LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Security & Hacking » SANS SEC579: Virtualization and Private Cloud Security PDF

SANS SEC579: Virtualization and Private Cloud Security PDF

12/11/2019 Learning for Life Leave a Comment


SANS SEC579: Virtualization and Private Cloud Security PDF
English | Size: 472.62 MB
Genre: eLearning

One of today’s most rapidly evolving and widely deployed technologies is server virtualization. Many organizations are already realizing the cost savings from implementing virtualized servers, and systems administrators love the ease of deployment and management for virtualized systems. There are even security benefits of virtualization – easier business continuity and disaster recovery, single points of control over multiple systems, role-based access, and additional auditing and logging capabilities for large infrastructures.

Server virtualization vulnerabilities

With these benefits comes a dark side, however. Virtualization technology is the focus of many new potential threats and exploits and presents new vulnerabilities that must be managed. In addition, there are a vast number of configuration options that security and system administrators need to understand, with an added layer of complexity that has to be managed by operations teams. Virtualization technologies also connect to network infrastructure and storage networks and require careful planning with regard to access controls, user permissions, and traditional security controls.

In addition, many organizations are evolving virtualized infrastructure into private clouds – internal shared services running on virtualized infrastructure. Security architecture, policies, and processes will need to adapt to work within a cloud infrastructure, as well, and there are many changes that security and operations teams will need to accommodate to ensure assets are protected.

Virtualization and private cloud security architecture and design

The class starts out with two days of architecture and security design for both virtualization and private cloud infrastructure. The entire gamut of components will be covered ranging from hypervisor platforms to virtual networking, storage security to locking down the individual virtual machine files. We’ll describe how to secure the management interfaces and servers, delve into Virtual Desktop Infrastructure (VDI), and go in-depth on what to consider when building a private cloud from existing virtualization architecture. Finally, we’ll look at integrating virtual firewalls and intrusion detection systems into the new architecture for access control and network monitoring.

Virtualization infrastructure, policy, and auditing

The next two days we’ll go into detail on offense and defense – how can we assess virtualized environment using scanning and pen testing tools and techniques, and how do things change when we move to a cloud model? We’ll cover a variety of scanners and vulnerability management tools and practices, and then take a hard look at virtualization vulnerabilities, exploits, and toolkits for pen testing that we can put to use in class.

Once we cover the offense, we’ll take the opposite approach and go into detail on performing intrusion detection and logging within the virtual environment, as well as covering anti-malware advances and changes within virtual infrastructure. We’ll wrap up the session with coverage of incident handling within virtual and cloud environments, as well as adapting forensics processes and tools to ensure we can maintain chain-of-custody and perform detailed analysis of virtualized assets.

Vulnerability management, pen testing, and intrusion detection

During day 5, we will help you adapt your existing security policies and practices to the new virtualized or cloud-based infrastructure. We’ll show you how to design a foundational risk assessment program and then build on this with policies, governance, and compliance considerations within your environment. We’ll cover auditing and assessment of your virtualized assets, with a session on scripting that will help you put this into practice right away. Then we’ll go in-depth into data security within a private cloud environment, discussing encryption and data lifecycle management techniques that will help you keep up with data that is much more mobile than ever before. Identity and Access Management (IAM) within a virtualized/cloud environment will be touched on, and we’ll wrap up with a thorough session on disaster recovery and business continuity planning that leverages and benefits from virtualization and cloud-based technology.

On day 6, we’ll cover the top virtualization configuration and hardening guides from DISA, CIS, Microsoft, and VMware, and talk about the most important and critical things to take away from these to implement. We culminate with data security and encryption, and Identity and Access Management (IAM) and Disaster Recovery (DR) and Business Continuity Planning (BCP).

https://nitroflare.com/view/706C4F62FCE09A8/SANS-SEC-579-2016.part1.rar
https://nitroflare.com/view/65353C33B016907/SANS-SEC-579-2016.part2.rar
https://nitroflare.com/view/9FBD4A30A5D2DEA/SANS-SEC-579-2016.part3.rar

https://rapidgator.net/file/8a9945acc6d6a57dd1a8b45ea60aa790/SANS-SEC-579-2016.part1.rar.html
https://rapidgator.net/file/83c11a402090ababe6b779c6a82f7922/SANS-SEC-579-2016.part2.rar.html
https://rapidgator.net/file/b8ccfe87813c8ce51712373ab3615b2b/SANS-SEC-579-2016.part3.rar.html

If any links die or problem unrar, send request to
https://forms.gle/fiF7GGUsfsJsXbhD7

Security & Hacking, OS & Server Cloud Security, Sans, SANS SEC579, SEC579

← [Update Links] SANS SEC599: Defeating Advanced Adversaries – Purple Team Tactics & Kill Chain Defenses PDF SANS MGT514: Security Strategic Planning, Policy, and Leadership PDF →

About Learning for Life

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • TOTAL: CompTIA Network+ (N10-009) + Practice Exam | Udemy
  • Coloso – Basics of Key Visual Design with Composition & Typography
  • BBC – Seven Wonders of the Industrial World (2003) Part 4: The Sewer King
  • Udemy – Modern JavaScript Projects – A Practical Guide
  • Grand Scheme – Satan Wants You (2023)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in