Virtualization and Security

Virtualization, the creation of a virtual version of hardware platform, operating system, storage device or network resources is fast becoming the most efficient route to meet increased service level requirements. It is one of the most rapidly changing and widely deployed technologies in most organizations. However, with every new technology there are new unknown potential threats and exploits that must be snipped at the bud.

The security benefits of virtualization like Storage security, Desktop security, better logging capabilities for large infrastructures can easily become the security breaches in security if not properly planned and understood. In this course we will teach the virtualization security fundamentals with an in-depth treatment of today's most pressing virtualization security concerns: known attacks and threats, theoretical methods for a security breach.

Who should attend?

  • Business decision makers
  • IT Managers
  • Network administrators
  • System Administrators
  • Virtualization solution providers
  • Security Professionals

Course Contents

  • Module 1: Introduction to Virtualization
  • Module 2: Types of Virtualization
  • Module 3: Server Virtualization
  • Module 4: Desktop Virtualization
  • Module 5: Introduction to Security Threat
  • Module 6: Types of Attacks
  • Module 7: Hypervisor Security
    • Module 7.1: Secure the Hardware
    • Module 7.2: Secure the Management Appliance
    • Module 7.3: Secure the Hypervisor
    • Module 7.4: Secure the Management Interfaces
    • Module 7.5: Secure the Virtual Machine
  • Module 8: Guest OS Security
  • Module 9: Virtualized Infrastructure Security
  • Module 10: Desktop Virtualization Security
  • Module 11: Initiation
  • Module 13: Planning and Design
  • Module 14: Implementation
  • Module 15: Operations and Maintenance
  • Module 16: Disposition
  • Module 17: Storage Security Issues
  • Module 18: Storage Security
    • Module 18.1: Data in Motion
    • Module 18.2: Data at Rest
  • Module 19: Types of Clusters
  • Module 20: Security Concerns
    • Module 20.1: Isolation
    • Module 20.2: Cluster Protocols
    • Module 20.3: Migration Failures
    • Module 20.4: Virtual Machine Clusters
  • Module 21: Virtualization Host with pNIC

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content