|Certified Virtualization Security Expert (Advanced VMware Security) Online Training Series|
Annual Membership Benefits include Free Unlimited Access to All Project Management, Business Skills, IT Service Management, IT Networking and Cyber Security Online Training Series and more. Become a Member Today!
Training Series Overview
This series covers everything you need to know becoming a Certified Virtualization Security Expert. Students will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools.
Career Path: The objective of the Certified Virtualization Expert® designation is to confirm upon the certificate holder the best of breed of virtual infrastructure professional certifications. The CVE® conveys that the individual who achieves the certification not only has the certificate, but more importantly possesses the in-depth knowledge related to virtual design, maintenance, and infrastructure management, is a subject matter expert in the field of virtualization, and that his/her training is current, relevant, and complete. Certification can lead to better visibility, opportunities, and jobs.
Does this training qualify for college credits?
Available CEUs for Course Series Completion: 18
Access Training Courses Below
Click any of the titles below to launch your videos:
Topic A: Primer and Reaffirming Our Knowledge
Topic A: Routing and the Security Design of Vmware
Topic A: Remote DataStore Security
Topic A: Penetration Testing 101
Topic A: Information Gathering, Scanning and Enumeration
Topic A: Penetration Testing and the Tools of the Trade
Topic A: DMZ Virtualization and Common Attack Vectors
Topic A: Hardening Your ESX Server
Topic A: Hardening Your ESXi Server
Topic A: Hardening Your vCenter Server
Topic A: 3rd Party Mitigation Tools