VMware Certified Professional Data Center Virtualization on vSphere 6.7 Exam 2V0-21.19 Study Guide

فهرست مطالب کتاب VMware Certified Professional Data Center Virtualization:

Introduction

Assessment Test

Chapter 1 What’s New in vSphere 6.7

Chapter 2 Configuring and Administering Security in a vSphere Datacenter

Chapter 3 Networking in vSphere

Chapter 4 Storage in vSphere

Chapter 5 Upgrading a vSphere Deployment

Chapter 6 Allocating Resources in a vSphere Datacenter

Chapter 7 Backing Up and Recovering a vSphere Deployment

Chapter 8 Troubleshooting a vSphere Deployment

Chapter 9 Deploying and Customizing ESXi Hosts

Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA

Chapter 11 Administering and Managing vSphere Virtual Machines

Appendix Answers to Review Questions

Index

VMware Cloud Well-Architected Framework for VMware Cloud on AWS

فهرست مطالب کتاب VMware Cloud Well-Architected Framework:

1 Plan Pillar

2 Build Pillar

3 Modernize Pillar

4 Secure Pillar

5 Operate Pillar

VMware NSX Install, Configure, Manage [V4.0] Lab Manual

فهرست مطالب کتاب VMware NSX Install, Configure, Manage [V4.0] Lab Manual:

 Lab 1 – Reviewing the Lab Environment and Topologies

Lab 2 – Reviewing the Configuration of the Predeployed NSX Manager Instance

Lab 3 – (Simulation) Deploying a Three‑Node NSX Management Cluster

Lab 4 – Preparing the NSX Infrastructure

Lab 5 – Configuring Segments

Lab 6 – Deploying and Configuring NSX Edge Nodes

Lab 7 – Configuring the Tier‑1 Gateway

Lab 8 – Creating and Configuring a Tier‑0 Gateway with OSPF

Lab 9 – Configuring the Tier‑0 Gateway with BGP

Lab 10 – Configuring VRF Lite

Lab 11 – Configuring the NSX Distributed Firewall

Lab 12 – Configuring the NSX Gateway Firewall

Lab 13 – Configuring Distributed Intrusion Detection

Lab 14 – (Simulation) Deploying NSX Application Platform

Lab 15 – (Simulation) Configuring Malware Prevention for East‑West Traffic

Lab 16 – (Simulation) Using NSX Network Detection and Response to Detect Threats

Lab 17 – Configuring Network Address Translation

Lab 18 – Configuring NSX Advanced Load Balancer

Lab 19 – Deploying Virtual Private Networks

Lab 20 – Managing Users and Roles

VMware NSX Install, Configure, Manage [V4.0] Lecture Manual

فهرست مطالب کتاب VMware NSX Install, Configure, Manage [V4.0] Lecture Manual:

Module 1 – Course Introduction

Module 2 – VMware Virtual Cloud Network and VMware NSX

Module 3 – Preparing the NSX Infrastructure

Module 4 – NSX Logical Switching

Module 5 – NSX Logical Routing

Module 6 – NSX Logical Bridging

Module 7 – NSX Firewalls

Module 8 – NSX Advanced Threat Prevention

VMware SD-WAN Administration Guide (VMware SD-WAN 5.1)

فهرست مطالب VMware SD-WAN Administration Guide (VMware SD-WAN 5.1):

1 About VMware SD-WAN Administration Guide

2 What’s New

3 Overview

4 User Agreement

5 Log in to VMware Cloud Orchestrator Using SSO for Enterprise User

6 Monitor Enterprises

7 Monitor Enterprise using New Orchestrator UI

8 Configure Segments

9 Configure Segments with New Orchestrator UI

10 Configure Network Services

11 Configure Network Services with New Orchestrator UI

12 Configure Profiles

13 Configure Profiles with New Orchestrator UI

14 Configure a Profile Device

15 Configure Business Policy

16 Configure Business Policies with New Orchestrator UI

17 Firewall Overview

18 Provision an Edge

19 Access SD-WAN Edges Using Key-Based Authentication

20 Configure User Account details

21 View or Modify Edge Information

22 View Edge Information with New Orchestrator UI

23 Edge Device Configurations

24 Edge Software Image Management

25 SD-WAN Gateway Migration

26 Object Groups

27 Site Configurations

28 IPv6 Settings

29 Configure Dynamic Routing with OSPF or BGP

30 Configure Alerts

31 Configure Alerts and Notifications with New Orchestrator UI

32 Testing and Troubleshooting

33 Enterprise Administration

34 Edge Management with New Orchestrator UI

35 User Management – Enterprise

36 Configure High Availability on SD-WAN Edge

37 VMware Virtual Edge Deployment

38 Appendix

VMware VSphere Essentials A Practical Approach to VSphere Deployment and Management

فهرست مطالب کتاب VMware vSphere Essentials A Practical Approach to vSphere Deployment and Management:

Chapter 1: Understanding Virtualization

Chapter 2: VMware and vSphere Overview

Chapter 3: System Requirements and Licensing

Chapter 4: Deploying a vSphere Environment

Chapter 5: vSphere Networking

Chapter 6: vSphere Datastores

Chapter 7: Virtual Machines

Chapter 8: VMware vCenter

Chapter 9: vCenter Server Appliance Management Interface (VAMI)

Chapter 10: Datacenters and Clusters

Chapter 11: vCenter Datastores

Chapter 12: Managing Datastores

Chapter 13: vSphere Storage Policies and Encryption

Chapter 14: vSphere Distributed Switch

Chapter 15: Advanced Configuration with vSphere Distributed Switch

Chapter 16: Configuring LACP in vSphere Distributed Switch

Chapter 17: vSphere Advanced Features

Chapter 18: vSphere Cluster Services (vCLS)

Chapter 19: vSphere High Availability (HA)

Chapter 20: vSphere Proactive HA

Chapter 21: vSphere Fault Tolerance

Chapter 22: Virtual Machine Snapshots

Chapter 23: Enhanced vMotion Compatibility (EVC) Mode

Chapter 24: Host Profiles in vSphere

Chapter 25: VMware Hot Add and Hot Plug

Chapter 26: Direct Path I/O Passthrough

Chapter 27: Add a USB Device to vSphere

Chapter 28: How to Reset the vCenter Root Password

Chapter 29: vCenter Update/Upgrade

Chapter 30: vSphere Lifecycle Manager

Chapter 31: vSphere Backup and Disaster Recovery

Chapter 32: Other VMware Products

Chapter 33: VMware Certification Overview

Chapter 34: Embracing the Future of Virtualization with VMware vSphere

Web Applications and Data Servers

فهرست مطالب کتاب Web Applications and Data Servers:

Part I: Introduction to Computer Network Security

Computer Network Fundamentals

Computer Network Security Fundamentals

Part II: Security Issues and Challenges in the Traditional Computer Network

Security Motives and Threats to Computer Networks

Introduction to Computer Network Vulnerabilities

Cyber Crimes and Hackers

Scripting and Security in Computer Networks and Web Browsers

Security Assessment, Analysis, and Assurance

Part III: Dealing with Computer Network Security Challenges

Disaster Management

Access Control and Authorization

Authentication

Cryptography

Part III: Dealing with Computer Network Security Challenges

Firewalls

System Intrusion Detection and Prevention

Computer and Network Forensics

Virus and Content Filtering

Standardization and Security Criteria: Security Evaluation of Computer Products

Computer Network Security Protocols

Security in Wireless Networks and Devices

Security in Sensor Networks

Other Efforts to Secure Data in Computer Networks

Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems

Cloud Computing and Related Security Issues

Virtualization Security

Mobile Systems and Corresponding Intractable Security Issues

Part V: Securing the Last Frontiers – The Home Front

Conquering the Last Frontier in the Digital Invasion: The Home Front

Part VI: Hands-on Projects

Projects

Web Development Essentials Version 1.0 English

فهرست مطالب کتاب Web Development Essentials Version 1.0 English:

TOPIC 031: SOFTWARE DEVELOPMENT AND WEB TECHNOLOGIES

1 Software Development Basic

2 Web Application Architecture

3 HTTP Basics

TOPIC 032: HTML DOCUMENT MARKUP

1 HTML Document Anatomy

2 HTML Semantics and Document Hierarchy

3 HTML References and Embedded Resources

4 HTML Forms

TOPIC 033: CSS CONTENT STYLING

1 CSS Basics

2 CSS Selectors and Style Application

3 CSS Styling

4 CSS Box Model and Layout

TOPIC 034: JAVASCRIPT PROGRAMMING

1 JavaScript Execution and Syntax

2 JavaScript Data Structures

3 JavaScript Control Structures and Functions

4 JavaScript Manipulation of Website Content and Styling

TOPIC 035: NODEJS SERVER PROGRAMMING

1 NodeJS Basics

2 NodeJS Express Basics

3 SQL Basics

Why Startups Fail: And How Yours Can Succeed

فهرست مطالب کتاب Why Startups Fail: And How Yours Can Succeed:

About the Author

Introduction

Part I—Market, Product, and Entrepreneur

Chapter 1: Poor Product-Market Fit

Chapter 2: Bad Products

Chapter 3: The Missing Entrepreneur

Part II—Sales and Marketing

Chapter 4: Investing in Sales and Marketing Too Early

Chapter 5: Losing Money on Every Sale

Chapter 6: Invisible Startups

Part III—Execution

Chapter 7: Failing to Communicate

Chapter 8: Not Getting Started

Chapter 9: Failing to Execute

Part IV—Capital and Liquidity

Chapter 10: Pitches That Fail

Chapter 11: Managing Liquidity

Chapter 12: From Failure, Success

Index

Windows Forensic Analysis DVD Toolkit

فهرست مطالب کتاب Windows Forensic Analysis DVD Toolkit:

Preface

Chapter 1 Live Response: Collecting Volatile Data

Chapter 2 Live Response: Data Analysis

Chapter 3 Windows Memory Analysis

Chapter 4 Registry Analysis

Chapter 5 File Analysis

Chapter 6 Executable File Analysis

Chapter 7 Rootkits and Rootkit Detection

Index

Windows Networking Troubleshooting

فهرست مطالب:

About the Authors

About the Technical Reviewer

Windows Troubleshooting Series

Chapter 1: Understanding Networks 1 Chapter 2: Managing Network Connections

Chapter 3: TCP/IP Networking

Chapter 4: What Causes Networking Problems

Chapter 5: Troubleshooting Networking 83 Chapter 6: Networking in a Virtual World

Chapter 7: Troubleshooting Mobile Worker and BYOD Networking Problems

Index

Windows Security Internals with PowerShell

فهرست مطالب کتاب Windows Security Internals with PowerShell:

Introduction

Chapter 1: Setting Up a PowerShell Testing Environment

PART I: An Overview of the Windows Operating System

Chapter 2: The Windows Kernel

Chapter 3: User-Mode Applications

PART II: The Windows Security Reference Monitor

Chapter 4: Security Access Tokens

Chapter 5: Security Descriptors

Chapter 6: Reading and Assigning Security Descriptors

Chapter 7: Access Checking

Chapter 8: Other Access Checking Use Cases

Chapter 9: Security Auditing

PART III: The Local Security Authority and Authentication

Chapter 10: Local Authentication

Chapter 11: Active Directory

Chapter 12: Interactive Authentication

Chapter 13: Network Authentication

Chapter 14: Kerberos Authentication

Chapter 15: Negotiate Authentication and Other Security Packages

Appendix A: Building a Windows Domain Network for Testing

Appendix B: SDDL SID Constants