Meet Our Experts

Tim Pierson

Tim one of the World’s leading trainers in technology,
networks, virtualization and, applications. He has been a technical trainer and consultant for security and virtualization for the past 25 years. He has 29 industry technical certifications from CISCO, Microsoft and Novell. Tim has been a noted speaker at many industry events such as Infosec World 2010, Innatech and GISSA. He is a contributing author of VMware vSphere and Virtual Infrastructure Security Securing ESX in the Virtual Environment.


Courses

Certified Virtualization Security Expert, Part 6 of 6: Hardening and Third Party Tools

This course finishes out the series by taking a look at the differences between ESX and ESXi. It discusses Root privileges, controlled access, and securing SNMP configuration. This course discusses how to audit or disable tech support mode and prov...

VMware

Certified Virtualization Security Expert, Part 4 of 6: PenTest Tools and DMZ

What are the tools of a penetration test? This course will answer that as well as cover vulnerability assessment, password cracking, how to disable auditing, rootkits and alternate data streams. Then it progress to three configurations of DMZs, ha...

VMware


Certified Virtualization Security Expert, Part 5 of 6: Hardening the Server

This course is about the hardening techniques of the ESX server. It will cover best practices, isolation, and how templates can be used effectively. It will also cover VM segmentation, limiting data flow, the setinfo hazard, directory services cont...

VMware

Certified Virtualization Security Expert, Part 3 of 6: Penetration Testing 101

To be secure you have to think like a hacker. This course covers penetration testing, how much hacks cost, evolving threats, information gathering, scanning, enumeration and finishes with tools that hackers and you can utilize to gather information....

VMware


Certified Virtualization Security Expert, Part 2 of 6: Routing and Security

This course takes a look at how traffic routs and from the perspective of the hacker and how to manipulate or inspect and change it. It then moves into VM's and ESX hosts on both the same switches or port groups. Then SAN security with both fiber c...

VMware

Certified Virtualization Security Expert, Part 1 of 6: Reaffirming Knowledge

This course will start by taking a look at virtual components, ESX networking components, switches, vswitch and physical switch. It will then discuss spanning tree protool, vswitch isolation, virtual ports, vlans, load balancing, failover configurat...

VMware




Explore Our Blogs, Courses and Webinars