1. Course Introduction
- Introductions and course logistics
- Course objectives
- Describe the content of this course
- Familiarize yourself with the benefits of the VMware Education Learning Zone
- Identify additional resources
2. NSX and the Software-Defined Data Center
- Describe the software-defined data center
- Understand the differences in security approach between the traditional data center and the software-defined data center
3. Management Plane Components
- Understand the management, control, and data planes
- Describe VMware NSX® Manager™
- Describe the NSX infrastructure and component communications
- Install NSX components for host preparation
- Troubleshoot host preparation problems
- Introduce the NSX central CLI
4. Data Plane Components
- Describe the distributed firewall components and explain how they communicate with each other
- Validate proper functioning of data plane components through the ESXi CLI
- Validate proper functioning of data plane components through the NSX central CLI
5. NSX Edge Firewall
- Describe the NSX Edge firewall
- Explain how the distributed firewall and NSX Edge firewall rules are managed by NSX Manager
- Validate and troubleshoot the NSX Edge firewall through the NSX Edge CLI
6. NSX Distributed Firewall
- Describe the NSX distributed firewall
- Explain how NSX service chaining dynamically responds to changing security conditions
- Explain how the distributed firewall, the filtering module, and traffic redirection modules work together
- Use the ESXi CLI to troubleshoot the distributed firewall
- Use the NSX central CLI to troubleshoot the distributed firewall
7. NSX Service Composer
- Describe the Service Composer
- Describe the Service Composer architecture
- Explain how NSX service chaining dynamically responds to changing security conditions
- Use the Service Composer to create dynamic security policy
8. NSX Identity-Based Firewalling
- Describe the identity-aware firewall
- Configure the NSX identity-based firewall
9. NSX Partner Integration Solutions
- Explain the architecture of Guest Introspection with third-party devices
- Explain how the distributed firewall, the filtering module, and traffic redirection modules work together