Basics of VMware vSphere & ESXi Virtualization Software

Gain the Knowledge to Create & Maintain a Virtual Infrastructure

What's Inside

Any modern day network and security professional is obligated to be well-versed in cloud technology. This course will get you up to speed on virtualization and cloud technology, and even teach you to set up and maintain a virtual system from scratch. With this knowledge, you’ll be equipped to host anything from a few to hundreds of machines (even with varying operating systems) in one single infrastructure.

  • Get introduced to virtualization & cloud computing technology w/ over 24 lectures & 2.5 hours of content
  • Host hundreds of virtual machines running various operating systems
  • Link machines together in a virtual network or cloud infrastructure
  • Create a virtual system using the VMware VSphere environment
  • Understand, design & deploy a virtual system w/ ease
  • Learn to instal, deploy, manage & maintain a virtual system

Get started now!

Certificate Available
11267+ Students
25 Lectures
2+ Hours of Video
Lifetime Access
24/7 Support
Instructor Rating
Gabriel Avramescu

Senior Information Security Consultant

I work on the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. I act as an effective participant on a multidisciplinary security project team.

-Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking)

-Make recommendations on security weaknesses and report on activities and findings

- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)

- Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment

- Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)

- Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures

- Assist with the development of remediation services for identified findings - Customize, operate, audit, and maintain security related tools and applications

IT Trainer

- Trainer for Web Application Hacking and Network Infrastructure Hacking - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader





- CREST Registered Penetration Tester (CRT)


- ISO 270001 Lead Auditor

- CEH (Certified Ethical Hacker)

- CCNA and CCNA Security

- CCNP Routing and CCNP Switching

- Advanced Linux&InfoSEC

- VMWare vSphere Install, Configure, Manage

- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

Popular Bundles