Learn how to administer the critical security components of vSphere 6.5, the data center virtualization platform from VMware. This course covers core vSphere security concepts, topics which are part of the VMware Certified Professional exam. Instructor Rick Crisci starts the course by demonstrating single sign-on (SSO) setup, followed by user role and permission configuration using vCenter. Then he explains how to secure virtual machines, harden host servers, and select encryption options. Explore ESXi, vMotion, and more, as he demonstrates common tasks that you may need to perform as a vSphere system administrator.
Syllabus
1. vSphere Security
- vSphere Single Sign-On
- vSphere Single Sign-On configuration
- vCenter roles and permissions
- Securing vSphere virtual machines
- Hardening ESXi 6.5 hosts
- Encrypted vMotion in vSphere 6.5
Taught by
Rick Crisci
Related Courses
Microsoft Azure Administrator: Secure Access to Virtual NetworksPluralsight Microsoft Azure: Security Concepts
LinkedIn Learning Microsoft Security, Compliance, and Identity Fundamentals: Describe the capabilities of Microsoft security solutions
Microsoft via Microsoft Learn Securing Software, Data and End Points
(ISC)² via Coursera Securing Virtual Machines using BeyondCorp Enterprise (BCE)
Google Cloud via Coursera