~Get Your Files Here !/3. Best Practices for vSphere Security/4. Analyzing vSphere for Best Practices.mp4 42.4 MB
~Get Your Files Here !/4. Managing vSphere Security Certificates/4. How to Install the VMCA Root Certificate in Your Browser.mp4 22.3 MB
~Get Your Files Here !/3. Best Practices for vSphere Security/3. Using the vSphere Security Configuration Guide (SCG).mp4 22.3 MB
~Get Your Files Here !/9. Securing Virtual Machines/6. Configure Network Security Policies.mp4 22.1 MB
~Get Your Files Here !/9. Securing Virtual Machines/3. Control VMware Tools Installation.mp4 18.1 MB
~Get Your Files Here !/07. Securing ESXi Hosts/06. Securing SSH and ESXi Shell.mp4 17.0 MB
~Get Your Files Here !/9. Securing Virtual Machines/4. Control VM Data Access.mp4 15.9 MB
~Get Your Files Here !/8. Securing vCenter Server/3. Limiting Network Access.mp4 15.5 MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/02. Compare and Contrast Default SystemSample Roles.mp4 14.9 MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/03. Determine How Permissions are Applied and Inherited in vCe.mp4 14.2 MB
~Get Your Files Here !/8. Securing vCenter Server/7. Control Datastore Browser Access.mp4 14.2 MB
~Get Your Files Here !/9. Securing Virtual Machines/7. vSGXSecure Enclaves.mp4 13.6 MB
~Get Your Files Here !/9. Securing Virtual Machines/2. Controlling Access to Virtual Machines.mp4 13.4 MB
~Get Your Files Here !/07. Securing ESXi Hosts/02. Control Access to Hosts.mp4 13.2 MB
~Get Your Files Here !/07. Securing ESXi Hosts/03. EnableConfigureDisable Services in the ESXi Firewall.mp4 13.2 MB
~Get Your Files Here !/10. Securing vSphere with Encryption/5. Encrypting Virtual Machines.mp4 13.1 MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/07. Apply a Role to a UserGroup and to an Object or Group of O.mp4 12.5 MB
~Get Your Files Here !/07. Securing ESXi Hosts/07. Password Security and Account Lockout.mp4 12.4 MB
~Get Your Files Here !/06. Configuring and Administering Role-based Access Control/08. Compare and Contrast Propagated and Explicit Permission As.mp4 12.2 MB
~Get Your Files Here !/05. Enabling SSO and Active Directory Integration/07. EnableDisable Single Sign-on (SSO) Users.mp4 12.0 MB