Hyper-V Security Course

There are more virtual machines than ever, and it's important to be prepared to protect them.

14 minutes

Course description

There are multiple ways to protect your physical and virtual servers. Many of these are not enabled and some cause conflicts with other options. Learn what works well together and how they can protect your server environment.

Syllabus

Virtual Desktops Infrastructure

Video - 00:02:00

VDIs can be used in a remote desktop server to further separate clients when running applications, in order to protect the server.
Windows Containers

Video - 00:03:00

Containers are available in Windows Server in order to separate virtualization and applications from the main Windows operating system files.
Just In Time Administration

Video - 00:02:00

JIT can be used to give just what an administrator needs without having to use all the tools, so that a server can stay secure.
Just Enough Administration

Video - 00:02:00

JEA can be used to make software compatible with allowing the correct administrator at the correct time to be able to manage a piece of software.
Host Guardian Service

Video - 00:02:00

A discussion of how HGS can protect VMs using Hyper-V.
Configuring Virtual Machine Security

Video - 00:02:00

A demonstration of properly preparing a server for virtualization security as it pertains to vTPMs, shielded VMs and networking using VLANs.

Meet the author

Robert McMillen

Professor Robert McMillen is a college instructor with over 50 technical certifications. He has an MBA and teaches Computer Science at Portland based colleges. Robert has earned multiple MCSEs and an MCT from Microsoft. He is the owner of Tech Publishing, a Portland-based network new media company. Robert has over 20 years of experience in network engineering and earned certifications from companies like Microsoft, Checkpoint, IBM, and Cisco. Some of his higher profile jobs have been restoring email for the government to prosecute Enron executives, training the network vulnerability assessment team for the U.S. Army, and relocating the Xbox world for Microsoft.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Threat / Warning Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust