SANS SEC549.2 Implementing Zero-Trust in the Cloud

فهرست مطالب کتاب Enterprise Cloud Security Architecture:

Introduction to Cloud Migrations

Drivers for Cloud Migrations

Implementing Zero-Trust Architecture

Using Cloud Services to get to ZT

Lab 2.1: Integrating Auth into Legacy Application

Establishing Perimeters for Application Access

Connecting VPC-Aware and Non-VPC Aware Services

Lab 2.2: Creating a Shared VPC Network

Establishing Perimeters for Data Access

Managing S3 Access At Scale

Lab 2.3: Access Control For Shared Data Sets

The Complete VMware vSphere Guide

فهرست مطالب:

Preface

The Virtual Data Center

The Discovery Process

The Design Factors

vSphere Management Design

vSphere Storage Design

vSphere Network Design

vSphere Compute Design

vSphere Physical Design

Virtual Machine Design

Deployment Workflow and Component Installation

Configuring and Managing vSphere 6.7

Life Cycle Management, Patching, and Upgrading

VM Deployment and Management

VM Resource Management

Availability and Disaster Recovery

Securing and Protecting Your Environment

Analyzing and Optimizing Your Environment

Troubleshooting Your Environment

Building Your Own VMware vSphere Lab

Index

Ultimate VMware NSX for Professionals

فهرست مطالب کتاب Ultimate VMware NSX for Professionals:

Introduction to NSX Datacenter

Deploying NSX Infrastructure

Logical Switching

Logical Routing – NSX Edge Nodes

Logical Routing – NSX Gateways

Logical Routing – VRF and EVPN

Logical Bridging

Security – Micro‑Segmentation

Security – Advanced Threat Prevention

Security – Network Detection and Response

NSX Datacenter Services – 4

NSX Datacenter Services – 5

NSX Multisite Deployment

Monitoring and Managing NSX

VCP-DCV for vSphere 8.x Official Cert Guide

فهرست مطالب:

Introduction

PART I: VSPHERE ARCHITECTURE, INTEGRATION, AND

PART II: VSPHERE INSTALLATION/CONFIGURATION

PART III: VSPHERE MANAGEMENT AND OPTIMIZATION

APPENDIX

Veeam Backup and Replication Operational Guide, Volume 4 (Based on Version 12)

فهرست مطالب کتاب Veeam Backup and Replication Operational Guide, Volume 4:

Foreword

About the Authors

Introduction

Chapter 1: Backup and Backup Copy

Chapter 2: Replication

Chapter 3: Data Restore

Chapter 4: Join us at MVPDays and meet great MVP’s like this in person

Veeam Backup and Replication Operations Guide – Volume 1

فهرست مطالب کتاب Veeam Backup and Replication Operations Guide:

Chapter 1 – Prerequisites

Chapter 2 – Deployment

Chapter 3 – Configuration

Chapter 4 – Backup and Backup Copy

Chapter 5 – Replication

Chapter 6 – Data Restore

Chapter 7 – Join us at MVPDays and meet great MVP’s like this in person

Veeam Backup for Hyper V Operational Guide

فهرست مطالب کتاب Veeam Backup for Hyper V Operational Guide:

Chapter 1 – Cloud Repositories

Chapter 2 – Cloud Backup and Backup Copy

Chapter 3 – Restore to Microsoft Azure

Chapter 5 – SureBackup

Chapter 6 – On-Demand Sandbox

Chapter 7 – Reporting

Chapter 8 – Join us at MVPDays and meet great MVPs like this in person

Virtual Extensible LAN (VXLAN): A Practical Guide to VXLAN Solution

فهرست مطالب:

Chapter 1: Underlay Network – OSPF Operation

Chapter 2: Underlay Network – Comparison of OSPF and IS-IS

Chapter 3: Underlay Network: iBGP in Underlay Network

Chapter 4: Underlay Network: Two-AS eBGP

Chapter 5: eBGP as an Underlay Network Routing Protocol: Multi-AS eBGP

Chapter 6: Layer 2 Multi-Destination Traffic – Anycast-RP with PIM.

Chapter 7: Layer 2 Multi-destination traffic – PIM BiDir.

Chapter 8: BGP EVPN VXLAN Configuration and building blocks.

Chapter 9: BGP EVPN VXLAN Control and Data Plane Operation.

Chapter 10: VXLAN fabric External Connections

Chapter 11: Multihoming with vPC

Chapter 12: Multihoming – vPC and Graceful Insertion and Removal (GIR) operation

Chapter 13: Using vPC Peer Link as an Underlay Backup Pat

Chapter 14: VXLAN Fabric Firewall Implementation

Chapter 15: EVPN ESI Multihoming

Chapter 16: EVPN ESI Multihoming – Fast Convergence and Load Balancing

Chapter 17: EVPN ESI Multihoming – Data Flows and link failures

CHAPTER 18: VXLAN EVPN Multi-Site

Chapter 19: Tenant Routed Multicast in VXLAN Fabric

VMware Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 Study Guide

فهرست مطالب کتاب VMware Certified Professional Data Center Virtualization:

Introduction

Assessment Test

Chapter 1 What’s New in vSphere 6.7

Chapter 2 Configuring and Administering Security in a vSphere Datacenter

Chapter 3 Networking in vSphere

Chapter 4 Storage in vSphere

Chapter 5 Upgrading a vSphere Deployment

Chapter 6 Allocating Resources in a vSphere Datacenter

Chapter 7 Backing Up and Recovering a vSphere Deployment

Chapter 8 Troubleshooting a vSphere Deployment

Chapter 9 Deploying and Customizing ESXi Hosts

Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA

Chapter 11 Administering and Managing vSphere Virtual Machines

Appendix Answers to Review Questions

Index

VMware Cloud Well-Architected Framework for VMware Cloud on AWS

فهرست مطالب کتاب VMware Cloud Well-Architected Framework:

1 Plan Pillar

2 Build Pillar

3 Modernize Pillar

4 Secure Pillar

5 Operate Pillar

VMware NSX Install, Configure, Manage [V4.0] Lab Manual

فهرست مطالب کتاب VMware NSX Install, Configure, Manage [V4.0] Lab Manual:

 Lab 1 – Reviewing the Lab Environment and Topologies

Lab 2 – Reviewing the Configuration of the Predeployed NSX Manager Instance

Lab 3 – (Simulation) Deploying a Three‑Node NSX Management Cluster

Lab 4 – Preparing the NSX Infrastructure

Lab 5 – Configuring Segments

Lab 6 – Deploying and Configuring NSX Edge Nodes

Lab 7 – Configuring the Tier‑1 Gateway

Lab 8 – Creating and Configuring a Tier‑0 Gateway with OSPF

Lab 9 – Configuring the Tier‑0 Gateway with BGP

Lab 10 – Configuring VRF Lite

Lab 11 – Configuring the NSX Distributed Firewall

Lab 12 – Configuring the NSX Gateway Firewall

Lab 13 – Configuring Distributed Intrusion Detection

Lab 14 – (Simulation) Deploying NSX Application Platform

Lab 15 – (Simulation) Configuring Malware Prevention for East‑West Traffic

Lab 16 – (Simulation) Using NSX Network Detection and Response to Detect Threats

Lab 17 – Configuring Network Address Translation

Lab 18 – Configuring NSX Advanced Load Balancer

Lab 19 – Deploying Virtual Private Networks

Lab 20 – Managing Users and Roles