Published: 22 January 2015
Comparing Microsoft and VMware virtualisation solutions can sometimes seem a bit like comparing apples and oranges, especially with so many features called by differing names in each virtualisation platform. In this short course, you will get an introduction to the feature sets provided by the latest releases of Hyper V & VMware, learn how to implement them, and then take a look at the pros and cons of each.
The short course will run over 5 weeks in February and March 2015 with lectures being delivered via weekly after hours Webinars. Recordings of the Webinars will be available for those unable to attend the live events. In-between the Webinars, you will be asked to complete extra study and reading.
The course is free to undertake.
Enter your details below to register:
(Recordings of the Webinars will be available if you are unable to make the live event)
Week 1: 4th-10th February
|Introduction to Virtualisation
Webinar: 8:00 – 9:30pm, Wednesday 4th February AEDT (Australian Eastern Daylight Time UTC +11)
Week 2: 11th-17th February
Webinar: 8:00 – 9:30pm, Wednesday 11th February AEDT (Australian Eastern Daylight Time UTC +11)
Week 3: 18th-24th Feburary
Webinar: 8:00 – 9:30pm, Wednesday 18th February AEDT (Australian Eastern Daylight Time UTC +11)
Week 4: 25th February-3rd March
|Hyper-V or VMware?
Webinar: 8:00 – 9:30pm, Wednesday 25th February AEDT (Australian Eastern Daylight Time UTC +11)
Week 5: 4th-11th March
Course Information Q&A
Question 1: What is the aim of this short course?
The aim of the short course is to give you a ‘taster’ of what it is like to undertake postgraduate study via Distance Education with Charles Sturt University.
Question 2: Who will present the webinars?
The Webinars will be be presented by one of the world’s most popular & motivational Cyber Security presenters – Erdal Ozkaya. Erdal’s awards include:
2014: VMware Certified Professional (VCP) certification
2012: Microsoft Most Valuable Professional – Windows Expert : IT Pro
2012: EC-Council Roll of Honour CEH, CHFI, ENSA, ECSA
2012: EC-Council (Global) Instructor of the year (Circle of Excellence) -Partner of the year
2013: Microsoft Most Valuable Professional – Windows Expert : IT Pro
Question 3: Is there a final exam?
Yes – week 5 is exam week. The exam will be a timed, open book exam that you will sit at your computer. Those who pass our exam will receive a certificate of achievement for the short course, from IT Masters and Charles Sturt University.
Question 4: Do I get a certificate if I complete the course?
Students who pass the exam during the examination week will receive a certificate of achievement.
Question 5: Will the course qualify me for university credit?
Completion of the course will not qualify for credit. However this short course does help prepare you for our subject ITE523 Virtualisation which is included in the Master of Management (IT) and Master of Networking and Systems Administration courses.
Question 6: Will I need to purchase any study materials to complete the course?
No – all materials will be supplied to you.
Question 7: Will the sessions be recorded, posted and accessible later if I was unable to attend a lecture?
Yes – the sessions will be recorded and you will be able to access them if you miss the live event.
Did you ever wanted to become an Ethical ...
This short course is designed to partially ...
Penetration Testing Framework 0.58 This post ...
If you are trying to use the ...
Speakers: Alan Burchill, Jeremy Moskowitz, ...
Since I have starterd to work for Kemp ...
Did you miss the life sessions for EC Council ...
Microsoft Egypt is Hiring ! If you are based in ...
Articles Most Read
- Certified Ethical Hacking course for FREE
- Free Course :EC Council Network Security Administrator
- Penetration Testing Framework 0.58
- Fix: Couldn’t connect to the source mailbox
- Desktop Security with Windows 7 Applocker, Bitlocker, Forefront End Point Protection
- NLB vs Hardware Load Balancer
- EC Council ENSA Online Course
- Microsoft Egypt is Hiring
- Fix: Exchange Server 2010 SP update errors
- E-Mail Crimes and Violations (how the leakage could occur)