SlideShare a Scribd company logo
Hacking Uncovered: VMware®
                                                                                                          5 Day, Hands-On Bootcamp
                                                                                                                   Why You Need This!
                                                                                                                     class, I thought I knew how to secure our virtual environ-
                                                                                                                     ment. I realized after this class how vulnerable our
                                                                                                                     infrastructure is.” - Alex W, Sr. Network Administrator
                                                                                                                                 • If you are using any remote storage
                                                                                                                                   (iSCSI, NFS, Fibre Channel), this class
                                                                                                                                   will show how an attacker can redi-
                                                                                                                                   rect, then copy or even change infor-
    Virtualization technologies are                                                                                                mation before it arrives at the desti-
      not secure “out of the box”                                                                                                  nation!

A critical and often overlooked aspect of migrating to a virtualized                                                             • Detect potential threats, how to
environment is setting up security properly. Virtualization technologies                                                           defend and defeat them, and how to
are not secure “out of the box” and VMware® is no exception. The Hack-
ing Uncovered: VMware® course focuses on where the vulnerabilities lie                                                             establish a solid foundation to build
and how to reduce the attack surfaces in a virtualized environment.                                                                secure virtual data centers from the
                                                                                                                                   ground up.
This course goes beyond the typical security protocols administrators
use to secure their current environments and dives much deeper into the                                                          • Any regular user inside your network
actual workings and shortcomings of the VMware® environment.
                                                                                                                                   can take full control of your ESX hosts
                                                                                                                                   if they know the right exploits.
“These guys are like the Darth Vaders of the
 network world. I'm glad they are on our side
 since this was a security course. Our instructor                                                                                • By taking control of your virtual
 was amazing and by far the best guy we've                                                                                         environment a hacker could disable
 seen here. This guy is world class.” – Jim B., CIO                                                                                ALL your VMs at one time.

This course was designed and developed from the perspective of
how a hacker will get into your VMware® Environment by a Licensed                                                                                                   -
Penetration Tester and hacking Guru with a long history of vulnerability                                                           mation and ensure compliance with
audits with: US Dept. of Homeland Security, US Government Agencies                                                                 HIPPA, SOX, or STIG standards and
(NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants,
law enforcement agencies, fortune 500 companies, universities, and
                                                                                                                                   regulations.
many foreign governments.
                                                                                                                                  “This was some of the best
                                          Contact us to Enroll!
                                     TekSource Corporate Learning                                                                   training I've ever had.”
                                       36 Lombard St., Suite 600                                                                                    William L.
                                         Toronto, ON M5C 2X3

                 info@teksource.ca | (647)827-0488
     and other countries, and may not be used without written permission. VMware is a registered trademark of VMware, Inc.
       in the United States and/or other countries. All other trademarks are the property of their respective owners. Global
 © 2009 VMTraining Solutions is not associated with any product or vendor in this advertisement and/or course.
               Training
On-Site and

Hacking Uncovered:                                                                                        Online Classes Available.
                                                                                                            Call for More Details!



VMware®                                                           Covers VMware’s® VI 3 and
                                                                     vSphere 4 Products!

                     CVSE1021 - A Five Day, Hands-on Bootcamp
                            1 Five Day Hands-on Bootcamp
                                  F v ay      n o
Chapter 1 – Primer and Reaffirming our Knowledge
  • ESX Networking Components
  • Virtual Ethernet Adapters and How They Work
  • Virtual Switches and How They Work                                   • Alternate Data Streams, Encrypted Tunnels
                                                                                                             , Metasploit, Fuzzers
  • VLANs in VMWare Infrastructure
                                                                           SaintExploit, Core Impact, Wireshark
  • Layer 2 Security Features & File System Structure
                                                                         • ARP Cache Poisoning, Hash Algorithm
  • Managing the Virtual Network with “VirtualCenter”
  • Kernel, Processes, Account and Groups                              Chapter 8 – Hardening your ESX Server
  • Linux and UNIX Permissions
                                                                         • Configuring the ESX/ESXi Host
                                                                         • VirtualCenter, Client Components
                                                                         • The Basics of SAN Security, Part I, Increasing Security Concerns
                                                                         • Security Domains, Switch-to-Switch Domain
  • What is the Cost of a Hack?                                          • Data Integrity and Security
  • Current Issues and the Evolving Threat                               • Security Management Part 2
                                                                         • Fibre Channel Security Management
  • Common Management Errors

                                                                         • SAN Access, SAN Security Benefits
                                                                         • Controller-based Mapping, WWN Privileged Access
  • How traffic is routed between Virtual Machines on ESX hosts            • Redundancy, Management
  • Security Design of the VMware Infrastructure 3 Architecture
  • VMware Infrastructure Architecture and Security Features             • Netcat
                                                                         • Executable Wrappers

                                                                         • BPMTK




  • Virtualized DMZ Networks


   Deployment
                                                                  Show that you are an expert at securing
Chapter 6 – Remote DataStore Security
  • Mask and Zone SAN Resources

  • Securing iSCSI, iFCP and FCIP over IP networks                  Don’t let your company’s
                                                                     network be a victim of
                                                                         fraud or theft!
                                                                       Contact us to Enroll!
                                                                  TekSource Corporate Learning
                                                                    36 Lombard St., Suite 600
                                                                      Toronto, ON M5C 2X3                                        © 2009 VMTraining

More Related Content

What's hot

Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
Nextel S.A.
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecuritydrewz lin
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing Services
Bulent Buyukkahraman
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
justinkallhoff
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
anniebrowny
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
Cloudop security
Cloudop securityCloudop security
Cloudop security
wardspan
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
itforum-roundtable
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Networks
 

What's hot (20)

Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Axoss Network Penetration Testing Services
Axoss Network Penetration Testing ServicesAxoss Network Penetration Testing Services
Axoss Network Penetration Testing Services
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Take Control of End User Security
Take Control of End User SecurityTake Control of End User Security
Take Control of End User Security
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
Cloudop security
Cloudop securityCloudop security
Cloudop security
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...
 

Similar to Hacking Uncovered V Mware

Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Cloud Security for Life Science R&D
Cloud Security for Life Science R&DCloud Security for Life Science R&D
Cloud Security for Life Science R&D
Chris Dagdigian
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
James Wickett
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
Microsoft TechNet - Belgium and Luxembourg
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
David Etue
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Digital Defense Inc
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
Ahmed Nour
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Tom Moore
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
Graeme Wood
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
enigma0x3
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0kimwisniewski
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
IBM India Smarter Computing
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
Sameer Paradia
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...
Alex Cachia
 

Similar to Hacking Uncovered V Mware (20)

V Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate BootcampV Mware V Sphere 4 Ultimate Bootcamp
V Mware V Sphere 4 Ultimate Bootcamp
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
vSphere Security
vSphere SecurityvSphere Security
vSphere Security
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Cloud Security for Life Science R&D
Cloud Security for Life Science R&DCloud Security for Life Science R&D
Cloud Security for Life Science R&D
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Hacking Uncovered V Mware

  • 1. Hacking Uncovered: VMware® 5 Day, Hands-On Bootcamp Why You Need This! class, I thought I knew how to secure our virtual environ- ment. I realized after this class how vulnerable our infrastructure is.” - Alex W, Sr. Network Administrator • If you are using any remote storage (iSCSI, NFS, Fibre Channel), this class will show how an attacker can redi- rect, then copy or even change infor- Virtualization technologies are mation before it arrives at the desti- not secure “out of the box” nation! A critical and often overlooked aspect of migrating to a virtualized • Detect potential threats, how to environment is setting up security properly. Virtualization technologies defend and defeat them, and how to are not secure “out of the box” and VMware® is no exception. The Hack- ing Uncovered: VMware® course focuses on where the vulnerabilities lie establish a solid foundation to build and how to reduce the attack surfaces in a virtualized environment. secure virtual data centers from the ground up. This course goes beyond the typical security protocols administrators use to secure their current environments and dives much deeper into the • Any regular user inside your network actual workings and shortcomings of the VMware® environment. can take full control of your ESX hosts if they know the right exploits. “These guys are like the Darth Vaders of the network world. I'm glad they are on our side since this was a security course. Our instructor • By taking control of your virtual was amazing and by far the best guy we've environment a hacker could disable seen here. This guy is world class.” – Jim B., CIO ALL your VMs at one time. This course was designed and developed from the perspective of how a hacker will get into your VMware® Environment by a Licensed - Penetration Tester and hacking Guru with a long history of vulnerability mation and ensure compliance with audits with: US Dept. of Homeland Security, US Government Agencies HIPPA, SOX, or STIG standards and (NSA, DOD, DOT, TSA, SEC, CIA, and many others), nuclear power plants, law enforcement agencies, fortune 500 companies, universities, and regulations. many foreign governments. “This was some of the best Contact us to Enroll! TekSource Corporate Learning training I've ever had.” 36 Lombard St., Suite 600 William L. Toronto, ON M5C 2X3 info@teksource.ca | (647)827-0488 and other countries, and may not be used without written permission. VMware is a registered trademark of VMware, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners. Global © 2009 VMTraining Solutions is not associated with any product or vendor in this advertisement and/or course. Training
  • 2. On-Site and Hacking Uncovered: Online Classes Available. Call for More Details! VMware® Covers VMware’s® VI 3 and vSphere 4 Products! CVSE1021 - A Five Day, Hands-on Bootcamp 1 Five Day Hands-on Bootcamp F v ay n o Chapter 1 – Primer and Reaffirming our Knowledge • ESX Networking Components • Virtual Ethernet Adapters and How They Work • Virtual Switches and How They Work • Alternate Data Streams, Encrypted Tunnels , Metasploit, Fuzzers • VLANs in VMWare Infrastructure SaintExploit, Core Impact, Wireshark • Layer 2 Security Features & File System Structure • ARP Cache Poisoning, Hash Algorithm • Managing the Virtual Network with “VirtualCenter” • Kernel, Processes, Account and Groups Chapter 8 – Hardening your ESX Server • Linux and UNIX Permissions • Configuring the ESX/ESXi Host • VirtualCenter, Client Components • The Basics of SAN Security, Part I, Increasing Security Concerns • Security Domains, Switch-to-Switch Domain • What is the Cost of a Hack? • Data Integrity and Security • Current Issues and the Evolving Threat • Security Management Part 2 • Fibre Channel Security Management • Common Management Errors • SAN Access, SAN Security Benefits • Controller-based Mapping, WWN Privileged Access • How traffic is routed between Virtual Machines on ESX hosts • Redundancy, Management • Security Design of the VMware Infrastructure 3 Architecture • VMware Infrastructure Architecture and Security Features • Netcat • Executable Wrappers • BPMTK • Virtualized DMZ Networks Deployment Show that you are an expert at securing Chapter 6 – Remote DataStore Security • Mask and Zone SAN Resources • Securing iSCSI, iFCP and FCIP over IP networks Don’t let your company’s network be a victim of fraud or theft! Contact us to Enroll! TekSource Corporate Learning 36 Lombard St., Suite 600 Toronto, ON M5C 2X3 © 2009 VMTraining