In this episode Wes and Don introduces the viewers to the VMware vSphere suite. They explain difference between Type 1, Type 2 hypervisors and the pros and cons of each. They discusses the multiple editions of vSphere.
Kali Linux is a powerful Linux based operating system specifically built for penetration testing. Viewers will hear a brief overview of the operating system and what kinds of things it can be useful for.
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.