|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Sreejith KeeriyattilPublisher: APress Imprint: APress Edition: 1st ed. Weight: 0.454kg ISBN: 9781484254301ISBN 10: 1484254309 Pages: 183 Publication Date: 30 November 2019 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsChapter 1: Network Defense Architecture Chapter Goal: Give the readers an understanding of the current security firewall architecture and why it is not able to meet new threats.No of pages: 20 Sub -Topics1. Why we need firewall rules.2. Different firewall types.3. Perimeter firewall Architecture.4. Perimeter Firewall shortcomings.5. How vulnerabilities in security architecture can be misused. Chapter 2: Micro-segmentation and Zero Trust Chapter Goal: Teach the readers the on what new features will VMware NSX will bring towards security and how it solves the current issues.No of pages: 20 Sub - Topics 1. Network virtualization changes everything.2. VMware NSX and security features.3. Protecting East -West traffic with Micro segmentation. Chapter 3: Implementing VMware Micro-segmentation Chapter Goal: Learn about implementing VMware NSX with micro segmentationNo of pages: 30 Sub - Topics: 1. Pre requisites for implementing Micro segmentation2. Different methods for analyzing East-West traffic3. Micro segmentation planning with VMware Network insight4. Implementing VMware distributed firewall.5. Creating Virtual Perimeter firewall in VMware NSX Chapter 4: Automating Security Policies with NSX Chapter Goal: Teach readers different options with VMware NSX to automate the security rules and policy creation.No of pages: 20 Sub - Topics: 1. Working with Service composer2. NSX REST API for automating firewall rules 3. Quarantining infected machines with Security policies Chapter 5: Monitoring Firewall logs Chapter Goal: Teach readers how to monitor firewall logs using VMware Log InsightNo of pages: 20 Sub - Topics: 1. Implementing VMware Log insight.2. Adding VMware NSX logs to Log insight.3. Filtering and tagging NSX Firewall logs.4. Analyzing security threats and flows deeply with Log insight. Chapter 6: Integrating Third party IPS/IDS Chapter Goal: Readers will learn how to integrate third party IDS/IPS tools to VMware NSXNo of pages: 15 Sub - Topics: 1. Integrating Trend Micro with VMware NSX Chapter 7: Birds Eye View of Final Security Architecture Chapter Goal: Giving reader an overall understanding of what we did till now and how the new architecture solves the previous issues.No of pages: 25 Sub - Topics: 1. Packet flow with VMware NSX Micro segmentation2. Thwarting different Attack scenarios. Chapter 8: Further Improvements with VMware Air Watch Chapter Goal: Readers will learn how VMware Air watch can further improve the architecture.No of pages: 20 Sub - Topics: 1. VMware Air watch and security2. VMware Air watch with NSX -advantages3. ConclusionReviewsAuthor InformationSreejith Keeriyattil is a VMware certified vExpert and a VMWare NSX certified professional with more than 10 years of experience with VMware technologies. He specializes in network/storage in the cloud and data center, and is an expert in implementing software-defined networks with VMware NSX. Sreejith is presently working with Ericsson, India as Senior Solutions Integrator, where he overlooks the design, configuration, and deployment of the OpenStack-based cloud. He also documents his experience with the VMware stack through his blog, stackguy.com. Tab Content 6Author Website:Countries AvailableAll regions |