VMware NSX-T Data Center for Intrinsic Security [V3.1]

WGAC-VMW-NSXTIS31

Vmware Training Courses Certification

Schedule

See all CoursesProfessional Services & Support

Description

This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-TTM Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including distributed and gateway firewall, Intrusion Detection and Prevention (IDS/IPS), VMware NSX® Intelligence™, and Network Detection and Response (NDR).

In addition, you are presented with common configuration issues and given a methodology to resolve them.

You should also have the following understanding or knowledge:

  • Good understanding of TCP/IP services and protocols
  • Knowledge and working experience of network security, including:
    • L2-L7 Firewalling
    • Intrusion Detection and Prevention Systems
  • Knowledge and working experience of VMware vSphere® environments and KVM-based environments

The VMware Certified Technical Associate - Network Virtualization is recommended.

By the end of the course, you should be able to meet the following objectives:

  • Define information security related concepts
  • Explain different types of firewalls and their use cases
  • Describe the operation of Intrusion Detection and Intrusion Prevention Systems
  • Describe the VMware intrinsic security portfolio
  • Implement Zero-Trust Security using VMware NSX® segmentation
  • Configure User and Role Management
  • Configure and troubleshoot Distributed Firewall, identity firewall, and time-based policies
  • Configure and troubleshoot Gateway Security
  • Use VMware vRealize® Log Insight™, VMware vRealize® Network Insight™, and NSX Intelligence to operate NSX firewalls and generate security recommendations
  • Explain security best practices related to grouping, tagging, and rule configuration
  • Describe North-South and East-West service insertion
  • Describe Guest Introspection
  • Configure and troubleshoot Distributed IDS/IPS
  • Describe the capabilities of Network Detection and Response

Course Introduction
  • Introductions and course logistics
  • Course objectives
Security Basics
  • Define information security related concepts
  • Explain different types of firewalls and their use cases
  • Describe the operation of Intrusion Detection and Intrusion Prevention Systems
VMware Intrinsic Security
  • Define VMware intrinsic security strategy
  • Describe VMware intrinsic security portfolio
  • Explain how NSX-T Data Center aligns in the intrinsic security strategy
Implementing Zero-Trust Security
  • Define Zero-Trust Security
  • Describe the five pillars of a Zero-Trust Architecture
  • Define NSX segmentation and its use cases
  • Describe the steps needed to enforce Zero-Trust with NSX segmentation
User and Role Management
  • Integrate NSX-T Data Center and VMware Identity Manager™
  • Integrate NSX-T Data Center and LDAP
  • Describe the native users and roles in NSX-T Data Center
  • Create and assign custom user roles
Distributed Firewall
  • Configure Distributed Firewall rules and policies
  • Describe the Distributed Firewall architecture
  • Troubleshoot common problems related to Distributed Firewall
  • Configure time-based policies
  • Configure identity firewall rules
Gateway Security
  • Configure gateway firewall rules and policies
  • Describe the architecture of the gateway firewall
  • Identify and troubleshoot common gateway firewall issues
  • Configure URL analysis and identify common configuration issues
Operating Internal Firewalls
  • Use vRealize Log Insight, vRealize Network Insight, and NSX Intelligence to operate NSX firewalls
  • Explain NSX Intelligence visualization and recommendation capabilities
  • Explain security best practices related to grouping, tagging, and rule configuration
Network Introspection
  • Explain network introspection
  • Describe the architecture and workflows of North-South and East-West service insertion
  • Troubleshoot North-South and East-West service insertion
Guest Introspection
  • Explain Guest Introspection
  • Describe the architecture and workflows of endpoint protection
  • Troubleshoot endpoint protection
Advanced Threat Prevention
  • Describe the MITRE ATT&CK Framework
  • Explain the different phases of a cyber attack
  • Describe how NSX security solutions can be used to protect against cyber attacks
  • Configure and troubleshoot Distributed IDS/IPS
  • Describe the capabilities of Network Detection and Response

You should also have the following understanding or knowledge:

  • Good understanding of TCP/IP services and protocols
  • Knowledge and working experience of network security, including:
    • L2-L7 Firewalling
    • Intrusion Detection and Prevention Systems
  • Knowledge and working experience of VMware vSphere® environments and KVM-based environments

The VMware Certified Technical Associate - Network Virtualization is recommended.