VMware NSX-T Data Center for Intrinsic Security [V3.2]

WGAC-VMW-NSXTIS32

Vmware Training Courses Certification

Schedule

See all training events for this courseSee all CoursesProfessional Services & Support
Virtual Classroom
Open
Vmware

VMware NSX-T Data Center for Intrinsic Security [V3.2]

WGAC-VMW-NSXTIS32

Virtual ILT

Language: German

CET UTC+01:00

Start date:08 May 2023 09:00
End date:12 May 2023 17:00
Duration:5 days

$ 3,750

Virtual Classroom
Open
Vmware

VMware NSX-T Data Center for Intrinsic Security [V3.2]

WGAC-VMW-NSXTIS32

Virtual ILT

Language: English

CET UTC+01:00

Start date:12 Jun 2023 09:00
End date:16 Jun 2023 17:00
Duration:5 days

Pricing on application

Description

Course Introduction
  • Introductions and course logistics
  • Course objectives
Security Basics
  • Define information-security-related concepts
  • Explain the different types of firewalls and their use cases
  • Describe the operation of IDS/IPS
  • Differentiate between Malware Prevention approaches
VMware Intrinsic Security
  • Define the VMware intrinsic security strategy
  • Describe the VMware intrinsic security portfolio
  • Explain how NSX-T Data Center aligns with the intrinsic security strategy
Implementing Zero-Trust Security
  • Define Zero-Trust Security
  • Describe the five pillars of a Zero-Trust Architecture
  • Define NSX segmentation and its use cases
  • Describe the steps needed to enforce Zero-Trust with NSX segmentation
User and Role Management
  • Integrate NSX-T Data Center and VMware Identity Manager™
  • Integrate NSX-T Data Center and LDAP
  • Describe the native users and roles in NSX-T Data Center
  • Create and assign custom user roles
Distributed Firewall
  • Configure Distributed Firewall rules and policies
  • Describe the NSX Distributed Firewall architecture
  • Troubleshoot common problems related to NSX Distributed Firewall
  • Configure time-based policies
  • Configure Identity Firewall rules
Gateway Security
  • Configure Gateway Firewall rules and policies
  • Describe the architecture of the Gateway Firewall
  • Identify and troubleshoot common Gateway Firewall issues
  • Configure TLS Inspection to decrypt traffic for both internal and external services
  • Configure URL filtering and identify common configuration issues
Operating Internal Firewalls
  • Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls
  • Explain security best practices related to grouping, tagging, and rule configuration
Network Introspection
  • Explain network introspection
  • Describe the architecture and workflows of north-south and east-west service insertion
  • Troubleshoot north-south and east-west service insertion
Endpoint Protection
  • Explain endpoint protection
  • Describe the architecture and workflows of endpoint protection
  • Troubleshoot endpoint protection
Intrusion Detection and Prevention
  • Describe the MITRE ATT&CK framework
  • Explain the different phases of a cyber attack
  • Describe how NSX security solutions can be used to protect against cyber attacks
  • Configure and troubleshoot Distributed IDS/IPS
  • Configure and troubleshoot North-South IDS/IPS
NSX Application Platform
  • Describe NSX Application Platform and its use cases
  • Identify the topologies supported for the deployment of NSX Application Platform
  • Deploy NSX Application Platform
  • Explain the NSX Application Platform architecture and services
  • Validate the NSX Application Platform deployment and troubleshoot common issues
NSX Malware Prevention
  • Identify use cases for NSX Malware Prevention
  • Identify the components in the NSX Malware Prevention architecture
  • Describe the NSX Malware Prevention packet flows for known and unknown files
  • Configure NSX Malware Prevention for east-west and north-south traffic
NSX Intelligence and NSX Network Detection and Response
  • Describe NSX Intelligence and its use cases
  • Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities
  • Describe NSX Network Detection and Response and its use cases
  • Explain the architecture of NSX Network Detection and Response in NSX-T Data Center
  • Describe the visualization capabilities of NSX Network Detection and Response

You should also have the following understanding or knowledge:

  • Good understanding of TCP/IP services and protocols
  • Knowledge and working experience of network security, including:
  • L2 through L7 firewalling
  • Intrusion detection and prevention systems
  • Malware prevention systems
  • Knowledge of and working experience with VMware vSphere® environments and KVM-based environments

The VMware Certified Technical Associate - Network Virtualization is recommended.

By the end of the course, you should be able to meet the following objectives:

  • Define information-security-related concepts
  • Explain the different types of firewalls and their use cases
  • Describe the operation of intrusion detection and intrusion prevention systems
  • Differentiate between Malware Prevention approaches
  • Describe the VMware intrinsic security portfolio
  • Implement Zero-Trust Security using VMware NSX® segmentation
  • Configure user and role management
  • Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies
  • Configure and troubleshoot Gateway Security
  • Use VMware vRealize® Log Insight™ for NSX™ and VMware vRealize® Network Insight™ to operate NSX firewalls
  • Explain the security best practices related to grouping, tagging, and rule configuration
  • Describe north-south and east-west service insertion
  • Describe endpoint protection
  • Configure and troubleshoot IDS/IPS
  • Deploy NSX Application Platform
  • Configure and troubleshoot NSX Malware Prevention
  • Describe the capabilities of NSX Intelligence and NSX Network Detection and Response

  • Course Introduction
  • Security Basics
  • VMware Intrinsic Security
  • Implementing Zero-Trust Security
  • User and Role Management
  • Distributed Firewall
  • Gateway Security
  • Operating Internal Firewalls
  • Network Introspection
  • Endpoint Protection
  • Intrusion Detection and Prevention
  • NSX Application Platform
  • NSX Malware Prevention
  • NSX Intelligence and NSX Network Detection and Response

You should also have the following understanding or knowledge:

  • Good understanding of TCP/IP services and protocols
  • Knowledge and working experience of network security, including:
  • L2 through L7 firewalling
  • Intrusion detection and prevention systems
  • Malware prevention systems
  • Knowledge of and working experience with VMware vSphere® environments and KVM-based environments

The VMware Certified Technical Associate - Network Virtualization is recommended.