Home > Blogs > VMware Education and Certification Blog

VCP7-CMA Exam Now Available

vmw-lgo-cert-pro-7-cld-mgmt-autoThe new VMware Certified Professional 7 – Cloud Management and Automation (VCP7-CMA) certification validates your skills in installing, configuring, and optimizing public, private, and hybrid clouds using the VMware vRealize Suite v7.x. This exam (#2V0-731) is now available for registration at Pearson Vue.

Thank you to everyone who assisted in the exam development process, including everyone who took the beta version of this exam. Those beta exam results should be released by the end of December.

Edited: 12/1/106 13:30

30+ Videos Added to VMware Learning Zone this Month!

SEM_Banner_LearningZone_440x230_V1The VMware Learning Zone video library added over 30 new videos last month, including an extensive collection on vSAN Troubleshooting. These videos are now fully available to all Premium and Standard subscribers to the VMware Learning Zone.

VMware vSAN Troubleshooting Series

  • Introduction: Introduces the series of bite sized videos that cover troubleshooting, design, requirements, compatibility, and upgrades.
  • Summary

VMware vSAN Compatibility Series

  • Introduction: introduces VMware vSAN Compatibility and overviews how the customer can be sure that the VMware vSAN environment is supportive.
  • VMware vSAN Hardware & Software Requirements: talks about the Hardware and Software requirements for the VMware vSAN 6.2 requirements
  • VMware vSAN Architectural Best Practices: focuses on best practices, including a whiteboard discussion on architecture, and key hardware and software affecting VMware vSAN performance
  • Is My SSD Supported in VMware vSAN?: discusses the process to check if a customer’s SSD is supported in a VMware vSAN cluster
  • Is My RAID Controller Supported?: discusses the process to check if a customer’s storage controller is supported with VMware vSAN

Storage Policies Series

  • Introduction: introduces Storage Policies for VMware vSAN
  • VMware vSAN Storage Policies In-Depth: explains how VMware vSAN Storage Policies will influence how a VMware vSAN cluster will perform
  • What Are Witnesses?: explains witnesses for VMware vSAN Storage Policies and its importance
  • Component States: explains component states for VMware vSAN Storage Policies and how failures are handled
  • Policy & Object States: explains Policy and Object states and what this means for customers that are running a VMware vSAN environment
  • Component Layout FTT1 SW1: explains how to draw out a Storage policy so you can understand what policies look like under the covers
  • Component Layout FTT1 SW2: shows how to draw a VMDK that has failures to tolerate of 1 and Stripe Width of 2
  • Component Layout FTT1 SW1 VMDK 400: looks at VMDK of 400gb in size that has FTT1 and SW1
  • FTT2 SW2 VMDK100: draws a VMDK of 100gb in size that has FTT2 and SW2
  • Summary

VMware vSAN Common Issues Series

  • The Upgrade Process: talks about the importance of the VMware vSAN upgrade process
  • Upgrade Best Practices: talks about best practices when performing upgrades in a VMware vSAN environment
  • Inaccessible Objects: talks about inaccessible objects in a VMware vSAN environment and what this means for customers
  • Creation, Modification of Disk Groups: talks about creation and modification of disk groups and the process to follow before removing the disk/disk groups
  • Capacity: talks about Capacity and how much free space is recommended in a VMware vSAN disk group
  • Summary

VMware vSAN Troubleshooting Tools Series

  • Part 1: covers VMware’s most useful troubleshooting tools for VMware vSAN-vSphere web client, esxcli and more.
  • Part 2: covers Ruby vSphere Console (RVC) and the commands to run to get output using RVC and more.

VMworld 2016 Series

  • Advanced Troubleshooting for NSX: walks you through the NSX Infrastructure communication, NSX Central CLI, Validating and Populating NSX Controller Tables
  • VMware Identity Manager: Application Management and Business Use Cases: walks you through the process to identify and define iAM and iDaas, IT outcomes and complimentary solutions provided by VMware as part of Identity Manager, the Saas and on-premises offerings of Identity Manager and discusses business use cases.
  • vRealize Automation: Abstracting the vSphere Endpoint as a Cloud Resource: covers the Cloud layers and Roles in vRealize Automation and different types of Reservation and Business groups.
  • Automating your Network Services Deployments with VMware NSX and vRealize Automation: discusses building your vRealize Automation blueprints with automated network services deployments from VMware NSX.

Meeting a vStorage SLA Series

  • Introduction: learn about the different modules of storage that will be covered in the vStorage SLA series.
  • Storage Concepts: learn about the importance of storage concepts and shared storage. The video talks about connections to storage from VMware’s perspective with Fibre channel, iSCSi and NFS.
  • vToolkit – VAAI: learn about VTOOLKIT- VAAI and the (vStorage API for Array Integration) API from VMware that offloads or enhances processes to the storage array.

Deploying a Multi-Tenant vRealize Automation 7 Solution Series

  • Part 2 of 13 – Technical Introduction, Lab Environment: introduces the lab environment, and discusses the purpose and functionality of the various roles.

VMware vSAN Software Components

  • This video talks about the importance of the VMware vSAN software components and what happens under the covers in a VMware vSAN cluster.

Claim your Free Trial Subscription to the VMware Learning Zone

Businessman Sitting At Desk In Office Working On Laptop

Want to get a preview of what’s available in the VMware Learning Zone before you commit to a full subscription? How about free training on the latest VMware technologies? If you answered yes, the new VMware Learning Zone Trial Subscription is just what you’ve been waiting for.

Here’s what you get with your free subscription:

  • 60 days of 24/7 access
  • Dozens of videos by our expert instructors
  • 40+ self-paced eLearning courses
  • Our entire catalog of recorded webcasts

Available topics cover the entire VMware product suite and range from help with troubleshooting VMware vSAN, to what’s new in vSphere 6.5, to understanding the fundamentals of VMware NSX.

Sign up today for your free 60-day trial subscription.

Celebrate Cyber Week with 25% Off Selected VMware Education Courses

us_cyber_edu_social_q4_2016_440x200_25discountIn this field, credibility is everything and certification sets you apart from your peers. From now until December 2nd 9pm Pacific time, you can purchase selected VMware training courses from the VMware online store and save 25%.

Once your purchase is completed on the VMware store, you will receive a token to enroll via MyLearn. Find out which courses are valid for this promotion.

What’s the Difference Between Network Virtualization & Software‐Defined Networking?

Free Network Virtualization for Dummies eBookSoftware-defined networking (SDN) and network virtualization are two of the hottest trends in the IT industry lately. But while they sound like similar concepts on the surface, in reality there are major differences.

According to Network Virtualization For Dummies by Mora Gozani:

_________________________________________________________________
Software‐defined networking allows you to control network switches and routers through software. It doesn’t virtualize all networking functions and components.

Network virtualization replicates all networking components and functions in software. It allows you to run the entire network in software.
_________________________________________________________________

Gozani goes on to explain that hardware remains the backbone of SDN, while management is centralized to allow control via software. But with network virtualization, the network resources are replicated by software, reducing the amount of physical configuration and reconfiguration required.

Gozani’s ebook also discusses several use cases for network virtualization around automation and security, as well as practical ideas on how to get started within an existing infrastructure. Download your free copy today.

Black Friday Exclusive Sale – Save Big on Selected VMware Education Courses

us_black_edu_social_q4_2016_440x200_25discount

From now until November 27th at 9pm Pacific time, selected VMware Education courses are available at a 25% discount on the VMware online store. Don’t miss this opportunity to build your knowledge and expertise with VMware Education courses.

Once your purchase is completed on the VMware store, you will receive a token to enroll via MyLearn. Find out which courses are valid for this promotion.

vSphere 6.5: Find Out What’s New On November 22 In Our Free Training Webcast

startup business, software developer working on computerLast month, we unveiled the latest version of our leading virtualization platform: vSphere 6.5. With increased simplicity and updates to security and our universal app platform, vSphere 6.5 is designed to help you address challenges of supporting existing and new apps and services, increasingly complex environments, and growing IT security threats. (Check out this vSphere blog post for a high-level overview of what’s new with vSphere 6.5.) Now it’s time for us to answer your questions!

Join Senior Education Product Manager, Andrew Ellwood, on Tuesday, November 22, at 8:00am PST / 11:00am EST (12:00pm GMT) for a free training webcast on vSphere 6.5. During the webcast, we’ll offer key insights into vSphere’s updated features and how they can help your organization realize the full benefits of a virtualized infrastructure. Additionally, we’ll touch on our new, instructor-led vSphere 6.5 course from VMware Education Services: What’s New [V5.5 to V6.5].

Register now for this exciting webcast and we look forward to seeing you there!

New Courses on vSphere 6.5, Cloud, NSX & More

NEW CoursesLast month the Education Services team opened registration for several new instructor-led training courses covering a broad range of topics. For more information on these courses use the links below or contact your local Learning Specialist.

vSphere

VMware vSphere: What’s New [V5.5 to V6.5] explores the new features and enhancements in VMware vCenter Server® 6.5 and VMware ESXi™ 6.5. Real-world use case deployment scenarios, hands-on lab exercises, and lectures will teach you the skills that you need to effectively implement and configure VMware vSphere® 6.5. Note: This course is based on beta software.

VMware vSphere: Install, Configure, Manage [V6.5] features intensive hands-on training on installing, configuring, and managing VMware vSphere® 6.5, which includes VMware ESXi™ 6.5 and VMware vCenter Server® 6.5. This course prepares you to administer a vSphere infrastructure for an organization of any size. Note: This course is based on beta software.

VMware vSphere: Optimize and Scale [V6.5] teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will configure and optimize the vSphere features that build a foundation for a truly scalable infrastructure, and you will discuss when and where these features have the greatest effect. Note: This course is based on beta software.

The intensive, extended-hours VMware vSphere: Install, Configure, Manage plus Virtual SAN Fast Track [V6] combines the content of our best-selling VMware vSphere: Install, Configure, Manage course with deploying and managing a software-defined storage solution with VMware Virtual SAN™ 6.2. You will learn how Virtual SAN functions as an important component in the VMware software-defined data center.

Cloud

VMware Cloud Automation: Design and Deploy [V7.1] focuses on designing and deploying an enterprise cloud by using a distributed architecture deployment of VMware vRealize® Automation™. The lecture and labs concentrate on designing an enterprise cloud architecture and the effective implementation of a vRealize Automation distributed deployment according to VMware recommended best practices.

Designed for service providers, VMware vCloud Director: Install, Configure, Manage [V8.10] focuses on self-service provisioning, the creation of organizations, virtual data centers, and catalog services that include predefined virtual machines, and on-demand VMware NSX® networks as well as the integrated use of VMware Virtual SAN™. This course also covers interfacing vCloud Director with other systems through the use of various APIs.

VMware Cloud Orchestration and Extensibility [V7] explores the use of VMware vRealize™ Orchestrator™ 7.1 and VMware vRealize Automation 7.1 for the automation of VMware cloud infrastructure and IT processes. This course focuses on extensibility and advanced administration through the use of vRealize Orchestrator workflows in vRealize Automation.

Horizon 7

VMware Horizon 7: Install, Configure, Manage plus App Volumes Fast Track [V7] gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will also learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale, managing application lifecycles from installation to update and replacement.

VMware NSX

VMware NSX: Install, Configure, Manage plus Troubleshooting & Operations Fast Track [V6.2] focuses on installing, configuring, and managing VMware NSX®. In addition, you will be presented with various types of technical problems which you will learn how to identify and solve through a systematic process. You will learn how to use logical switching, gateway services, firewall configurations, and security services to secure and optimize your environment.

Free Book Answers Your Top Application Delivery and Management Questions

app_dummiesAccording to Charles Barrett, Mark Ewert, and Ben Goodman, authors of the free ebook Applications for Dummies:

“Applications are some of the most expensive parts of any IT organization, and they have a profound impact on the performance of the business, either negatively or positively, depending on the way in which they have been implemented…Application delivery and management is a critical feature of any enterprise landscape and as organizations start to consume mobile, SaaS, and web apps along with traditional client server applications, identity management becomes as critical as the delivery mechanism…”

Download your copy to explore:

  • the history and future of applications: Where we’ve come from, and where we’re going.
  • the presentation of applications: How to deliver them.
  • application protocols: How to access what you need.
  • Security management: How to make and keep applications safe and secure to use.
  • end users: Who gets what, how they get them, and why.
  • access: How to access applications from various locations.
  • virtualization: Whether to virtualize applications or not and how.
  • licensing: The right blend of delivery methods.

Cyber Attacks, Data Security, and Employee Productivity: A Cybersecurity Podcast Series Recap

 

close-up of a tiger

In our recent podcast series, West Coghlan, senior editor for technology at the Economist Intelligence Unit (EIU), unpacked the findings of the 2016 EIU study, The Cyber-Chasm: How the Disconnect Between the C-suite and Security Endangers the Enterprise. The study surveyed 1,100 C-suite and senior technology executives at companies across the globe and sought both to uncover the cybersecurity challenges today’s enterprises face and to offer solutions for improving security measures going forward.

 

Each podcast took on one of the major findings from the EIU study. Use the links below to listen to the each episode.

 

The C-suite Underestimates the Impact of Cyber Attacks

 

One of the primary cybersecurity challenges facing enterprises today is a lack of consensus among technology leadership and C-suite leadership on the importance of cybersecurity. While senior technology leaders named security as the number one concern for the business, the C-suite ranked it as number seven on a list of eight key priorities. This disparity between technology and C-suite executives results in insufficient budget, personnel, and support from executive leadership, opening companies to vulnerabilities and attacks that have major consequences for the business as a whole. In order to maintain cybersecurity, it’s critical that technology leaders and the C-suite close this priority gap.

 

Protecting Your Brand from Cyber Attacks

 

When it comes to security, the C-suite agrees that the most important thing to protect is brand reputation. The modern threat landscape is populated by an increasingly sophisticated, well-funded legion of cybercriminals. Instead of cyber attacks focused on specific parts of the enterprise, cybercrime today examines all possible points of entry into a company. Cyberattackers quickly pivot through organizations to access vital transaction and CRM data and customer lists. Overnight, companies that have spent thirty years developing brand trust suddenly find their reputations in arrears. Protecting customer data from cybercriminals is essential to maintaining brand reputation.

 

Cyber Attacks, Data Security, and Employee Productivity

 

Security measures are often viewed as hindrances to employee productivity, especially in the eyes of the C-suite. And when company leadership doesn’t prioritize security, there’s a trickle-down effect that happens company-wide. If security programs are constructed in such a way that they decrease employee productivity and if there is a lack of emphasis on security at the C-level, employees will forgo security policies long before they will opt to decrease productivity. In order to defend against today’s sophisticated cyberattacks, three things are necessary:

 

  • CIOs and IT leaders need to mobilize, convince the C-suite and board of the importance of cybersecurity, and drive home the point that security is no longer just an IT issue — it’s an enterprise-wide issue.
  • Emphasis must be placed on developing a company culture of security. This means proper security protocol and compliance training for employees, customers, and vendors.
  • Prioritization is essential. Security experts agree that companies can’t defend everything. Security measures should focus on protecting customer lists, CRM, and transaction data.