VMware NSX-T 3.0 Fundamentals Part Two (Security) 2020
Go from Zero to Hero with NSX distributed firewalling, identity firewall, and more! Hands-on examples throughout!
What you’ll learn
Distributed Firewall theory & Implementation
How to configure Intrusion Detection (IDS)
How to create dynamic policy using NSX Tags
How to create security zones (PCI/HIPAA, etc)
How to integrate NSX-T with LDAP/AD
Strongly recommend that you have watched Part One of my NSX-T 3.0 Fundamentals course prior
Have NSX-T 3.0+ installed prior to the start of this course (See my Part One course on how to do this) OR leverage VMware Hands-On Labs to follow along
Are you looking for NSX-T Security training? Want to learn what the Distributed Firewall is, and how it works? Most importantly, do you want an instructor who does this stuff on a daily basis, and can break down complex topics into easy-to-understand explanations – using HANDS-ON examples?
My name is Mike, and people know me as the NSX guy. I’ve got years of experience with both Cisco and VMware technologies, including a couple of CCIE certifications, and most importantly, I have struggled through learning this stuff – so I know exactly how to make you an NSX pro! I have taught this same curriculum to many students, and have seen many go on to become the go-to experts on NSX in their companies!
This course is primarily for students of my Part One NSX-T 3.0 Fundamentals course, but anyone can take it. It does assume you have the knowledge taught in Part One, so while not a requirement, you should be comfortable with NSX-T Concepts (overlay networking, T0/T1, Edge architecture, etc).
In Part Two of my NSX-T Fundamentals series, we’ll go through the core NSX-T Security concepts that you need to know, and I’ll walk you through the FULL configuration of things like Distributed Firewall (DFW), Distributed IDS, and Identity Firewall (AD-based firewall, or IDFW). These tools will allow you to be an expert at micro-segmentation in no time! We won’t stop there, though, we’ll also cover things like LDAP/AD integration, RBAC, and URL filtering.
I had so much fun building this course, and it’s my sincere hope that you enjoy it. If you have ANY questions throughout this course, please ask questions – I respond to all questions within 24 hours!
Who this course is for:
- Network, Security, or Virtualization engineers and architects
Created by Mike Molak
Last updated 3/2021
Size: 1.19 GB