1. Identify threats and vulnerabilities for virtualization for a fictitious major organization,
2. Identify, classify, and prioritize security measures and corresponding network equipment, software and procedures for addressing the threats and vulnerabilities (e.g., firewalls, proxy servers, key management, identity management, content filtering, anti-virus management, patch management, token administrator, certificate authority, DMZ),
3. Discuss security policies needed to address the threats and vulnerabilities and which support the security measures, and
4. Develop a prioritized strategy to deal with the most serious threats and vulnerabilities.