We may earn an affiliate commission when you visit our partners.
Larry Glusman

This course will teach you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric.

Read more

This course will teach you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric.

Keeping your data secure is becoming more and more important in today’s connected world. In this course, Securing Windows Server 2019 Hyper-V Virtual Machines, you’ll learn to protect your virtual machines from rogue admins or anyone else that might try to move your VMs to another location. First, you’ll explore the Host Guardian Service, to guard your fabric. Next, you’ll discover shielded virtual machines, to ensure your VMs are encrypted. Finally, you’ll learn how to mix the two, so that your VMs will run only on your guarded fabric, even if the entire VM file is stolen, along with all its passwords. When you’re finished with this course, you’ll have the skills and knowledge of an experienced Windows admin needed to protect your virtual machines from rogue admins on Windows Server 2019 with Hyper-V.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Understanding a Guarded Fabric
Installing the Host Guardian Service
Implementing a Guarded Fabric
Read more
Understanding the Difference between Encrypted and Shielded VMs
Implementing Shielded VMs
Deploying Shielded VMs
Migrating Shielded VMs

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Larry Glusman, who is recognized for their work in Securing Windows Server 2019 and Hyper-V Virtual Machines
Develops skills and knowledge of an experienced Windows admin needed to protect your virtual machines from rogue admins on Windows Server 2019 with Hyper-V
Covers securing virtual machines on Windows Server 2019 and Hyper-V
Not explicitly stated to be discontinued or no longer accessible
Not explicitly requires that this course be taken in serial with others as part of a series

Save this course

Save Securing Windows Server 2019 Hyper-V Virtual Machines to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Securing Windows Server 2019 Hyper-V Virtual Machines with these activities:
Review Shielded VMs
Reinforces the foundational concept of Shielded VMs, ensuring a solid understanding before starting the course.
Show steps
  • Revisit concepts of encryption and virtualization
Attend a Webinar on Shielded VM Best Practices
Provides students with access to industry experts and valuable insights into Shielded VM best practices.
Browse courses on Shielded VMs
Show steps
  • Register for and attend a webinar on Shielded VM best practices
  • Take notes and engage in Q&A sessions
Follow tutorials on Shielded VM deployment
Enhance your practical skills by following step-by-step tutorials on deploying Shielded VMs.
Browse courses on Shielded VMs
Show steps
  • Identify reliable tutorial resources
  • Set up your environment according to the tutorial instructions
  • Follow the tutorial steps to deploy Shielded VMs
  • Configure and test the deployed VMs
Seven other activities
Expand to see all activities and additional details
Show all ten activities
Practice encryption and shielding configuration
Reinforce your understanding of encryption and shielding configurations through hands-on exercises.
Browse courses on Encryption
Show steps
  • Review the course material on encryption and shielding
  • Install and configure the necessary software
  • Create scenarios that require encryption and shielding configurations
  • Apply configurations and verify the results
  • Troubleshoot any issues that arise
Practice Setting up a Guarded Fabric
Provides practical experience in setting up a Guarded Fabric, strengthening understanding of its implementation.
Show steps
  • Follow step-by-step guides to set up a Guarded Fabric
  • Configure and enable the Host Guardian Service
  • Validate the successful setup of the Guarded Fabric
Discuss Shielded VM Advantages and Disadvantages
Fosters collaboration and exchange of ideas, allowing students to gain diverse perspectives on Shielded VMs.
Browse courses on Shielded VMs
Show steps
  • Join a study group or online forum
  • Engage in discussions on the advantages and disadvantages of Shielded VMs
  • Share experiences and learn from others' insights
Create a Study Guide on Shielded VM Management
Encourages active learning and organization, helping students consolidate their understanding of Shielded VM management.
Browse courses on Shielded VMs
Show steps
  • Gather notes, assignments, and course materials
  • Review and organize the materials into key concepts
  • Create summaries, diagrams, and flashcards for effective recall
Create a Guide on Shielded VM Deployment
Enhances understanding of Shielded VM deployment through the process of creating a comprehensive guide.
Browse courses on Shielded VMs
Show steps
  • Research and gather information on Shielded VM deployment
  • Organize and structure the content in a logical flow
  • Write detailed instructions and explanations
  • Review and edit the guide for clarity and accuracy
Implement Shielded VMs in a Test Environment
Provides hands-on experience in implementing Shielded VMs, solidifying knowledge gained in the course.
Browse courses on Shielded VMs
Show steps
  • Set up a test environment with Hyper-V and a Guarded Fabric
  • Create and configure Shielded VMs
  • Test the security features and functionality of Shielded VMs
  • Troubleshoot any issues encountered
Participate in Shielded VM Security Case Study Competition
Challenges students to apply their knowledge and skills in a real-world context, promoting problem-solving and critical thinking.
Browse courses on Shielded VMs
Show steps
  • Identify and analyze a security case study related to Shielded VMs
  • Develop and present a solution to mitigate the security risks
  • Participate in the competition and receive feedback from experts

Career center

Learners who complete Securing Windows Server 2019 Hyper-V Virtual Machines will develop knowledge and skills that may be useful to these careers:
Virtualization Security Engineer
Virtualization Security Engineers design, implement, and manage security controls for virtualized environments. These environments may include private clouds, public clouds, or hybrid clouds. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Virtualization Security Engineer.
Cloud Security Architect
Cloud Security Architects design and implement security measures to protect cloud-based systems and data. They work with cloud service providers and customers to ensure that cloud environments are secure and compliant with regulations. This course will teach you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge will help you build a foundation for success as a Cloud Security Architect in the field of cloud security.
Security Analyst
Security Analysts monitor and analyze security systems to identify and respond to threats. They work with IT staff and other stakeholders to develop and implement security policies and procedures. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Security Analyst.
Vulnerability Analyst
Vulnerability Analysts identify and assess vulnerabilities in computer systems and networks. They work with IT staff and other stakeholders to develop and implement security patches and updates. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Vulnerability Analyst.
Forensic Analyst
Forensic Analysts investigate computer crimes and security breaches. They gather and analyze evidence to determine the cause and scope of an attack. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Forensic Analyst.
Security Operations Center (SOC) Analyst
SOC Analysts monitor and analyze security systems to identify and respond to threats. They work with IT staff and other stakeholders to develop and implement security policies and procedures. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a SOC Analyst.
Security Consultant
Security Consultants provide security advice and guidance to organizations. They work with clients to assess risks, develop security plans, and implement security measures. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Security Consultant.
Penetration Tester
Penetration Testers identify and exploit vulnerabilities in computer systems and networks. They work with organizations to assess their security posture and identify areas for improvement. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Penetration Tester.
Incident Responder
Incident Responders investigate and respond to security incidents. They work with IT staff and other stakeholders to contain the damage and restore normal operations. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as an Incident Responder.
Compliance Auditor
Compliance Auditors ensure that organizations comply with relevant laws and regulations. They work with organizations to assess their compliance posture and identify areas for improvement. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience will help you build a foundation for success as a Compliance Auditor.
Chief Information Security Officer (CISO)
CISOs are responsible for the overall security of an organization's information systems. They work with senior management to develop and implement security policies and procedures. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience may be useful in building a foundation for success as a CISO.
Information Security Manager
Information Security Managers are responsible for the day-to-day management of an organization's security program. They work with IT staff and other stakeholders to implement and enforce security policies and procedures. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience may be useful in building a foundation for success as an Information Security Manager.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems and networks. They work with clients to assess their needs and develop solutions that meet their business requirements. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience may be useful in building a foundation for success as a Systems Engineer.
Network Engineer
Network Engineers design, implement, and maintain computer networks. They work with clients to assess their needs and develop solutions that meet their business requirements. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience may be useful in building a foundation for success as a Network Engineer.
Database Administrator
Database Administrators design, implement, and maintain databases. They work with clients to assess their needs and develop solutions that meet their business requirements. This course teaches you how to secure virtual machines on Windows Server 2019 and Hyper-V, using shielded VMs with a guarded fabric. This knowledge and hands-on experience may be useful in building a foundation for success as a Database Administrator.

Reading list

We've selected five books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing Windows Server 2019 Hyper-V Virtual Machines.
Provides a deep dive into Windows Server virtualization, including best practices for securing virtual machines and virtual networks.
Provides a comprehensive overview of Windows Server 2019 Hyper-V administration, including best practices for securing virtual machines and virtual networks.
Provides a comprehensive overview of virtualization security, including best practices for securing virtual machines and virtual networks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing Windows Server 2019 Hyper-V Virtual Machines.
Windows Server 2022: Manage Virtual Machines and...
Most relevant
Implementing Windows Server 2019 Hyper-V
Most relevant
Implementing Windows Server 2016 Hyper-V
Most relevant
Securing Windows Server 2016 Virtualization
Most relevant
Implement Windows Server 2019 High Performance Network...
Most relevant
Play by Play: Care and Maintenance of Development VMs
Most relevant
Configuring Virtual Machines in Microsoft Azure
Most relevant
Windows Server 2022 Administration
Most relevant
Configuring Windows Server 2019 EFS and BitLocker...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser