~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/01. Introduction.mp42.55MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/02. Differentiate Available Authentication Methods with VMware vCenter.mp48.74MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/03. Adding an ESXi Host to a Directory Service.mp46.6MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/04. Understanding vSphere Identity Federation.mp410.3MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/05. ConfigureManage Active Directory Authentication.mp43.31MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/06. Understanding vSphere Single Sign-on (SSO).mp44.86MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/07. EnableDisable Single Sign-on (SSO) Users.mp411.48MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/08. Logging in to vSphere with Windows Session Credentials.mp45.85MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/09. Configuring Single Sign-on (SSO) Policies.mp44.8MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/10. Enabling vCenter Enhanced Linked Mode.mp44.57MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/11. What This Module Covered.mp44.03MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/01. Introduction.mp44.19MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/02. Compare and Contrast Default SystemSample Roles.mp414.17MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/03. Determine How Permissions are Applied and Inherited in vCe.mp413.57MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/04. View and Sort User and Group Lists.mp410.24MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/05. CreateCloneEdit vCenter Server Roles.mp49.15MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/06. AddModifyRemove Permissions for Users and Groups on vCente.mp45.17MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/07. Apply a Role to a UserGroup and to an Object or Group of O.mp411.95MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/08. Compare and Contrast Propagated and Explicit Permission As.mp411.63MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/09. Determine the Appropriate Set of Privileges for Common Tas.mp410.94MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/10. What This Module Covered.mp42.65MB
~Get Your Files Here !/07. Securing ESXi Hosts/01. Introduction.mp42.99MB
~Get Your Files Here !/07. Securing ESXi Hosts/02. Control Access to Hosts.mp412.6MB
~Get Your Files Here !/07. Securing ESXi Hosts/03. EnableConfigureDisable Services in the ESXi Firewall.mp412.57MB
~Get Your Files Here !/07. Securing ESXi Hosts/04. Configure a Custom ESXi Firewall Rule.mp411.02MB
~Get Your Files Here !/07. Securing ESXi Hosts/05. Enable Lockdown Mode.mp49.91MB
~Get Your Files Here !/07. Securing ESXi Hosts/06. Securing SSH and ESXi Shell.mp416.21MB
~Get Your Files Here !/07. Securing ESXi Hosts/07. Password Security and Account Lockout.mp411.8MB
~Get Your Files Here !/07. Securing ESXi Hosts/08. Understanding Secure Boot for ESXi.mp48.83MB
~Get Your Files Here !/07. Securing ESXi Hosts/09. Securing ESXi with Trusted Platform Module (TPM).mp46.24MB
~Get Your Files Here !/07. Securing ESXi Hosts/10. Understanding vSphere Trust Authority.mp47.77MB
~Get Your Files Here !/07. Securing ESXi Hosts/11. What This Module Covered.mp43.06MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp43.38MB
~Get Your Files Here !/10. Securing vSphere with Encryption/1. Introduction.mp42.2MB
~Get Your Files Here !/10. Securing vSphere with Encryption/2. Understanding vSphere Encryption.mp45.98MB
~Get Your Files Here !/10. Securing vSphere with Encryption/3. Understanding Key Providers.mp47.9MB
~Get Your Files Here !/10. Securing vSphere with Encryption/4. Configuring vSphere Native Key Provider.mp47.79MB
~Get Your Files Here !/10. Securing vSphere with Encryption/5. Encrypting Virtual Machines.mp412.48MB
~Get Your Files Here !/10. Securing vSphere with Encryption/6. Encrypting Storage.mp47.05MB
~Get Your Files Here !/10. Securing vSphere with Encryption/7. Encrypting vMotion.mp47.52MB
~Get Your Files Here !/10. Securing vSphere with Encryption/8. What This Module Covered.mp42.39MB
~Get Your Files Here !/11. Customizing Host Profile Settings/1. Introduction.mp43.57MB
~Get Your Files Here !/11. Customizing Host Profile Settings/2. Understanding Host Profiles.mp46.82MB
~Get Your Files Here !/11. Customizing Host Profile Settings/3. CreateEditRemove a Host Profile from an ESXi Host.mp44.6MB
~Get Your Files Here !/11. Customizing Host Profile Settings/4. Attach and Apply a Host Profile to ESXi Hosts in a Cluster.mp44.89MB
~Get Your Files Here !/11. Customizing Host Profile Settings/5. Perform Compliance Scanning and Remediation of ESXi Hosts and Clusters.mp411.47MB
~Get Your Files Here !/11. Customizing Host Profile Settings/6. Customizing Host Profiles.mp45.65MB
~Get Your Files Here !/11. Customizing Host Profile Settings/7. Scheduling Compliance Checks.mp42.99MB
~Get Your Files Here !/11. Customizing Host Profile Settings/8. Import and Export a Host Profile.mp42.82MB
~Get Your Files Here !/11. Customizing Host Profile Settings/9. What This Module Covered.mp43.72MB
~Get Your Files Here !/12. Next Steps/1. Next Steps.mp44.58MB
~Get Your Files Here !/2. Introduction/1. Introduction.mp46.09MB
~Get Your Files Here !/2. Introduction/2. Pluralsights Learning Path for vSphere 8.mp46.55MB
~Get Your Files Here !/2. Introduction/3. What This Course Covers.mp45.02MB
~Get Your Files Here !/3. Best Practices for vSphere Security/1. Introduction.mp43.95MB
~Get Your Files Here !/3. Best Practices for vSphere Security/2. What Are Best Practices.mp46.24MB
~Get Your Files Here !/3. Best Practices for vSphere Security/3. Using the vSphere Security Configuration Guide (SCG).mp421.22MB
~Get Your Files Here !/3. Best Practices for vSphere Security/4. Analyzing vSphere for Best Practices.mp440.47MB
~Get Your Files Here !/3. Best Practices for vSphere Security/5. What This Module Covered.mp42.42MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/1. Introduction.mp43.46MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/2. Why Do You Need Security Certificates.mp44.32MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/3. Understanding the VMware Certificate Authority (VMCA).mp47.25MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/4. How to Install the VMCA Root Certificate in Your Browser.mp421.28MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/5. Understanding Hybrid Mode.mp45.3MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/6. Replacing Self-signed Certificates with CA-signed Certificates.mp46.37MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/7. What This Module Covered.mp42.88MB
~Get Your Files Here !/8. Securing vCenter Server/1. Introduction.mp43.27MB
~Get Your Files Here !/8. Securing vCenter Server/2. Controlling Access to vCenter.mp48.91MB
~Get Your Files Here !/8. Securing vCenter Server/3. Limiting Network Access.mp414.78MB
~Get Your Files Here !/8. Securing vCenter Server/4. vCenter Password Lockout.mp45.94MB
~Get Your Files Here !/8. Securing vCenter Server/5. Using vCenter Server Profiles.mp46.21MB
~Get Your Files Here !/8. Securing vCenter Server/6. Controlling MOB Access.mp410.71MB
~Get Your Files Here !/8. Securing vCenter Server/7. Control Datastore Browser Access.mp413.54MB
~Get Your Files Here !/8. Securing vCenter Server/8. What This Module Covered.mp44.23MB
~Get Your Files Here !/9. Securing Virtual Machines/1. Introduction.mp42.66MB
~Get Your Files Here !/9. Securing Virtual Machines/2. Controlling Access to Virtual Machines.mp412.73MB
~Get Your Files Here !/9. Securing Virtual Machines/3. Control VMware Tools Installation.mp417.25MB
~Get Your Files Here !/9. Securing Virtual Machines/4. Control VM Data Access.mp415.2MB
~Get Your Files Here !/9. Securing Virtual Machines/5. Control VM Device Connections.mp49.45MB
~Get Your Files Here !/9. Securing Virtual Machines/6. Configure Network Security Policies.mp421.11MB
~Get Your Files Here !/9. Securing Virtual Machines/7. vSGXSecure Enclaves.mp412.95MB
~Get Your Files Here !/9. Securing Virtual Machines/8. What This Module Covered.mp42.69MB