EC-Council Certified Incident Handler V2

Course description:
This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.
It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.
Following a rigorous development which included a careful Job Task Analysis (JTA) related to incident handling and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based, intensive 3-day training program and certification that provides a structured approach to learning real-world incident handling and response requirements.
Purpose of the course:
- To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
- To ensure that organization can identify, contain, and recover from an attack.
- To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
- To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
- To minimize the loss and after-effects breach of the incident.
- For individuals: To enhance skills on incident handling and boost their employability.
Course objectives:
- Understand the key issues plaguing the information security world
- Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
- Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Decode the various steps involved in planning an incident handling and response program
- Gain an understanding of the fundamentals of computer forensics and forensic readiness
- Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
- Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents
For whom this course is suitable:
- Penetration Testers
- Vulnerability Assessment Auditors
- Risk Assessment Administrators
- Network Administrators
- Application Security Engineers
- Cyber Forensic Investigators/ Analyst and SOC Analyst
- System Administrators/Engineers
- Firewall Administrators and Network Managers/IT Managers
Course Outline:
- Module 01: Introduction to Incident Handling and Response
- Module 02: Incident Handling and Response Process
- Module 03: Forensic Readiness and First Response
- Module 04: Handling and Responding to Malware Incidents
- Module 05: Handling and Responding to Email Security Incidents
- Module 06: Handling and Responding to Network Security Incidents
- Module 07: Handling and Responding to Web Application Security Incidents
- Module 08: Handling and Responding to Cloud Security Incidents
- Module 09: Handling and Responding to Insider Threats
What you will get as part of the course:
– authorized educational literature
– access to practical laboratory work
– a trainer certified by the EC-Council company
– a certificate of completion of official training on the course
Full course description https://www.eccouncil.org/ECIH-v2
*the E|CIH exam can be taken after completing the official E|CIH course
EC-Council СHFI v9

The purpose of the course is to give students the knowledge and skills to work with key techniques for detecting computer crimes both in the local network and when interacting on the Internet with mobile clients and cloud services. Also in the course are widely presented software products for collecting and recovering information that indicates an intrusion into the system.
Audience
This course provides extensive knowledge of security analysis of modern computer networks and will be useful to all interested IT professionals, including network and system administrators and IT managers. The course will be of interest to information security officers, law enforcement officers and military officials involved in investigating computer network intrusions. In addition, the course is useful for security professionals in preparation for international certification.
At the end of the course students will be able to:
– Independently detect intrusions into the OS, web applications, mobile devices and cloud services;
– Use proven methods of intrusion detection;
– Gather evidence to support the invasion;
– Use specialized tools for analysis of intrusions;
– Analyze text, graphic or media traffic flows for bookmarks;
– Analyze storage systems to detect traces of intrusion;
– Restore and analyze the state of non-volatile (non-volatile) and random access (volatile) memory from Windows, Mac and Linux;
– Recover deleted files and partitions in Windows, Mac and Linux;
– Analyze the state of systems against insider attacks;
– Apply the technique of reverse engineering to analyze the attacking code;
– Detect hacking (or attempted hacking) of password files;
– Extract and analyze logs of proxy servers, firewalls, intrusion detection / prevention systems, workstations, servers, switches, routers, domain controllers, DNS and DHCP servers, access control systems and other devices;
– Take the necessary measures to transfer evidence to law enforcement agencies.
Certification exams
The course helps to prepare for the following certification exams:
312-49: Computer Hacking Forensic Investigator
Preparation required
To learn effectively, students must have the following knowledge and skills:
– Experience working with client and server operating systems;
– Understanding the operation of the network and network devices;
– understanding of basic security concepts;
– CEH and CND courses or equivalent knowledge and skills.
Listener’s materials
Students are provided with a branded textbook and manual for laboratory work (electronically), as well as other materials and software needed to perform these works.
Module 1: Investigating IS incidents around the world
Topics
- Identification of computer threats
- Classification of cyber-attacks
- Challenges for cybercrime researchers
- Types of cyber-attacks and basic rules of investigation
- Evidence collection rules and basic types of digital evidence
- Assessment of incident preparedness and action plan
- The scope of activities of computer security incident investigators and the area of responsibility
- Review of legal, ethical and confidential issues during the investigation of the incident
Module 2: IS Incident Investigation Process
Topics
- The process of investigating the IS incident
- Stages of the IS incident investigation process
- Requirements for the laboratory environment and the team of incident investigators
- Research software
- Tasks of the first researchers of the IS incident
- Finding evidence and gathering evidence
- Placement and storage of evidence
- Deduplication of data, recovery of deleted data and verification of evidence
- Writing a report
Lab: - Data recovery using EasyUS Data Recovery Wizard;
- Use HashCalc to calculate a hash, checksum, or HMAC;
- Using MD5 Calculator;
- View files of various formats through File Viewer;
- Detection of traces of work with data by means of P2 Commander;
- Create a partition image using R-Drive Image.
Module 3: Collecting evidence from disks and file systems
Topics
- Classification of computer network security tools
- Methods and means of access control
- Methods and means of authentication, authorization and audit of access
- A brief overview of the main methods of cryptographic protection of information
- Basic classes of hardware and software for computer network protection and principles of their operation
- Network protocols designed to ensure security and the principles of their operation
Lab: - Detect deleted files using WinHex;
- File system analysis using The Sleuth Kit;
- Raw image analysis using Autopsy.
Module 4: Investigating Operating System Incidents
Topics
- Methods of obtaining data
- Getting current data
- Teaching static data
- Duplication of data
- Device change lock
- Methods and means of obtaining data
- Get data in Windows and Linux
Lab: - Research the NTFS partition using DiskExplorer for NTFS;
- View graphic content with the FTK Imager Tool.
Module 5: Countering methods of concealing evidence
Topics
- Countering methods of concealing evidence and the purpose of counteraction
- Review of techniques for counteracting methods of concealing evidence
- Extraction of evidence from deleted files and sections, files with password protection and steganography
- Code entanglement, artifact stripping, data / metadata overwriting and encryption
- Methods for detecting encryption protocols, program packers and rootkits.
- Countermeasures to counter methods of concealing evidence
Lab: - Hacking application passwords;
- Detection of steganography.
Module 6: Methods of data collection and copying
Topics
- Check for data that changes and does not change Windows
- Windows memory and registry analysis
- Check cache, cookies and browser history
- Check Windows files and metadata
- Analyze text logs and Windows event logs
- Linux log commands and files
- Check Mac logs
Lab: - Detection and removal of materials hidden on the computer using OSForensics;
- Get information about the download process using ProcessExplorer;
- View, monitor and analyze events using Event Log Explorer;
- Computer research on penetration using Helix;
- Obtaining variable (operational) data in Linux;
- Analysis of immutable (static) data in Linux.
Module 7: Investigation of network technology incidents
Topics
- Network intrusions
- Basic concepts of journaling
- An overview of ways to compare events
- Check routers, firewalls, IDS, DHCP and ODBC logs
- Checking network traffic
- Collection of evidence of network penetration
- Reconstruction of the invasion
Lab:; - Interception and analysis of events using GFI EventsManager;
- Incident investigation and data collection using XpoLog Center Suite;
- Investigate network attacks with Kiwi Log Viewer;
- Track network traffic with Wireshark.
Module 8: Investigating Web Application Attacks
Topics
- Threats to web applications
- Web application architecture
- Web attacks and steps to implement them
- Web attacks on a Windows server
- IIS server architecture and work with its log
- Apache web server architecture and work with its log
- Ways to attack web applications
Lab: - Domain network analysis and IP address requests using SmartWhois.
Module 9: Investigation of DBMS incidents
Topics
- Database threats
- MSSQL threats
- Signs of database intrusion
- Collect evidence of intrusion using SQL Server Management Studio and Apex SQL DBA
- MySQL threats
- MySQL architecture and definition of data directory structure
- Utilities for analyzing and collecting evidence of penetration into MySQL
- MySQL threats to WordPress web application databases
Lab: - Extract database from Android devices using Andriller;
- SQLite database analysis using DB Browser for SQLite;
- Study the MySQL database.
Module 10: Investigation of incidents related to cloud programs
Topics
- Description of the principles of cloud computing
- Cloud attacks
- Ways to protect the clouds
- Cloud protection stakeholders
- DropBox and GoogleDrive cloud services
Lab: - Detection of vulnerabilities in DropBox;
- Google Drive research.
Module 11: Investigation of malicious code incidents
Topics
- Ways to penetrate malware into the OS
- Basic components and malware distribution
- Malware protection concept
- Detection and removal of malware from systems
- Malware analysis – analysis rules and test environment
- Static and dynamic analysis of malware
Lab: - Static analysis of suspicious files;
- Dynamic analysis of malicious code;
- Analysis of infected PDF-files;
- Scanning PDF files using web resources;
- Scan suspicious MS Office files.
Module 12: Investigating Email Incidents
Topics
- Mail systems, mail clients and mail servers
- Account management
- Email attacks
- Components of e-mail messages
- Common headers and X-headers
- Detect mail attacks
- Tools for analyzing e-mails
- American law CAN-SPAM
Lab: - Recover deleted emails with Recover My Email;
- Detection of dangerous messages with Paraben’s Email Examiner;
- Track emails with eMailTrackerPro.
Module 13: Investigating Mobile Incidents
Topics
- Threats to mobile devices
- Features of hacking of mobile devices and mobile OS
- Mobile device architecture
- Android stack architecture and download process
- IOS stack architecture and download process
- Mobile data storage
- Preparation and invasion of mobile OS
Lab: - Analysis of dangerous images and recovery of deleted files using Autopsy;
- Explore your Android device with Andriller.
Module 14: Preparation of Incident Investigation Reports
Topics
- The structure of the incident investigation report
- Signs of a good report
- Incident investigation report template
- Classification of reports and manuals for their writing
- Expert opinions in the report
- Differences between technical and expert opinions
- Daubert and Fyre standards
- Ethical standards during the investigation
Complete information about the course computer-hacking-forensic-investigator-v9
The course price is $ 1,500
EC-Council CEH v11

Course description
The Certified Ethical Hacker Certificate (CEH) is the most trusted certification and ethical hacking achievement recommended by employers worldwide. It is the most coveted certificate of information security and is one of the fastest growing cyber resources needed by critical infrastructure and major service providers. Since the introduction of CEH in 2003, it has been recognized as a standard in the information security community. CEH v11 continues to implement the latest hacking methods and state-of-the-art hacking and use tools used today by hackers and information security professionals. The five phases of ethical hacking and CEH’s initial core mission remain relevant today: “To defeat a hacker, you have to think like a hacker.”
The purpose of the course
To provide students with knowledge and skills to form a systematic approach to computer security, to teach methods to check the security of various nodes of a computer network and to acquaint students with the tools of attackers, their advantages and limitations.
To learn effectively, students must have the following knowledge and skills:
– Experience working with client and server operating systems;
– Understanding the operation of the network and network devices;
– Understanding of basic security concepts.
Course program
Module 1: Introduction to Ethical Hacking
Module 2: Traces and Intelligence
Module 3: Network Scanning
Module 4: Enumeration
Module 5: Vulnerability Analysis
Module 6: System Hacking
Module 7: Threats to Malware
Module 8: Sniffing
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Abduction Session
Module 12: Evasion of IDS, Firewalls and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL injection
Module 16: Hacking Wireless Networks
Module 17: Hacking mobile platforms
Module 18: IoT and OT hacking
Module 19: Cloud Computing
Module 20: Cryptography
What you will receive as part of the course:
– authorized educational literature
– access to practical laboratory works iLabs
– EC-Council certified trainer
– certificate of official training at the CEH course
– voucher for passing the exam
– after successfully passing the exam – a certificate confirming the competencies of a certified ethical hacker.
Full course description cehv11-brochure-hacker-v11
The course price is 2000$ 1200$
Managing Modern Desktops

Course description:
During MD-101, Managing Modern Desktops participants discuss how to implement and plan an operating system deployment strategy using modern deployment techniques and how to implement strategy updates. The course explores what it takes to connect Microsoft Intune to your organization. In the course of training and methods of deployment of management of applications and browser applications are studied.
Module 1: Modern Management
This module explains the concepts of supporting the desktop through it’s entire lifecycle. Finally, students will be introduced to the tools and strategies used for desktop deployment. Students well be introduced to the concept of directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication.Lesson
- The Enterprise Desktop
- Azure AD Overview
- Managing Identities in Azure AD
Lab : Managing identities in Azure ADLab : Using Azure AD Connect to connect Active Directories
After completing this module, students will be able to:
- Describe the enterprise desktop lifecycle.
- Describe the capabilities of Azure AD.
- Manage users using Azure AD with Active Directory DS.
- Implement Windows Hello for Business.
- Join devices to Azure AD.
Module 2: Device Enrollment
This module will also cover Azure AD join and will be introduced to Microsoft Endpoint Manager, as well as learn how to configure policies for enrolling devices to Endpoint Manager and Intune.Lesson
- Manage Device Authentication
- Device Enrollment using Microsoft Endpoint Configuration Manager
- Device Enrollment using Microsoft Intune
Lab : Configuring and managing Azure AD JoinLab : Manage Device Enrollment into IntuneLab : Enrolling devices into Microsoft Intune
After completing this module, students will be able to:
- Configure and join devices to Azure AD
- Configure device enrollment in Microsoft Endpoint Manager
- Enroll devices in Endpoint Configuration Manager and Intune
Module 3: Configuring Profiles
This module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. You will be introduced to the various user profile types that exist in Windows for on-premises devices. You will learn about the benefits of various profiles and how to switch between types of profiles. You will examine how Folder Redirection works and how to set it up. The lesson will then conclude with an overview of Enterprise State roaming and how to configure it for Azure AD devices.
Lesson
- Configuring Device Profiles
- Managing User Profiles
Lab : Creating and Deploying Configuration ProfilesLab : Monitor device and user activity in IntuneLab : Configuring Enterprise State RoamingAfter completing this module, you should be able to:
- Describe the various types of device profiles in Intune
- Create, manage and monitor profiles
- Manage PowerShell scripts in Intune
- Explain the various user profile types that exist in Windows.
- Explain how to deploy and configure Folder Redirection.
- Configure Enterprise State Roaming for Azure AD devices.
Module 4: Application Management
In this module, students learn about application management on-premise and cloud-based solutions. This module will cover how to manage Office 365 ProPlus deployments in Endpoint Manager as well as how to manage apps on non-enrolled devices. The module will also include managing Win32 apps and deployment using the Microsoft Store for Business. This module will conclude with an overview of Microsoft Edge and Enterprise Mode.
Lesson
- Implement Mobile Application Management (MAM)
- Deploying and updating applications
- Administering applications
Lab : Deploying cloud apps using IntuneLab : Configure App Protection Policies for Mobile DeviceLab : Deploy Apps using Endpoint Configuration ManagerLab : Deploy Apps using Microsoft Store for Business
After completing this module, students will be able to:
- Describe the methods for application management.
- Deploy applications using Endpoint Manager and Group Policy.
- Configure Microsoft Store for Business.
- Deploy Office365 ProPlus using Intune.
- Manage and report application inventory and licenses.
Module 5: Managing Authentication in Azure AD
This module covers the various solutions for managing authentication. The student will also learn about the different types of VPNs. This module also covers compliance policies and how to create conditional access policies.
Lesson
- Protecting Identities in Azure AD
- Enabling Organization Access
- Implement Device Compliance Policies
- Using Reporting
Lab : Configuring Multi-factor AuthenticationLab : Configuring Self-service password reset for user accounts in Azure ADLab : Configuring and validating device complianceLab : Creating device inventory reports
After completing this module, students will be able to:
- Describe Windows Hello for Business
- Describe Azure AD Identity Protection
- Describe and manage multi-factor authentication
- Describe VPN types and configuration
- Deploy device compliance and conditional access policies
- Generate inventory reports and Compliance reports using Endpoint Manager
Module 6: Managing Security
In this module, students will learn about data protection. Topics will include Windows & Azure Information Protection, and various encryption technologies supported in Windows 10. This module also covers key capabilities of Windows Defender Advanced Threat Protection and how to implement these capabilities on devices in your organization. The module concludes using Windows Defender and using functionalities such as antivirus, firewall and Credential Guard.
Lesson
- Implement device data protection
- Managing Windows Defender ATP
- Managing Windows Defender in Windows 10
Lab : Configure and Deploy Windows Information Protection Policies by using IntuneLab : Configuring Endpoint security using IntuneLab : Configuring Disk Encryption Using Intune
After completing this module, students will be able to:
- Describe the methods protecting device data.
- Describe the capabilities and benefits of Windows ATP.
- Deploy and manage settings for Windows Defender clients.
Module 7: Deployment using Microsoft Endpoint Manager – Part 1
In this two-part module, students well be introduced to deployment using Microsoft Endpoint Manager. Part 1 will cover the tools for assessing the infrastructure and planning a deployment, followed by deployment using the Microsoft Deployment Toolkit and Endpoint Configuration Manager.
Lesson
- Assessing Deployment Readiness
- On-Premise Deployment Tools and Strategies
Lab : Deploying Windows 10 using Microsoft Deployment ToolkitLab : Deploying Windows 10 using Endpoint Configuration Manager
After completing this module, students will be able to:
- Describe the tools for planning a deployment.
- Deploy Windows 10 using the Microsoft Deployment Toolkit
- Deploy Windows 10 using Endpoint Configuration Manager
Module 8: Deployment using Microsoft Endpoint Manager – Part 2
This module continues with deployment using Microsoft Endpoint Manager. In part two, the student will learn about using Windows Autopilot and deployment using Microsoft Intune. This module will also include dynamic OS deployment methods, such as Subscription Activation. The module will conclude learning how Co-Management can be used to transitioning to modern management.
Lesson
- Deploying New Devices
- Dynamic Deployment Methods
- Planning a Transition to Modern Management
Lab : Deploying Windows 10 with AutopilotLab : Configuring Co-Management Using Configuration Manager
After completing this module, students will be able to:
- Deploy Windows 10 using Autopilot
- Configure OS deployment using subscription activation and provisioning packages
- Upgrade, migrate and manage devices using modern management methods
Module 9: Managing Updates for Windows 10
This module covers managing updates to Windows. This module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor updates using Desktop Analytics.
Lesson
- Updating Windows 10
- Windows Update for Business
- Desktop Analytics
Lab : Managing Windows 10 security and feature updates
After completing this module, students will be able to:
- Describe the Windows 10 servicing channels.
- Configure a Windows update policy using Group Policy settings.
- Configure Windows Update for Business to deploy OS updates.
- Use Desktop Analytics to assess upgrade readiness.
The course price is $ 800
IT Audit. Practical Cases

The “IT AUDIT” trainings will allow participants to gain a wide set of knowledge to plan, perform IT audits and manage IT audit enterprise programs.
You will have all required skills to face the most difficult problems, which include:
- audit planning and reporting
- business continuity audit
- software development and system implementation lifecycle audit
- operating systems, databases, network equipment configuration audit
This is solely practical training! You immediately will work. The training adopted for an audience which represents students with completely different background. If you just a novice, you will be solving simple tasks. If you’re professional, you will have a set of very sophisticated tasks.
The obtained experience will mandatory increase your value for employees and customers, and bring a tremendous level of a professional confidence to you personally.
We recommend this training for:
- IT auditors
- IT security specialists
- IT quality specialists
- IT managers
COURSE AGENDA
Section 1: IT audit
- IT assurance framework (ITAF).
- Audit charter/mandate for the audit.
- Auditor independence.
- Professional due care.
- Audit assertions.
- Audit criteria.
- ISACA audit programs.
- IIA audit guidelines.
- Trust services principles and criteria
- Cobit 5
- ISO27001
- Other sources of criteria
- Audit planning. Risk-based planning.
- Audit performance.
- Materiality of audit findings.
- Audit evidence.
- Evidence collection methods
- Audit sampling.
- Using the work of other experts.
- Reporting.
- Handling illegal acts.
- Audit follow-up.
- Control environment
- Control design
- Control effectiveness
- Control monitoring
- Practical workshop.
Section 2: IT governance and management
- IT strategy
- IT architecture
- IT metrics
- IT organization
- IT service management
- Service catalog
- Incident management
- Change management
- Release management
- Problem management
- IT investments
- IT risks
- End-user computing.
- Shadow IT
- Cloud IT
- BYOD
- IT outsourcing
- Practical workshop.
Section 3: Information systems development and implementation
- System implementation and development lifecycle.
- Project management control frameworks.
- System development methodologies.
- Project business case.
- Feasibility study.
- Requirements specification.
- Design and Architecture.
- Procurement process.
- Coding.
- Implementation.
- Testing
- Handover to production.
- Operational support.
- Decommissioning.
- Migrations.
- Project closure.
- Practical workshop.
Section 4: IT operations
- Inventory and asset management.
- Patch management.
- Hardware maintenance.
- Licensing.
- Capacity planning.
- Performance and availability monitoring.
- Utilities
- Datacenter management
- Network physical infrastructure
- Practical workshop.
Section 5: Business continuity and disaster recovery
- Business continuity management
- Business continuity project initiation and management.
- Business impact assessment.
- RTO/RPO
- Recovery strategies.
- Business continuity plan testing.
- Disaster phases:
- Preparation.
- Initial response
- Restoration
- Recovery
- Post-incident activities
- Practical workshop.
Section 6: Information security assurance
- Information security policies, standards and procedures
- Information security roles and organizational structures.
- Human resource security
- Data classification and handling
- Key processes.
- Information security risk management.
- Incident handling.
- Awareness programs.
- Identity and access management.
- IDS/IPS
- DLP
- SIEM
- PKI
- 802.11x, NAP and network access control
- Remote access and teleworking risks
- Rights management
- Antimalware solutions
- Physical security controls
- Fraud controls
- Practical workshop.
Section 7: Audit considerations
- ERP audit
- CRM audit
- VOIP
- Virtualization
- Practical workshop.
Labs:
- Windows audit
- Linux audit
- Networking, VPN and Firewall audit
- PKI audit
- Database audit (MySQL and Oracle)
- Web application audit (PHP)
- Mobile application audit (android)
VMware vSphere: Exam preparation [V5.5]
![VMware vSphere: Exam preparation [V5.5]](https://edu.erc.ua/wp-content/uploads/2019/11/wmvare.jpg)
COURSE OVERVIEW
This 4-hour RAIL seminar will provide students with a structured learning plan that will prepare them to sit the VMware VCP5-DCV certification examination by concentrating study effort upon those learning objectives that the VCP will test. It includes a lecture, as well as class discussion and question & answer session. This course covers both the vSphere 5.0/5.1 version and the 5.5 version of the VCP5-DCV examination.
PREREQUISITES
- VMware vSphere 5.0: Install, Configure, Manage (HL235S) or VMware vSphere 5.0: What’s New (HL234S), or
- A good command of English since this online seminar will be delivered in English
- VMware vSphere 5.5: Install, Configure, Manage (H6D01S) or VMware vSphere 5.5: What’s New (H6D00S)
AUDIENCE
Previous attendees of the VMware vSphere 5.x: Install, Configure, Manage (HL235S\H1L93S\H6D01S) courses or VMware vSphere 5.x: What’s New (HL234S\H1L92S\H6D00S) classes who are considering or have already booked the VMware VCP exam. The best results will be obtained if the delegate has at least 5 days after this session to follow-up on the advice given during the seminar before taking the exam.
COURSE OBJECTIVES
This seminar will focus on the objectives listed in the VMware VCP5-DCV Exam Blueprint. Many of the topics are a review of what is covered in the VMware vSphere 5.x: Install Configure and Manage courses. The seminar also includes a summary of additional reading topics suggested in the Exam Blueprint. This online seminar is designed to ensure students are fully aware of the learning objectives they are required to get their VCP5-DCV certification. It is not a simple walk-through of VCP5-DCV test questions
NEXT STEPS
- VMware VCP5-DCV certification
BENEFITS TO YOU
This course will increase your chances of passing the VCP5-DCV certification test with technical reviews, revision strategies, question answering techniques and an open question and answer session with live expert instructor.
COURSE OUTLINE
This seminar focuses on the objectives of the VCP5-DCV Exam Blueprint. Objectives in the following areas will be covered:
- Plan, Install, Configure and Upgrade vCenter Server and ESXi
- Plan and Configure a vNetworking Infrastructure
- Plan and Configure a vStorage Infrastructure
- Deploy and Administer Virtual Machines and vApps
- Resource Management
- Monitoring a vSphere environment
- High Availability
The seminar includes over 30 sample questions
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
VMware vSphere: Optimize & Scale [V5.5]
![VMware vSphere: Optimize & Scale [V5.5]](https://edu.erc.ua/wp-content/uploads/2019/11/wmvare.jpg)
COURSE OVERVIEW
This training course, for experienced VMware vSphere® personnel, teaches advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. The course is based on VMware® ESXi™ 5.5 and VMware® vCenter Server™ 5.5. This course prepares the student for the VMware Certified Advanced Professional – Datacenter Administration [V5] certification (VCAP5-DCA). Completion of this course also satisfies the prerequisite for taking the VMware® Certified Professional 5 exam. This course is 60% lecture and 40% hands-on lab.
PREREQUISITES
Completion of one of the following courses:
- VMware vSphere v5.5: Install, Configure, Manage [H6D01S]
- VMware vSphere V5.5: Whats New [H6D00S]
- Equivalent knowledge and administration experience with ESXi and vCenter Server
Experience working at the command prompt is highly recommended.
AUDIENCE
- Experienced system administrators
- Systems engineers
- System integrators
COURSE OBJECTIVES
By the end of the course, you should be able to do the following:
- Configure and manage ESXi networking and storage for a large and sophisticated enterprise
- Manage changes to the vSphere environment
- Optimize the performance of all vSphere components
- Troubleshoot operational faults and identify their root causes
- Use VMware vSphere® ESXi™ Shell and VMware vSphere® Management Assistant to manage vSphere
- Use VMware vSphere® Auto Deploy™ to provision ESXi hosts
COURSE OUTLINE
Module 1: Course Introduction
- Introductions and course logistics
- Course objectives
Module 2: VMware Management Resources
- Deploy and configure vSphere Management Assistant
- Configure ESXi technical support mode and SSH access
- Use the esxcli, vicfg, and vmware-cmd commands
- Review ESXi and vCenter Server log files
Module 3: Performance in a Virtualized Environment
- Review the vSphere performance troubleshooting methodology
- Explain software and hardware virtualization techniques and their effects on performance
- Use vSphere performance monitoring tools
Module 4: Network Scalability
- Create, configure, and manage vSphere distributed switches
- Migrate virtual machines from standard switches to distributed switches
- Explain distributed switch features such as private VLANs, VMware vSphere® Network I/O Control, port mirroring, LACP, QoS tagging, and NetFlow
Module 5: Network Optimization
- Explain the performance features of network adapters
- Explain the performance features of vSphere networking
- Monitor key network performance metrics
- Use vSphere Management Assistant to manage virtual network configurations
- Troubleshoot common network performance problems
Module 6: Storage Scalability
- Explain vSphere storage APIs for array integration and storage awareness
- Configure and assign virtual machine storage policies
- Configure VMware vSphere® Storage DRS™ and VMware vSphere® Storage I/O Control
Module 7: Storage Optimization
- Diagnose storage access problems
- Explain how storage protocols, VMware vSphere® VMFS configuration, load balancing, and queuing affect performance
- Configure vSphere® Flash Read Cache™
- Monitor key storage performance metrics
- Use vSphere Management Assistant to manage virtual storage
- Troubleshoot common storage performance problems
Module 8: CPU Optimization
- Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance
- Monitor key CPU performance metrics
- Troubleshoot common CPU performance problems
Module 9: Memory Optimization
- Explain ballooning, memory compression, and host swapping techniques for memory reclamation when memory is overcommitted
- Monitor key memory performance metrics
- Troubleshoot common memory performance problems
Module 10: Virtual Machine and Cluster Optimization
- Describe performance guidelines for virtual machines, resource allocation settings, VMware vSphere® Distributed Resource Scheduler™ clusters, resource pools, and VMware vSphere® High Availability admission control policies
- Troubleshoot virtual machine power-on failures
- Troubleshoot vSphere cluster problems
Module 11: Host and Management Scalability
- Explain VMware vSphere® Distributed Power Management™
- Use Host Profiles to manage ESXi configuration compliance
- Use VMware vSphere® PowerCLI™ to perform vSphere administrative tasks
- Use Image Builder to create an ESXi installation image
- Use vSphere Auto Deploy to provision ESXi hosts
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
VMware vSphere: Advanced Fast Track

OVERVIEW
This fast-paced, extended-hour, lab-intensive course includes the content of the VMware vSphere: Manage for Performance and VMware vSphere: Troubleshooting courses. This course provides the knowledge and skills necessary to make fundamental design decisions that enhance performance and meet performance goals in a deployed VMware vSphere™ installation. This course also provides the knowledge, skills, and abilities to achieve competence in troubleshooting the vSphere virtual infrastructure.This course is 35% lecture, and 65% hands-on lab.
AUDIENCE
System administrators, systems engineers, consultants, or help desk personnel who need the knowledge, skills, and abilities to troubleshoot performance, configuration, or operational problems in vSphere deployments.
PREREQUISITES
COURSE OBJECTIVES
At the end of the course, you will be able to do the following:
- Use vSphere tools to monitor the performance of VMware ESX™/ESXi hosts
- Diagnose performance problems relating to CPU, memory, network, and storage on an ESX/ESXi host
- Apply guidelines for monitoring application performance
- Use the VMware vSphere Client and command-line utilities to diagnose and rectify ESX/ESXi, VMware vMotion™, VMware Storage vMotion, VMware High Availability, VMware Distributed Resource Scheduler, and virtual machine power-on problems
- Use ESXi technical support mode to diagnose and rectify problems on ESXi
- Create and use a network packet capture utility to capture and display virtual switch network traffic
DETAILED COURSE OUTLINE
Manage for Performance Modules
Module 1: Course Introduction
- Introductions and course logistics
- Course objectives
Module 2: Performance in a Virtualized Environment
- Discuss the vSphere performance troubleshooting methodology
- Discuss software and hardware virtualization techniques and their impact on performance
- Monitor performance using vCenter Server performance charts and the ESX/ESXi resxtop command
Module 3: CPU Performance
- Discuss the CPU scheduler and other features that have an impact on CPU performance
- Monitor key CPU performance metrics
- Troubleshoot common CPU performance problems
Module 4: Memory Performance
- Discuss memory reclamation techniques and memory overcommitment
- Monitor key memory performance metrics
- Troubleshoot common memory performance problems
Module 5: Guidelines for DRS and Resource Controls
- Discuss performance guidelines for DRS clusters, resource pools, and resource allocation settings
Module 6: Network Performance
- Discuss the performance features of modern network adapters
- Monitor key network performance metrics
- Troubleshoot common network performance problems
Module 7: Storage Performance
- Discuss how storage protocols, VMware vStorage VMFS configuration, load balancing, and queuing affect performance
- Monitor key storage performance metrics
- Troubleshoot common storage performance problems
Module 8: Virtual Machine Performance
- Discuss guidelines for configuring a virtual machine for optimal performance
Module 9: Application Performance
- Discuss tools and guidelines for application performance
Troubleshooting Modules
Module 1: Course Introduction
- Introductions and course logistics
- Course objectives
Module 2: ESXi Command-Line Troubleshooting Methods
- Install and use the VMware vSphere Management Assistant
- Learn common vSphere command-line interface commands and syntax
- Configure ESXi technical support mode and Secure Shell (SSH) access
Module 3: ESX, ESXi, and vCenter Server Log Files
- View ESX, ESXi, and vCenter Server log files
- Configure a centralized ESX/ESXi log host
Module 4: Network Troubleshooting
- Identify and configure vNetwork components
- Configure and use a network traffic packet capture utility
Module 5: Management Troubleshooting
- Troubleshoot vSphere management components
Module 6: Storage Troubleshooting
- View, configure, and diagnose storage access problems
- Configure iSCSI authentication and digests
Module 7: vMotion Troubleshooting
- Troubleshoot vMotion and Storage vMotion errors
Module 8: VMware Infrastructure Troubleshooting
- Troubleshoot DRS cluster errors with shares, pools, and limits
- Troubleshoot VMware HA cluster errors with slot calculations, admission control, and host monitoring
- Review virtual machine power on requirements
- Troubleshoot virtual machine power on failures
Module 9: vSphere 4 DRS Cluster Troubleshooting
- Complete a final multihour, multiproblem troubleshooting exercise
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
VMware vCloud: Architecting the VMware Cloud

COURSE OVERVIEW
This course is designed to guide students through the decision points and policy choices available for designing and implementing a VMware vCloud™ environment. Students will learn to appreciate the effects of design choices in VMware vSphere™, VMware vCloud Director, VMware vCenter™ Chargeback, and the VMware® vShield Edge capability that is included with vCloud Director. The course culminates in a comprehensive workshop on VMware cloud design. This course is 45% lecture, and 55% design lab.
PREREQUISITES
- Students must have VCP-level knowledge of vSphere
- They must also have general-purpose vSphere design experience, with special emphasis on networking and storage
- Exposure to the product features and functionality of vCloud Director, vSphere, vShield Edge, and vCenter Chargeback is required
AUDIENCE
Sales partners, customers, consultants, and sales engineers who are responsible for designing public and private cloud architectures with VMware products
COURSE OBJECTIVES
At the end of the course, you should have an understanding of the VMware cloud and be able to:
- Evaluate and design a multitenant environment to address both private cloud and public cloud customer needs
- Configure vCloud providers that can accommodate heterogeneous server, storage, and network resources
- Design a network infrastructure optimized for vCloud
- Integrate vCloud Director security with existing LDAP systems and design appropriate security hierarchies with security roles
- Design a vCenter Chargeback implementation
DESIGN LABS
The course is built on four design labs. In the final, 6-hour lab, students will design a complete vCloud architecture on either the service provider model or the private enterprise model.
- vCloud architecture network design lab
- vCloud architecture provider design lab
- vCloud architecture security design lab
- vCloud architecture design lab
COURSE OUTLINE
Module 1: Course Introduction
- Introductions and course logistics
- Course objectives
Module 2: VMware vCloud Director Architecture Review
- vCloud Director prerequisites
- Components of VMware cloud infrastructure
- Logical constructs in vCloud Director
- Cloud architecture fundamentals
Module 3: VMware vCloud Architecture Models
- Service provider (public cloud) model
- Enterprise (private cloud) model
- Hybrid model
- Management clusters and resource groups
- Load balancing
- Roles and communications in multicell architectures
Module 4: Designing Networks
- Types of vCloud Director networks
- vCloud Director Network Isolated networks
- vCloud Director network pools
- vCloud Director network management
- vCloud Director network security
Module 5: Designing Storage
- vCloud storage resources
- Storage tiering
- Segmenting storage based on speed
- Storage leases
- Catalog storage
- Thin provisioning
- VMware Storage vMotion
Module 6: Designing Providers
- Consumable resources
- Virtual datacenters
- Resource pools
- Organization and provider virtual datacenters
- Providers and networking
- Providers and storage
Module 7: Designing Organizations
- Organization creation and resource pools in the provider virtual datacenters
- Accessing multiple provider virtual datacenters from one organization
- Organization administrator rights and responsibilities
- vApps
- Catalogs
- Organization networks and external networks
Module 8: Designing Security
- Authentication and authorization
- Role-based access controls
- Organization administrators
- Organization security and LDAP integration
- Predefined roles
- Custom roles
Module 9: Designing Chargeback
- Modules of consumption
- vCenter Chargeback metrics
- vCenter Chargeback server configuration
- vCenter Chargeback data collectors
Module 10: VMware vCloud Architecture Design Review
- Multitenancy
- Network design
- Storage design
- Provider design
- Organization design
- Security design
- Chargeback design
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
VMware vCloud Director: Design Workshop [V9.x]
![VMware vCloud Director: Design Workshop [V9.x]](https://edu.erc.ua/wp-content/uploads/2019/11/wmvare.jpg)
Overview:
This four-day training course equips you with the knowledge, skills, and abilities to design a VMware vCloud Director® 9.x infrastructure.
You will follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security, and that uses VMware best practices.
A case study will guide you through the decision points and policy choices available for designing and implementing vCloud Director.
You will learn to appreciate the effects of design choices in VMware vSphere® 6.x, vCloud Director, VMware vCloud® Availability for vCloud Director®, VMware NSX®, and VMware vRealize® Business™ for Cloud, as well as the integration with other VMware and third-party products.
You will also learn about self-service provisioning, the effects of organizations, virtual data centers, catalog services, and on-demand NSX networks.
Product Alignment
- vCloud Director 9.x
- vSphere 6.x
- NSX 6.2 and later
Objectives:
By the end of the course, you should be able to meet the following objectives:
- Assess the business and application requirements of the current environment
- Apply a framework to a design
- Analyze design choices and best-practice recommendations
- Create a design that ensures availability, manageability, performance, recoverability, and security
- Design a vCloud Director environment
- Design vCloud Director organizations and vApps to satisfy business needs
- Design vCloud Director catalogs
- Design networking for organizations and vApps with the help of NSX
- Discuss customer onboarding scenarios with vCloud Director
Intended Audience:
Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in a service provider or managed services environment
Prerequisites:
Completion of the following course is required:
- VMware vCloud Director: Install, Configure, Manage or equivalent knowledge
Completion of the following courses is recommended:
- VMware NSX: Install, Configure, Manage
- VMware NSX: Design and Deploy
- VMware vSphere: Install, Configure, Manage
- VMware vSphere: Design Workshop
Outline:
1. Course Introduction
- Introductions and course logistics
- Course objectives
2. Design Principles and Process
- Follow a proven process to design and deploy a cloud solution
- Define customer business objectives
- Gather and analyze business and application requirements
- Document design requirements, constraints, assumptions, and risks
- Use a systematic method to evaluate and document design decisions
- Explain the differences between conceptual, logical, and physical designs
3. Service Definition and Standardization
- Describe the technical foundation of cloud computing
- Explain the deployment models of cloud computing
- Describe the essential characteristics of cloud computing
- Describe the fundamental service characteristics of a VMware vCloud® solution
- Explain IT service concepts
- Describe a structured service development process
- List the potential components of a service-level agreement
- Describe a service catalog offered within a vCloud Director platform
4. vCloud Director Architecture and Components
- Describe the vCloud Director architecture
- Define sites and availability zones
- Review the vCloud Director components and explain their functions
5. vCloud Director Virtual Data Center Design
- Describe the design of a provider virtual data center and its relationship to the underlying vSphere infrastructure
- Define organizations, organization virtual data centers, networks, storage, catalogs, and vApps
6. Cloud Management and Resource Components
- Identify the management components in a vCloud Director environment
- Describe the use of management cluster concepts
- Design the vSphere, NSX, and necessary storage infrastructure
- Define the resource cluster design and use cases
- Link definitions to requirements
7. vCloud Director Integrations
- Describe the integration with VMware vRealize® Orchestrator™, vRealize Business for Cloud, and VMware vRealize® Operations™
- Design integrations with third-party products
8. vCloud Availability for vCloud Director
- Describe the vCloud Availability for vCloud Director architecture
- List the prerequisites of vCloud Availability for vCloud Director
- Implement vCloud Availability for vCloud Director
9. Customer Onboarding
- Describe tenant layer 2 VPN access
- Describe tenant SSL VPN access
- Import existing VMware vCenter Server® managed infrastructure into vCloud Director
Formats: Classroom Length: 4 Days