welcome-vmware-certified-design-expert-6-network-virtualization-vcdx6-nv-certification

Welcome VMware Certified Design Expert 6 – Network Virtualization (VCDX6-NV) Certification

  • By
  • October 10, 2017
0 Comment

NV

VMware Certified Design Expert (VCDX) is the highest level of VMware certification. This elite group of VCDX professionals consists of design architects highly-skilled in VMware enterprise deployments.

Earning the new VMware Certified Design Expert v6 – Network Virtualization (VCDX6-NV) certification will confirm candidate’s world-class vSphere and NSX 6.x skills and prove individual can deliver true business value through designing a VMware NSX®-platform-based data center networking infrastructure that meets customer objectives and constraints.

For the next application deadline of September 22, 2017, candidates may submit for either the VCDX6-NV or for the previous version of VCDX-NV.

New Candidate Requirements

VCDX6-NV Certification Requirements

Path 1: If you hold a valid VCAP6-NV Deploy or VCIX6-NV:

1: Review and understand the blueprint.

2: Select and build a design, based on the guidance in the blueprint.

3: Submit design application and code of conduct.

4: Pass the application and design review.

5: Successfully defend the design against three panelists.

Existing Candidate Requirements

VCDX6-NV Certification Requirements

Path 1: If you hold VCDX-NV (the previous version):

1: VCAP6-NV Deploy certification.

Path 2: If you hold a VCDX in a track other than NV:

1: VCAP6-NV Deploy certification.

2: Review and understand the blueprint.

3: Select and build a design, based on the guidance in the blueprint.

4: Submit design application and code of conduct.

5: Pass the application and design review.

6: Successfully defend the design in a one-hour phone interview.

Resources:

You can also check out the VMware section at ExamCollection.

Comments
* The most recent comment are at the top

Interesting posts

CompTIA CYSA+ CS0-002 – Enumeration Tools Part 1

1. Enumeration Tools (OBJ 1.4) Enumeration tools. In this lesson, we’re going to talk about some of the enumeration tools that we’re going to experience as we’re trying to enumerate our networks. Now, what exactly is enumeration? Well, enumeration is the process to identify and scan network ranges and hosts that belong to the target… Read More »

CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 3

6. Scheduling and Constraints (OBJ 1.3) Scheduling and constraints. In this lesson, we’re going to talk about scheduling and constraints. So the first question I have for you is, how often should you scan? Well, this is going to be determined based on your internal risk management decisions of your organization. If you have a… Read More »

CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 2

4. Scanner Types (OBJ 1.3) Scanner types. In this lesson, we’re going to talk about the different ways you can configure your scanner. Now, different scanners have different capabilities. Some are going to be passive, some are going to be active, and some are going to be active with particular configurations that we’re going to… Read More »

CompTIA CYSA+ CS0-002 – Vulnerability Scanning Part 1

1. Identifying Vulnerabilities (OBJ 1.3) Identifying vulnerabilities. In this lesson, we’re going to talk about the importance of identifying vulnerabilities. And the way we do this is through a vulnerability assessment. Now, it is really important to identify vulnerabilities so that you can then mitigate those vulnerabilities. Remember, every vulnerability in your system represents a… Read More »

CompTIA CYSA+ CS0-002 – Mitigating Vulnerabilities Part 2

4. Hardening and Patching (OBJ 1.3) Hardening and patching. In this lesson we’re going to talk about two key terms. And I know I’ve used these words before, but we’ve never really defined them. These are hardening and patching. Now, when I talk about system hardening, this is the process by which a host or… Read More »

CompTIA CYSA+ CS0-002 – Mitigating Vulnerabilities Part 1

1. Mitigating Vulnerabilities (Introduction) In this section of the course, we’re going to cover how to analyze output from vulnerability scanners. We’re going to stay in domain one in this section of the course, but we are going to cover multiple objectives this time, including objective 1213 and one four. Now, objective one two states… Read More »

img