Build ESXi virtual infrastructure and monitor abnormal symptoms using security solutions
IT infrastructures are being moved to virtualization and cloud environments. Services are becoming more diverse, and many applications are being operated on the infrastructure. In order to respond to the security of increasingly complex infrastructures, various security devices are being introduced. However, this will be a lecture where you can sufficiently practice and prepare using open tools for things that you cannot experience without purchasing security devices.
Security Control Work + Infrastructure Construction Basics! 🚧
In a VMware ESXi (vSphere Hypervisor) virtual environment Reflecting the introduction and practice of security systems Build networks and infrastructure Ability to monitor security threats The perfect guide!
IT infrastructure services are moving to virtualization and cloud environments. Services are becoming more diverse, and many applications are operating on the infrastructure. In order to respond to the security of increasingly complex infrastructures, various security devices are being introduced. However, this will be a lecture where you can sufficiently practice and prepare using open tools for things that you cannot experience without purchasing security devices.
A thorough understanding of VMware ESXi (vSphere Hypervisor) virtual network configuration
Understanding the implementation of open tool security solutions for each domain in a virtual environment
Understanding IT security control tasks and understanding attack detection and pattern development using Snort
Understanding Anomaly Detection in Splunk's Unified Log System
Through this lecture, you can build a security infrastructure like the above. You will directly configure a miniature version of the infrastructure structure that is being operated in practice in a VMware ESXi virtual environment, and learn how to integrate logs and detect abnormal signs of attacker attack patterns .
Whoshould take this course ?
Corporate Security Jobs Job seeker
Security Officer as a Newcomer The person in charge of the work
Virtualization environment infrastructure For those who want to understand better
Close to the practical environment Anyone who wants to try the practice
The infrastructure security lecture uses a virtual environment to configure the security solution equipment used in practice in software. Since it is an optimized practice that individuals can do compared to the practical environment, if you understand this lecture, you will not have much difficulty even if you immediately start a practical project.
This course is necessary for everyone, from students preparing for employment in security control, breach analysis, and security personnel at large companies/financial institutions, to those who are new to related work . Even if you later switch to cloud services, you will have difficulties if you do not understand the existing virtualization environment infrastructure.
In the infrastructure security lecture, we will create a network structure similar to the actual work as shown below and proceed to the process of detecting attack patterns with an integrated log system . In addition, we will guide you on how to directly respond to attack patterns and block them in the network system.
We will collect and analyze both attack logs and abnormal symptom logs using Splunk, the most widely used integrated log system in practice.
The lecture will be given directly by an instructor who has obtained cloud service expert certifications such as AWS, GCP, and Azure. We will guide you so that you can accurately understand the infrastructure of the on-premise virtualization environment before switching to a cloud environment .
Please make sure to check before taking the class!
This lecture requires you to set up a virtual environment on your practice PC. When setting up a virtual environment, you need a minimum amount of computer resources. If you do not have the minimum amount of capacity, you may not be able to run the virtual environment simultaneously, so you may have to do cross-training.
Minimum capacity for practice: 8GB RAM, 200GB~300GB hard drive
Recommended for smooth practice : 16GB RAM, 500GB hard drive or more
👦🏻 Introducing the knowledge sharer
Security Project - Frontline CTO
- Security Project Online Lecture General Manager - Multi-campus IT external expert instructor (Kubernetes, bug hunting, etc.) - Caseyd Junior External Professional Instructor - Hansae Cyber, Dongil Industrial High School Cyber Guardians external expert instructor - Establishment and development of hacking defense system - Long-term course on “Breach incident analysis and ELK integrated log system construction” - Long-term course on “Data Analysis Utilization” - Long-term course on “malicious code analysis by type” - Author of Perfect Practice in Web Mock Hacking Using Vibox - Online lecture on building and utilizing ELK integrated log system for IT professionals - Windows Application Vulnerability Analysis Online Course - About 30 lectures including “Introduction to Network Packet Analysis and Malware Sample Analysis”
Recommended for these people
Who is this course right for?
Anyone who wants to understand IT security infrastructure
Anyone who wants to understand the security control work system
Those who have chosen a career in IT security
Anyone looking to move to a security position
Need to know before starting?
Understanding Virtual Environment Systems
Understanding the operating system
Understanding Security System Terminology
Hello This is
101,795
Learners
3,153
Reviews
445
Answers
4.7
Rating
67
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.