Course Details
Course Outline
1 - Course Introduction
Introductions and course logisticsCourse objectives
2 - Security Basics
Define information security related conceptsExplain different types of firewalls and their use casesDescribe the operation of Intrusion Detection and Intrusion Prevention Systems
3 - VMware Intrinsic Security
Define VMware intrinsic security strategyDescribe VMware intrinsic security portfolioExplain how NSX-T Data Center aligns in the intrinsic security strategy
4 - Implementing Zero-Trust Security
Define Zero-Trust SecurityDescribe the five pillars of a Zero-Trust ArchitectureDefine NSX segmentation and its use casesDescribe the steps needed to enforce Zero-Trust with NSX segmentation
5 - User and Role Management
Integrate NSX-T Data Center and VMware Identity Manager™Integrate NSX-T Data Center and LDAPDescribe the native users and roles in NSX-T Data CenterCreate and assign custom user roles
6 - Distributed Firewall
Configure Distributed Firewall rules and policiesDescribe the Distributed Firewall architectureTroubleshoot common problems related to Distributed FirewallConfigure time-based policiesConfigure Identity Firewall rules
7 - Gateway Security
Configure gateway firewall rules and policiesDescribe the architecture of the gateway firewallIdentify and troubleshoot common gateway firewall issuesConfigure URL analysis and identify common configuration issues
8 - Operating Internal Firewalls
Use vRealize Log Insight, vRealize Network Insight, and NSX Intelligence to operate NSX firewallsExplain NSX Intelligence visualization and recommendation capabilitiesExplain security best practices related to grouping, tagging, and rule configuration
9 - Network Introspection
Explain network introspectionDescribe the architecture and workflows of North-South and East-West service insertionTroubleshoot North-South and East-West service insertion
10 - Endpoint Protection
Explain Endpoint ProtectionDescribe the architecture and workflows of endpoint protectionTroubleshoot endpoint protection
11 - Advanced Threat Prevention
Describe the MITRE ATT&CK FrameworkExplain the different phases of a cyber attackDescribe how NSX security solutions can be used to protect against cyber attacksConfigure and troubleshoot Distributed IDS/IPSDescribe the capabilities of Network Detection and Response
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
Experienced security administrators
Other Prerequisites
You should also have the following understanding or knowledge:
Good understanding of TCP/IP services and protocols
Knowledge and working experience of network security, including:
L2-L7 Firewalling
Intrusion Detection and Prevention Systems
Knowledge and working experience of VMware vSphere® environments and KVM-based environments