VMware vSphere: Configure and Administer Security
Offered By: LinkedIn Learning
Course Description
Overview
Learn to configure vSphere security: manage vCenter and ESXi roles and permissions, harden the vSphere environment, and enable single sign-on.
VMware is the market leader in virtualization. Their cloudÂ-based virtualization platform, vSphere, is the software of choice for organizations looking to go virtual. This course, by VMware Certified Instructor Rick Crisci, shows what it takes to configure and manage security in a VMware vSphere environmentâa key skill for any systems administrator or virtualization pro. Rick covers managing vCenter roles and permissions, as well as local ESXi permissions and authentication. Plus, learn how to secure and harden the vSphere environment, including virtual machines, switches, services, and firewalls, and enable single signÂ-on for your users.
Note: This course maps to the Configure and Administer vSphere 6.x Security domain of the VMware Certified Professional 6âData Center Virtualization (VCP6ÂDCV) exam.
VMware is the market leader in virtualization. Their cloudÂ-based virtualization platform, vSphere, is the software of choice for organizations looking to go virtual. This course, by VMware Certified Instructor Rick Crisci, shows what it takes to configure and manage security in a VMware vSphere environmentâa key skill for any systems administrator or virtualization pro. Rick covers managing vCenter roles and permissions, as well as local ESXi permissions and authentication. Plus, learn how to secure and harden the vSphere environment, including virtual machines, switches, services, and firewalls, and enable single signÂ-on for your users.
Note: This course maps to the Configure and Administer vSphere 6.x Security domain of the VMware Certified Professional 6âData Center Virtualization (VCP6ÂDCV) exam.
Syllabus
Introduction
- Welcome
- What you should know before watching this course
- Introduction to vCenter roles
- Who, what, and where?
- Built-in roles
- Creating custom roles
- Permission, example 1
- Permission, example 2
- Common task permissions
- Cloning sample roles
- Global permissions
- ESXi authentication options
- Joining an ESXi host to Active Directory
- Securing virtual machines
- Virtual Switch security policies
- Managing ESXi host services
- Managing the ESXi host firewall
- Using lockdown mode
- Understanding vSphere Certificate Manager
- The vSphere Managed Object Browser
- vSphere Managed Object Browser demo
- Introduction to Single Sign-On
- Single Sign-On components
- Identity sources
- Creating identity sources
- Configuring Single Sign-On users
- Configuring Single Sign-On password policies
- Multi-site Single Sign-On
- VMware Certificate Authority
- Next Steps
Taught by
Rick Crisci
Related Courses
Planning, Auditing and Maintaining Enterprise SystemsUniversity of Colorado System via Coursera On Premises Installation and Fundamentals with Google Cloud's Apigee API Platform
Google Cloud via Coursera Architecting with Google Kubernetes Engine 日本語版
Google Cloud via Coursera Beginning SQL Server
Coursera Project Network via Coursera Architecting with Google Kubernetes Engine auf Deutsch
Google Cloud via Coursera