VMware Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 Study Guide
فهرست مطالب کتاب VMware Certified Professional Data Center Virtualization:
Introduction
Assessment Test
Chapter 1 What’s New in vSphere 6.7
Chapter 2 Configuring and Administering Security in a vSphere Datacenter
Chapter 3 Networking in vSphere
Chapter 4 Storage in vSphere
Chapter 5 Upgrading a vSphere Deployment
Chapter 6 Allocating Resources in a vSphere Datacenter
Chapter 7 Backing Up and Recovering a vSphere Deployment
Chapter 8 Troubleshooting a vSphere Deployment
Chapter 9 Deploying and Customizing ESXi Hosts
Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA
Chapter 11 Administering and Managing vSphere Virtual Machines
Appendix Answers to Review Questions
Index
VMware Cloud Well-Architected Framework for VMware Cloud on AWS
فهرست مطالب کتاب VMware Cloud Well-Architected Framework:
1 Plan Pillar
2 Build Pillar
3 Modernize Pillar
4 Secure Pillar
5 Operate Pillar
VMware NSX Install, Configure, Manage [V4.0] Lab Manual
فهرست مطالب کتاب VMware NSX Install, Configure, Manage [V4.0] Lab Manual:
Lab 1 – Reviewing the Lab Environment and Topologies
Lab 2 – Reviewing the Configuration of the Predeployed NSX Manager Instance
Lab 3 – (Simulation) Deploying a Three‑Node NSX Management Cluster
Lab 4 – Preparing the NSX Infrastructure
Lab 5 – Configuring Segments
Lab 6 – Deploying and Configuring NSX Edge Nodes
Lab 7 – Configuring the Tier‑1 Gateway
Lab 8 – Creating and Configuring a Tier‑0 Gateway with OSPF
Lab 9 – Configuring the Tier‑0 Gateway with BGP
Lab 10 – Configuring VRF Lite
Lab 11 – Configuring the NSX Distributed Firewall
Lab 12 – Configuring the NSX Gateway Firewall
Lab 13 – Configuring Distributed Intrusion Detection
Lab 14 – (Simulation) Deploying NSX Application Platform
Lab 15 – (Simulation) Configuring Malware Prevention for East‑West Traffic
Lab 16 – (Simulation) Using NSX Network Detection and Response to Detect Threats
Lab 17 – Configuring Network Address Translation
Lab 18 – Configuring NSX Advanced Load Balancer
Lab 19 – Deploying Virtual Private Networks
Lab 20 – Managing Users and Roles
VMware NSX Install, Configure, Manage [V4.0] Lecture Manual
فهرست مطالب کتاب VMware NSX Install, Configure, Manage [V4.0] Lecture Manual:
Module 1 – Course Introduction
Module 2 – VMware Virtual Cloud Network and VMware NSX
Module 3 – Preparing the NSX Infrastructure
Module 4 – NSX Logical Switching
Module 5 – NSX Logical Routing
Module 6 – NSX Logical Bridging
Module 7 – NSX Firewalls
Module 8 – NSX Advanced Threat Prevention
VMware SD-WAN Administration Guide (VMware SD-WAN 5.1)
فهرست مطالب VMware SD-WAN Administration Guide (VMware SD-WAN 5.1):
1 About VMware SD-WAN Administration Guide
2 What’s New
3 Overview
4 User Agreement
5 Log in to VMware Cloud Orchestrator Using SSO for Enterprise User
6 Monitor Enterprises
7 Monitor Enterprise using New Orchestrator UI
8 Configure Segments
9 Configure Segments with New Orchestrator UI
10 Configure Network Services
11 Configure Network Services with New Orchestrator UI
12 Configure Profiles
13 Configure Profiles with New Orchestrator UI
14 Configure a Profile Device
15 Configure Business Policy
16 Configure Business Policies with New Orchestrator UI
17 Firewall Overview
18 Provision an Edge
19 Access SD-WAN Edges Using Key-Based Authentication
20 Configure User Account details
21 View or Modify Edge Information
22 View Edge Information with New Orchestrator UI
23 Edge Device Configurations
24 Edge Software Image Management
25 SD-WAN Gateway Migration
26 Object Groups
27 Site Configurations
28 IPv6 Settings
29 Configure Dynamic Routing with OSPF or BGP
30 Configure Alerts
31 Configure Alerts and Notifications with New Orchestrator UI
32 Testing and Troubleshooting
33 Enterprise Administration
34 Edge Management with New Orchestrator UI
35 User Management – Enterprise
36 Configure High Availability on SD-WAN Edge
37 VMware Virtual Edge Deployment
38 Appendix
VMware VSphere Essentials A Practical Approach to VSphere Deployment and Management
فهرست مطالب کتاب VMware vSphere Essentials A Practical Approach to vSphere Deployment and Management:
Chapter 1: Understanding Virtualization
Chapter 2: VMware and vSphere Overview
Chapter 3: System Requirements and Licensing
Chapter 4: Deploying a vSphere Environment
Chapter 5: vSphere Networking
Chapter 6: vSphere Datastores
Chapter 7: Virtual Machines
Chapter 8: VMware vCenter
Chapter 9: vCenter Server Appliance Management Interface (VAMI)
Chapter 10: Datacenters and Clusters
Chapter 11: vCenter Datastores
Chapter 12: Managing Datastores
Chapter 13: vSphere Storage Policies and Encryption
Chapter 14: vSphere Distributed Switch
Chapter 15: Advanced Configuration with vSphere Distributed Switch
Chapter 16: Configuring LACP in vSphere Distributed Switch
Chapter 17: vSphere Advanced Features
Chapter 18: vSphere Cluster Services (vCLS)
Chapter 19: vSphere High Availability (HA)
Chapter 20: vSphere Proactive HA
Chapter 21: vSphere Fault Tolerance
Chapter 22: Virtual Machine Snapshots
Chapter 23: Enhanced vMotion Compatibility (EVC) Mode
Chapter 24: Host Profiles in vSphere
Chapter 25: VMware Hot Add and Hot Plug
Chapter 26: Direct Path I/O Passthrough
Chapter 27: Add a USB Device to vSphere
Chapter 28: How to Reset the vCenter Root Password
Chapter 29: vCenter Update/Upgrade
Chapter 30: vSphere Lifecycle Manager
Chapter 31: vSphere Backup and Disaster Recovery
Chapter 32: Other VMware Products
Chapter 33: VMware Certification Overview
Chapter 34: Embracing the Future of Virtualization with VMware vSphere
Web Applications and Data Servers
فهرست مطالب کتاب Web Applications and Data Servers:
Part I: Introduction to Computer Network Security
Computer Network Fundamentals
Computer Network Security Fundamentals
Part II: Security Issues and Challenges in the Traditional Computer Network
Security Motives and Threats to Computer Networks
Introduction to Computer Network Vulnerabilities
Cyber Crimes and Hackers
Scripting and Security in Computer Networks and Web Browsers
Security Assessment, Analysis, and Assurance
Part III: Dealing with Computer Network Security Challenges
Disaster Management
Access Control and Authorization
Authentication
Cryptography
Part III: Dealing with Computer Network Security Challenges
Firewalls
System Intrusion Detection and Prevention
Computer and Network Forensics
Virus and Content Filtering
Standardization and Security Criteria: Security Evaluation of Computer Products
Computer Network Security Protocols
Security in Wireless Networks and Devices
Security in Sensor Networks
Other Efforts to Secure Data in Computer Networks
Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems
Cloud Computing and Related Security Issues
Virtualization Security
Mobile Systems and Corresponding Intractable Security Issues
Part V: Securing the Last Frontiers – The Home Front
Conquering the Last Frontier in the Digital Invasion: The Home Front
Part VI: Hands-on Projects
Projects
Web Development Essentials Version 1.0 English
فهرست مطالب کتاب Web Development Essentials Version 1.0 English:
TOPIC 031: SOFTWARE DEVELOPMENT AND WEB TECHNOLOGIES
1 Software Development Basic
2 Web Application Architecture
3 HTTP Basics
TOPIC 032: HTML DOCUMENT MARKUP
1 HTML Document Anatomy
2 HTML Semantics and Document Hierarchy
3 HTML References and Embedded Resources
4 HTML Forms
TOPIC 033: CSS CONTENT STYLING
1 CSS Basics
2 CSS Selectors and Style Application
3 CSS Styling
4 CSS Box Model and Layout
TOPIC 034: JAVASCRIPT PROGRAMMING
1 JavaScript Execution and Syntax
2 JavaScript Data Structures
3 JavaScript Control Structures and Functions
4 JavaScript Manipulation of Website Content and Styling
TOPIC 035: NODEJS SERVER PROGRAMMING
1 NodeJS Basics
2 NodeJS Express Basics
3 SQL Basics
Why Startups Fail: And How Yours Can Succeed
فهرست مطالب کتاب Why Startups Fail: And How Yours Can Succeed:
About the Author
Introduction
Part I—Market, Product, and Entrepreneur
Chapter 1: Poor Product-Market Fit
Chapter 2: Bad Products
Chapter 3: The Missing Entrepreneur
Part II—Sales and Marketing
Chapter 4: Investing in Sales and Marketing Too Early
Chapter 5: Losing Money on Every Sale
Chapter 6: Invisible Startups
Part III—Execution
Chapter 7: Failing to Communicate
Chapter 8: Not Getting Started
Chapter 9: Failing to Execute
Part IV—Capital and Liquidity
Chapter 10: Pitches That Fail
Chapter 11: Managing Liquidity
Chapter 12: From Failure, Success
Index
Windows Forensic Analysis DVD Toolkit
فهرست مطالب کتاب Windows Forensic Analysis DVD Toolkit:
Preface
Chapter 1 Live Response: Collecting Volatile Data
Chapter 2 Live Response: Data Analysis
Chapter 3 Windows Memory Analysis
Chapter 4 Registry Analysis
Chapter 5 File Analysis
Chapter 6 Executable File Analysis
Chapter 7 Rootkits and Rootkit Detection
Index
Windows Networking Troubleshooting
فهرست مطالب:
About the Authors
About the Technical Reviewer
Windows Troubleshooting Series
Chapter 1: Understanding Networks 1 Chapter 2: Managing Network Connections
Chapter 3: TCP/IP Networking
Chapter 4: What Causes Networking Problems
Chapter 5: Troubleshooting Networking 83 Chapter 6: Networking in a Virtual World
Chapter 7: Troubleshooting Mobile Worker and BYOD Networking Problems
Index
Windows Security Internals with PowerShell
فهرست مطالب کتاب Windows Security Internals with PowerShell:
Introduction
Chapter 1: Setting Up a PowerShell Testing Environment
PART I: An Overview of the Windows Operating System
Chapter 2: The Windows Kernel
Chapter 3: User-Mode Applications
PART II: The Windows Security Reference Monitor
Chapter 4: Security Access Tokens
Chapter 5: Security Descriptors
Chapter 6: Reading and Assigning Security Descriptors
Chapter 7: Access Checking
Chapter 8: Other Access Checking Use Cases
Chapter 9: Security Auditing
PART III: The Local Security Authority and Authentication
Chapter 10: Local Authentication
Chapter 11: Active Directory
Chapter 12: Interactive Authentication
Chapter 13: Network Authentication
Chapter 14: Kerberos Authentication
Chapter 15: Negotiate Authentication and Other Security Packages
Appendix A: Building a Windows Domain Network for Testing
Appendix B: SDDL SID Constants