Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Data Center Virtualization Certification: VCP6.5-DCV Exam Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
Data Center Virtualization Certification: VCP6.5-DCV Exam Guide

Data Center Virtualization Certification: VCP6.5-DCV Exam Guide

By : Andrea Mauro , Paolo Valsecchi
2 (1)
close
close
Data Center Virtualization Certification: VCP6.5-DCV Exam Guide

Data Center Virtualization Certification: VCP6.5-DCV Exam Guide

2 (1)
By: Andrea Mauro , Paolo Valsecchi

Overview of this book

This exam guide enables you to install, configure, and manage the vSphere 6.5 infrastructure in all its components: vCenter Server, ESXi hosts, and virtual machines, while helping you to prepare for the industry standard certification. This data center book will assist you in automating administration tasks and enhancing your environment’s capabilities. You will begin with an introduction to all aspects related to security, networking, and storage in vSphere 6.5. Next, you will learn about resource management and understand how to back up and restore the vSphere 6.5 infrastructure. As you advance, you will also cover troubleshooting, deployment, availability, and virtual machine management. This is followed by two mock tests that will test your knowledge and challenge your understanding of all the topics included in the exam. By the end of this book, you will not only have learned about virtualization and its techniques, but you’ll also be prepared to pass the VCP6.5-DCV (2V0-622) exam.
Table of Contents (17 chapters)
close
close

Summary

Following VMware's vision, the five pillars of cyber hygiene are as follows:

  • Least privilege: This is the common, and most reasonable, approach; it applies to user accounts, service accounts, and services in general (for example, used ports).
  • Micro-Segmentation: Using NSX, it's finally possible to bring network control to the VM level, with granular security rules. Considering the new product (AppDefense), VM security can be enforced at both the network and application levels.
  • Encryption: Data must be protected at each level, and for the physical level, encryption is the only way to ensure good protection.
  • Authentication: Authentication is usually the weakest part, primarily due to simple passwords (or passwords that are not changed periodically).
  • Patching: Keeping your software components up to date is crucial for the security aspect, but it's also very important for implementing new features. Upgrading and patching will be discussed in Objective 4.

Chapter 2, Configure and Administer vSphere 6.x Networking, will check your virtual networking knowledge.

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY