Implementing Nutanix Networking and Security
Offered By: Pluralsight
Course Description
Overview
This course teaches you the skills you need to implement and manage a secure Nutanix deployment that follows Nutanix’s best practices for AHV networking.
Security and best practice networking are at the heart of any successful Nutanix deployment. In this course, Implementing Nutanix Networking and Security, you’ll discover the tools you can use to make your Nutanix’s deployment secure. First, you’ll explore Acropolis Hypervisor (AHV) networking, and learn the key features of AHV networking and best practices for getting the most out of networking in your clusters. Next, you’ll discover the built-in security features of a Nutanix cluster and how they can be implemented to give you a secure foundation. Finally, you’ll learn how to integrate Nutanix Flow and Nutanix Beam with your Nutanix clusters so that you can configure advanced security controls and advanced cloud visibility. When you’re finished with this course, you’ll have the skills and knowledge of Nutanix security and networking needed to be an effective member of any Nutanix implementation and administration team.
Security and best practice networking are at the heart of any successful Nutanix deployment. In this course, Implementing Nutanix Networking and Security, you’ll discover the tools you can use to make your Nutanix’s deployment secure. First, you’ll explore Acropolis Hypervisor (AHV) networking, and learn the key features of AHV networking and best practices for getting the most out of networking in your clusters. Next, you’ll discover the built-in security features of a Nutanix cluster and how they can be implemented to give you a secure foundation. Finally, you’ll learn how to integrate Nutanix Flow and Nutanix Beam with your Nutanix clusters so that you can configure advanced security controls and advanced cloud visibility. When you’re finished with this course, you’ll have the skills and knowledge of Nutanix security and networking needed to be an effective member of any Nutanix implementation and administration team.
Taught by
Michael Brown
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network