This VMware Certified Virtualization Security Expert Certified Diploma covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more.
- The price is for the whole course including final exam – no hidden fees
- Accredited Certificate upon successful completion
- Efficient exam system with instant results
- Track progress within own personal learning portal
- 24/7 customer support via live chat
This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you’re an individual looking to excel within this field then VMware Certified Virtualization Security Expert Certified Diploma is for you.
We’ve taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept – from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success.
All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the accredited qualification.
We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response.
Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime.
So, why not improve your chances of gaining professional skills and better earning potential.
Assessment and Certification
At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39.
Not only does our accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one.
On successful completion of this course, you have the potential to achieve an estimated salary of £30,000.
The sky really is the limit.
|Primer and Reaffirming Our Knowledge|
|Primer and Reaffirming Our Knowledge||00:25:00|
|Symmetric vs. Asymmetric Encryption||01:07:00|
|File System Structure||00:13:00|
|Accounts and Groups||00:35:00|
|Routing and the Security Design of VMware|
|Routing and the Security Design of Vmware||00:11:00|
|Major Benefits of Using VLANs||00:13:00|
|Remote Data Store Security|
|Remote DataStore Security||00:15:00|
|Fiber Channel Attacks – The Basics||00:22:00|
|Penetration Testing 101|
|Penetration Testing 101||00:40:00|
|The Evolving Threat||00:40:00|
|Information Gathering, Scanning and Enumeration|
|Information Gathering, Scanning and Enumeration||00:30:00|
|FireFox Fully Loaded||00:14:00|
|Introduction to Port Scanning||00:30:00|
|UDP Port Scan||00:42:00|
|Penetration Testing and the Tools of the Trade|
|Penetration Testing and the Tools of the Trade||00:43:00|
|Windows Password Cracking||00:24:00|
|DMZ Virtualization and Common Attack Vectors|
|DMZ Virtualization and Common Attack Vectors||00:21:00|
|Clearly Label Networks for Each Zone within the DMZ||00:22:00|
|Schmoo Con 2010 Virtualization Vulnerabilities Found!||00:08:00|
|Hardening Your ESX Server|
|Hardening Your ESX Server||01:03:00|
|Configuring the ESX ESXi Host||02:19:00|
|Establish a Password Policy for Local User Accounts||00:21:00|
|Secure the SNMP Configuration||00:19:00|
|Hardening Your ESXi Server|
|Hardening Your ESXi Server||00:20:00|
|Hardening Your vCenter Server|
|Hardening Your vCenter Server||00:17:00|
|VMware Converter Enterprise||01:10:00|
|3rd Party Mitigation Tools|
|3rd Party Mitigation Tools||00:24:00|
|Mock Exam – VMware Certified Virtualization Security Expert Certified Diploma||00:20:00|
|Final Exam – VMware Certified Virtualization Security Expert Certified Diploma||00:20:00|
No Ratings found for this course.