Overview:

VMware vSphere: Install, Configure, Manage is our best-selling course. It features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 6, which includes VMware ESXi™ 6 and VMware vCenter Server™ 6. This course will give you a solid understanding of how to administer a vSphere infrastructure for an organization of any size. 

Note: This course is based on beta software.

Objectives:

  • Describe the software-defined data center
  • Deploy an ESXi host and create virtual machines
  • Describe vCenter Server architecture
  • Deploy a vCenter Server instance or VMware vCenter Server™ Appliance™
  • Use vCenter Server to manage an ESXi host
  • Configure and manage vSphere infrastructure with VMware vSphere® Client™ and VMware vSphere® Web Client
  • Configure virtual networks with vSphere standard switches
  • Use vCenter Server to manage various types of host storage
  • Manage virtual machines, templates, clones, and snapshots
  • Create a vApp
  • Describe and use the content library
  • Migrate virtual machines with VMware vSphere® vMotion®
  • Use VMware vSphere® Storage vMotion® to migrate virtual machine storage
  • Monitor resource usage and manage resource pools
  • Use VMware vRealize™ Operations Manager™ to identify and solve issues through analytics and alerts
  • Manage VMware vSphere® High Availability and VMware vSphere® Fault Tolerance
  • Use VMware vSphere® Replication™ and VMware vSphere® Data Protection™ to replicate virtual machines and perform data recovery
  • Use VMware vSphere® Distributed Resource Scheduler™ clusters to improve host scalability
  • Use vSphere distributed switches to improve network scalability
  • Use VMware vSphere® Update Manager™ to apply patches
  • Perform basic troubleshooting of ESXi hosts, virtual machines, and vCenter Server operations

Intended Audience:

  • System administrators
  • Systems engineers

Prerequisites:

  • System administration experience on Microsoft Windows or Linux operating systems
  • Understanding of concepts presented in the VMware Data Center Virtualization Fundamentals course for VCA-DCV certification

Outline:

1. Course Introduction

  • Introductions and course logistics
  • Course objectives

2. Software-Defined Data Center

  • Install and use vSphere Client
  • Introduce components of the software-defined data center
  • Describe where vSphere fits into the cloud architecture
  • Overview of ESXi

3. Creating Virtual Machines

  • Introduce virtual machines, virtual machine hardware, and virtual machine files
  • Create and work with virtual machines

4. vCenter Server

  • Manage vCenter Server inventory objects and licenses
  • Deploy and configure vCenter Server Appliance
  • Introduce the vCenter Server architecture
  • Install and use vSphere Web Client
  • Explain the benefits of Enhanced vMotion Compatibility

5. Configuring and Managing Virtual Networks

  • Configure virtual switch load-balancing algorithms
  • Describe, create, and manage standard switches
  • Describe and modify standard switch properties
  • Create, configure, and manage vSphere distributed switches, network connections, and port groups

6. Configuring and Managing Virtual Storage

  • Create and manage VMware vSphere® VMFS datastores
  • Introduce storage protocols and storage device names
  • Discuss ESXi with iSCSI, NFS, and Fibre Channel storage
  • Introduce VMware Virtual SAN™

7. Virtual Machine Management

  • Create a vApp
  • Perform vSphere vMotion and vSphere Storage vMotion migrations
  • Use templates and cloning to deploy virtual machines
  • Modify and manage virtual machines
  • Create and manage virtual machine snapshots
  • Introduce the various types of content libraries and how to deploy and use them

8. Resource Management and Monitoring

  • Create and use alarms to report certain conditions or events
  • Describe methods for optimizing CPU and memory usage
  • Introduce virtual CPU and memory concepts
  • Configure and manage resource pools
  • Use vCenter Server performance graphs and alarms to monitor resource usage
  • Introduce vRealize Operations Manager for data center monitoring and management

9. vSphere HA and vSphere Fault Tolerance

  • Introduce vSphere Replication
  • Introduce vSphere Fault Tolerance
  • Configure and manage a vSphere HA cluster
  • Explain the vSphere HA architecture
  • Use vSphere HA advanced parameters
  • Enable vSphere Fault Tolerance on virtual machines
  • Use vSphere Data Protection to back up and restore data

10. Host Scalability

  • Work with affinity and anti-affinity rules
  • Describe the functions of a vSphere DRS cluster
  • Configure and manage a vSphere DRS cluster
  • Use vSphere HA and vSphere DRS together

11. vSphere Update Manager and Host Maintenance

  • Use host profiles to manage ESXi configuration compliance
  • Install vSphere Update Manager and the vSphere Update Manager plug-in
  • Use vSphere Update Manager to manage ESXi patching
  • Create patch baselines
  • Scan and remediate hosts

12. Installing VMware Components

  • Describe vCenter Server hardware, software, and database requirements
  • Describe boot-from-SAN requirements
  • Introduce ESXi installation
  • Introduce vCenter Server deployment options
  • Discuss installation of vCenter Server Appliance and a vCenter Server instance

Certified Cloud Security Professional

Overview:

Prove You’re on the Forefront of Cloud Security

In the ever-changing world of the cloud, you face unique security challenges every day — from new threats to sensitive data, to uneducated internal teams. Take command with the CCSP: the premier cloud security certification.The CCSP is a global credential that represents the highest standard for cloud security expertise. It was co-created by (ISC)² and Cloud Security Alliance — leading stewards for information security and cloud computing security.When you earn this cloud security certification, you prove you have deep knowledge and hands-on experience with cloud security architecture, design, operations and service orchestration. Start earning your CCSP today.


This training seminar provides a comprehensive review of cloud security concepts and industry best practices, covering the 6 domains of the CCSP CBK:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories. This training course will help candidates review and refresh their cloud security knowledge and help

identify areas they need to study for the CCSP exam and features:

  • Official (ISC)² courseware
  • Taught by an international instructor
  • Student handbook
  • Collaboration with classmates
  • Real-world learning activities and scenarios

You Will Learn How To:

  • Identify and explain the five characteristics required to satisfy the NIST definition of cloud computing
  • Differentiate between various as-a-service delivery models and frameworks that are incorporated into the cloud computing reference architecture
  • Explain strategies for protecting data at rest and data in motion
  • Discuss strategies for safeguarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies, and working with authorities during legal investigations
  • Contrast between forensic analysis in corporate data center and cloud computing environments

Requirements:

  • Five years of cumulative, full-time working experience in IT (three of which must be in information security, and one of which must be in one of the six CCSP CBK domains)
  • Those without the required experience can take the exam to become an Associate of (ISC)² while working toward the experience needed for full certification

Course Preparation:

  • You will be asked to read documents before the course that will help with your learning and exam preparation

Course Outline

Architectural Concepts and Designs Requirements

  • Reviewing cloud computing concepts
  • Describing cloud reference architecture
  • Security concepts relevant to cloud computing
  • Design principles of secure cloud computing
  • Identifying trusted cloud services

Cloud Data Security

  • Understanding cloud data lifecycle
  • Designing and implementing cloud data storage architectures
  • Designing and applying data security strategies
  • Understanding and implementing data discovery and classification technologies
  • Designing and implementing relevant jurisdictional data protections for personally identifiable information

Cloud Platform and Infrastructure Security

  • Comprehending cloud infrastructure components
  • Analyzing risks associated to cloud infrastructure
  • Designing and planning security controls
  • Planning disaster recovery and business continuity management

Cloud Application Security

  • Recognizing the need for training and awareness in application security
  • Understanding cloud software assurance and validation
  • Using verified secure software
  • Comprehending the Software Development Life-Cycle (SDLC) process
  • Applying the Secure Software Development Life-Cycle

Operations

  • Supporting the planning process for the data center design
  • Implementing and building physical infrastructure for cloud environment
  • Running physical infrastructure for cloud environment
  • Managing physical infrastructure for cloud environment
  • Building logical infrastructure for cloud environment

Legal and Compliance

  • Legal requirements and unique risks within the cloud environment
  • Privacy issues, including jurisdictional variation
  • The audit process, methodologies, and required adaptions for a cloud environment
  • Implications of cloud to enterprise risk management
  • Outsourcing and cloud contract design

This is a 3-day training, participants will gain a comprehensive understanding of the advanced networking and security functions of FortiGate appliances. With a focus on core feature skills, specific topics include routing, virtual domains, transparent mode, high availability, advanced IPSec VPN, intrusion prevention system, single sign on, certificate operations, data leak prevention, diagnostics and resource utilization. At the end of this course, students complete an interactive in-lab assessment of skills learned. Designed to demonstrate advanced use of FortiGate appliance features, this training is a continuation of the FortiGate Multi-Threat Security System I Course.

Audience: This course is intended for networking professionals involved in the design and implementation of a security infrastructure using FortiGate Unified Threat Management appliances. This advanced-level course is a continuation of the topics discussed in FortiGate Multi-Threat Security System I – Administration, Content Inspection and SSL VPN (Course 201). Content in the 301 course is geared to professionals with a sound knowledge of the concepts involved in the operation of a FortiGate device. It is assumed that students are familiar with the topics presented in the 201 course.


Course Detail: Module 11: Routing. This module introduces students to the logic used behind FortiGate device routing decisions. Students will learn how to read routing table entries, perform routing diagnostics and create routes on a FortiGate device. Module 12: Virtual Networking. This module introduces the concept of working with virtual network resources including VLANs, virtual domains and link aggregation. Module 13: Transparent Mode. This module familiarizes students with operating a FortiGate appliance in transparent mode and discusses aspects to consider in this type of deployment. Module 14: High Availability. This module discusses the functionality of a FortiGate unit operating in HA mode. Module 15: Advanced IPSec VPN. This module covers the advanced methods of VPN deployment (hub and spoke, star, full and partial meshed configurations), PPTP and in depth troubleshooting diagnostics. Module 16: Intrusion Prevention System. This module provides a detailed look at the configuration and operating behavior of the FortiGate appliance’s intrusion prevention system. Module 17: Fortinet Single Sign On (FSSO). In this module, Fortinet Single Sign On communications are explained and students will learn how to configure FSSO to link domain log in credentials to firewall policies in order to restrict access. Module 18: Certificate-Based Operations. This module builds the groundwork for all SSL based inspection that a FortiGate appliance is capable of performing.

Course Detail 1: Module 19: Data Leak Prevention. This module will introduce students to working with the data leak prevention (DLP) feature including configuration, methodology, diagnostics, and debugging. Module 20: Diagnostics. This module describes various basic troubleshooting commands that can be used to diagnose the most common technical issues. It explains how to interpret the output of the debug flow diagnostics, FortiGate session table, as well as CPU and memory diagnostic commands. Module 21: Putting It All Together. In this module, students will be given an opportunity to put their skills to the test. This multi-part interactive lab assesses the student’s ability to work with multiple FortiGate features at once to fulfill a set of customer needs and requirements.

Pre-Requisite Text:
Prerequisites: Previous experience working with FortiGate appliances. Solid knowledge of the web management interface and the FortiGate unit Command Line Interface (CLI). Knowledge of IPSec, VPNs and intrusion detection concepts. Successful completion of the FortiGate Multi-Threat Security System I course is highly recommended.

In this 2-day instructor-led classroom or online class, you will learn basic configuration and administration of the most commonly used features of FortiGate appliances. In interactive labs, you will explore firewall policies, user authentication, basic VPNs, explicit proxy, virus detection, web filtering, application control and more. These administrative fundamentals will provide you with a solid understanding of how to integrate and maintain basic network security.  

Audience: This course is intended for networking professionals involved in the design and implementation of a security infrastructure using FortiGate Unified Threat Management appliances. This advanced-level course is a continuation of the topics discussed in FortiGate Multi-Threat Security System I – Administration, Content Inspection and SSL VPN (Course 201). Content in the 301 course is geared to professionals with a sound knowledge of the concepts involved in the operation of a FortiGate device. It is assumed that students are familiar with the topics presented in the 201 course.

Course Detail: Module 11: Routing. This module introduces students to the logic used behind FortiGate device routing decisions. Students will learn how to read routing table entries, perform routing diagnostics and create routes on a FortiGate device. Module 12: Virtual Networking. This module introduces the concept of working with virtual network resources including VLANs, virtual domains and link aggregation. Module 13: Transparent Mode. This module familiarizes students with operating a FortiGate appliance in transparent mode and discusses aspects to consider in this type of deployment. Module 14: High Availability. This module discusses the functionality of a FortiGate unit operating in HA mode. Module 15: Advanced IPSec VPN. This module covers the advanced methods of VPN deployment (hub and spoke, star, full and partial meshed configurations), PPTP and in depth troubleshooting diagnostics. Module 16: Intrusion Prevention System. This module provides a detailed look at the configuration and operating behavior of the FortiGate appliance’s intrusion prevention system. Module 17: Fortinet Single Sign On (FSSO). In this module, Fortinet Single Sign On communications are explained and students will learn how to configure FSSO to link domain log in credentials to firewall policies in order to restrict access. Module 18: Certificate-Based Operations. This module builds the groundwork for all SSL based inspection that a FortiGate appliance is capable of performing.

Course Detail 1: Module 19: Data Leak Prevention. This module will introduce students to working with the data leak prevention (DLP) feature including configuration, methodology, diagnostics, and debugging. Module 20: Diagnostics. This module describes various basic troubleshooting commands that can be used to diagnose the most common technical issues. It explains how to interpret the output of the debug flow diagnostics, FortiGate session table, as well as CPU and memory diagnostic commands. Module 21: Putting It All Together. In this module, students will be given an opportunity to put their skills to the test. This multi-part interactive lab assesses the student’s ability to work with multiple FortiGate features at once to fulfill a set of customer needs and requirements.

Pre-Requisite Text:
Prerequisites: Previous experience working with FortiGate appliances. Solid knowledge of the web management interface and the FortiGate unit Command Line Interface (CLI). Knowledge of IPSec, VPNs and intrusion detection concepts. Successful completion of the FortiGate Multi-Threat Security System I course is highly recommended.

 

This is a 2-day training, participants learn the basic configuration and administration aspects of the most commonly used features on the FortiGate Unified Threat Management (UTM) Appliance. Through interactive modules, participants explore firewall policies, user authentication, VPNs, virus detection, email filtering, web filtering, application control and more. FortiGate unit administrative fundamentals provide a solid understanding of how to integrate and ensure operational maintenance for optimal performance in the corporate environment.

Audience: This introductory-level course is intended for anyone who is responsible for the day-to-day administration and management of a FortiGate unit. Students must be familiar with the topics presented in this course before attending the FortiGate Multi-Threat Security Systems II - Secured Network Deployment and IPSec VPN course.

Course Detail: Module 1: Introduction to Fortinet Unified Threat Management This module introduces students to the FortiGate unit, comparing and describing the essential. FortiGate features, as compared to other firewall devices. Feature usage and their order of operations are explained and students examine how these can affect system performance and resources. Finally this module will cover configuration backup and restore, factory default settings and establishing connectivity to the FortiGate device GUI. Module 2: Logging and Monitoring. This module familiarizes students with how to search various logs from the FortiGate device GUI and understand how these logs are used. Different methods of logging will be discussed (both on and off the device), as well as getting information from the logs that may not be initially visible. Module 3: Firewall Policies. This module demonstrates setting up the Firewall policies on a FortiGate device and explains. the logic for how a match on a firewall policy is determined. Module 4: Local User Authentication. This module familiarizes students with utilizing Identity based policies. The focus will be on setting up and manipulating traffic based on authentication using local users. Module 5: SSL VPN. In this module students learn how to configure and connect to an SSL VPN. Module 6: IPSec VPN. The students will be shown how to configure an IPSec VPN on the FortiGate device using Interface-based and policy-based modes. Module 7: Antivirus. This section will teach students how to configure and enable traffic scanning for the detection of viruses. Module 8: Email Filtering. This module will introduce students to email inspection and spam detection. Module 9: Web Filtering. This module introduces students to the web filtering functions available on the FortiGate unit.

Course Detail 1: Module 10: Application Control. This module teaches Students the inner workings of Application Control, how to configure it, and how signature triggers are accomplished.

Pre-Requisite Text:
Prerequisites: Introductory-level network security experience. Basic understanding of firewall concepts.