
English | Size: 472.62 MB
Genre: eLearning
One of today’s most rapidly evolving and widely deployed technologies is server virtualization. Many organizations are already realizing the cost savings from implementing virtualized servers, and systems administrators love the ease of deployment and management for virtualized systems. There are even security benefits of virtualization – easier business continuity and disaster recovery, single points of control over multiple systems, role-based access, and additional auditing and logging capabilities for large infrastructures.
Server virtualization vulnerabilities
With these benefits comes a dark side, however. Virtualization technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. In addition, there are a vast number of configuration options that security and system administrators need to understand, with an added layer of complexity that has to be managed by operations teams. Virtualization technologies also connect to network infrastructure and storage networks and require careful planning with regard to access controls, user permissions, and traditional security controls.
In addition, many organizations are evolving virtualized infrastructure into private clouds – internal shared services running on virtualized infrastructure. Security architecture, policies, and processes will need to adapt to work within a cloud infrastructure, as well, and there are many changes that security and operations teams will need to accommodate to ensure assets are protected.
Virtualization and private cloud security architecture and design
The class starts out with two days of architecture and security design for both virtualization and private cloud infrastructure. The entire gamut of components will be covered ranging from hypervisor platforms to virtual networking, storage security to locking down the individual virtual machine files. We’ll describe how to secure the management interfaces and servers, delve into Virtual Desktop Infrastructure (VDI), and go in-depth on what to consider when building a private cloud from existing virtualization architecture. Finally, we’ll look at integrating virtual firewalls and intrusion detection systems into the new architecture for access control and network monitoring.
Virtualization infrastructure, policy, and auditing
The next two days we’ll go into detail on offense and defense – how can we assess virtualized environment using scanning and pen testing tools and techniques, and how do things change when we move to a cloud model? We’ll cover a variety of scanners and vulnerability management tools and practices, and then take a hard look at virtualization vulnerabilities, exploits, and toolkits for pen testing that we can put to use in class.
Once we cover the offense, we’ll take the opposite approach and go into detail on performing intrusion detection and logging within the virtual environment, as well as covering anti-malware advances and changes within virtual infrastructure. We’ll wrap up the session with coverage of incident handling within virtual and cloud environments, as well as adapting forensics processes and tools to ensure we can maintain chain-of-custody and perform detailed analysis of virtualized assets.
Vulnerability management, pen testing, and intrusion detection
During day 5, we will help you adapt your existing security policies and practices to the new virtualized or cloud-based infrastructure. We’ll show you how to design a foundational risk assessment program and then build on this with policies, governance, and compliance considerations within your environment. We’ll cover auditing and assessment of your virtualized assets, with a session on scripting that will help you put this into practice right away. Then we’ll go in-depth into data security within a private cloud environment, discussing encryption and data lifecycle management techniques that will help you keep up with data that is much more mobile than ever before. Identity and Access Management (IAM) within a virtualized/cloud environment will be touched on, and we’ll wrap up with a thorough session on disaster recovery and business continuity planning that leverages and benefits from virtualization and cloud-based technology.
On day 6, we’ll cover the top virtualization configuration and hardening guides from DISA, CIS, Microsoft, and VMware, and talk about the most important and critical things to take away from these to implement. We culminate with data security and encryption, and Identity and Access Management (IAM) and Disaster Recovery (DR) and Business Continuity Planning (BCP).


https://nitroflare.com/view/706C4F62FCE09A8/SANS-SEC-579-2016.part1.rar
https://nitroflare.com/view/65353C33B016907/SANS-SEC-579-2016.part2.rar
https://nitroflare.com/view/9FBD4A30A5D2DEA/SANS-SEC-579-2016.part3.rar

https://rapidgator.net/file/8a9945acc6d6a57dd1a8b45ea60aa790/SANS-SEC-579-2016.part1.rar.html
https://rapidgator.net/file/83c11a402090ababe6b779c6a82f7922/SANS-SEC-579-2016.part2.rar.html
https://rapidgator.net/file/b8ccfe87813c8ce51712373ab3615b2b/SANS-SEC-579-2016.part3.rar.html
If any links die or problem unrar, send request to
https://forms.gle/fiF7GGUsfsJsXbhD7
Leave a Reply