This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
5V03622 NSX Security Specialist (5V0-36.22)
The VMware NSX Security Specialist (5V0-36.22) course teaches professionals how to design, implement, and manage security architectures, distributed firewalls, gateway protections, threat detection, and network detection response within NSX environments.
Who Should Take This
Network and security engineers with at least three years of experience in virtualization and NSX deployment benefit from this certification. It prepares them to evaluate security requirements, configure advanced firewall policies, and integrate NDR solutions, advancing their careers toward senior security architect roles.
What's Covered
1
Domain 1: Security Architecture
2
Domain 2: Distributed Firewall
3
Domain 3: Gateway Security
4
Domain 4: Threat Detection
5
Domain 5: NDR
6
Domain 6: Operations
7
Domain 7: Troubleshooting
What's Included in AccelaStudy® AI
Course Outline
70 learning goals
1
Domain 1: Security Architecture
2 topics
Zero-Trust Design
- Apply NSX zero-trust security architecture including micro-segmentation strategy and policy hierarchy configuration and operational procedures for enterprise VMware environments.
- Apply NSX zero-trust security architecture including micro-segmentation strategy and policy hierarchy best practices including deployment standards and integration with related components.
- Analyze NSX zero-trust security architecture including micro-segmentation strategy and policy hierarchy configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze NSX zero-trust security architecture including micro-segmentation strategy and policy hierarchy tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a NSX zero-trust security architecture including micro-segmentation strategy and policy hierarchy strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Defense-in-Depth
- Apply defense-in-depth implementation using DFW, Gateway Firewall, IDS/IPS, and NDR layers techniques for complex scenarios requiring multi-component coordination and integration.
- Apply defense-in-depth implementation using DFW, Gateway Firewall, IDS/IPS, and NDR layers integration with monitoring, automation, and third-party systems for unified management.
- Analyze defense-in-depth implementation using DFW, Gateway Firewall, IDS/IPS, and NDR layers failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of defense-in-depth implementation using DFW, Gateway Firewall, IDS/IPS, and NDR layers changes on dependent services and infrastructure stability.
- Design comprehensive defense-in-depth implementation using DFW, Gateway Firewall, IDS/IPS, and NDR layers procedures including automation, monitoring, escalation, and documentation.
2
Domain 2: Distributed Firewall
2 topics
Policy Management
- Apply DFW policy management including sections, rules, groups, and context profiles for L7 inspection configuration and operational procedures for enterprise VMware environments.
- Apply DFW policy management including sections, rules, groups, and context profiles for L7 inspection best practices including deployment standards and integration with related components.
- Analyze DFW policy management including sections, rules, groups, and context profiles for L7 inspection configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze DFW policy management including sections, rules, groups, and context profiles for L7 inspection tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a DFW policy management including sections, rules, groups, and context profiles for L7 inspection strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Dynamic Security
- Apply dynamic security group management with tags, criteria-based membership, and automated policy updates techniques for complex scenarios requiring multi-component coordination and integration.
- Apply dynamic security group management with tags, criteria-based membership, and automated policy updates integration with monitoring, automation, and third-party systems for unified management.
- Analyze dynamic security group management with tags, criteria-based membership, and automated policy updates failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of dynamic security group management with tags, criteria-based membership, and automated policy updates changes on dependent services and infrastructure stability.
- Design comprehensive dynamic security group management with tags, criteria-based membership, and automated policy updates procedures including automation, monitoring, escalation, and documentation.
3
Domain 3: Gateway Security
2 topics
Gateway Firewall
- Apply gateway firewall configuration for north-south perimeter security with stateful inspection configuration and operational procedures for enterprise VMware environments.
- Apply gateway firewall configuration for north-south perimeter security with stateful inspection best practices including deployment standards and integration with related components.
- Analyze gateway firewall configuration for north-south perimeter security with stateful inspection configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze gateway firewall configuration for north-south perimeter security with stateful inspection tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a gateway firewall configuration for north-south perimeter security with stateful inspection strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
URL and TLS
- Apply URL filtering and TLS inspection configuration for content-based security enforcement techniques for complex scenarios requiring multi-component coordination and integration.
- Apply URL filtering and TLS inspection configuration for content-based security enforcement integration with monitoring, automation, and third-party systems for unified management.
- Analyze URL filtering and TLS inspection configuration for content-based security enforcement failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of URL filtering and TLS inspection configuration for content-based security enforcement changes on dependent services and infrastructure stability.
- Design comprehensive URL filtering and TLS inspection configuration for content-based security enforcement procedures including automation, monitoring, escalation, and documentation.
4
Domain 4: Threat Detection
2 topics
IDS/IPS
- Apply distributed IDS/IPS configuration including signature profiles, exclusions, and alert management configuration and operational procedures for enterprise VMware environments.
- Apply distributed IDS/IPS configuration including signature profiles, exclusions, and alert management best practices including deployment standards and integration with related components.
- Analyze distributed IDS/IPS configuration including signature profiles, exclusions, and alert management configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze distributed IDS/IPS configuration including signature profiles, exclusions, and alert management tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a distributed IDS/IPS configuration including signature profiles, exclusions, and alert management strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Malware Prevention
- Apply malware prevention and sandboxing configuration for detecting zero-day threats in network traffic techniques for complex scenarios requiring multi-component coordination and integration.
- Apply malware prevention and sandboxing configuration for detecting zero-day threats in network traffic integration with monitoring, automation, and third-party systems for unified management.
- Analyze malware prevention and sandboxing configuration for detecting zero-day threats in network traffic failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of malware prevention and sandboxing configuration for detecting zero-day threats in network traffic changes on dependent services and infrastructure stability.
- Design comprehensive malware prevention and sandboxing configuration for detecting zero-day threats in network traffic procedures including automation, monitoring, escalation, and documentation.
5
Domain 5: NDR
2 topics
Network Detection
- Apply Network Detection and Response (NDR) configuration for anomaly detection and lateral movement identification configuration and operational procedures for enterprise VMware environments.
- Apply Network Detection and Response (NDR) configuration for anomaly detection and lateral movement identification best practices including deployment standards and integration with related components.
- Analyze Network Detection and Response (NDR) configuration for anomaly detection and lateral movement identification configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze Network Detection and Response (NDR) configuration for anomaly detection and lateral movement identification tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a Network Detection and Response (NDR) configuration for anomaly detection and lateral movement identification strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Threat Intelligence
- Apply threat intelligence feed integration and correlation with NSX security events techniques for complex scenarios requiring multi-component coordination and integration.
- Apply threat intelligence feed integration and correlation with NSX security events integration with monitoring, automation, and third-party systems for unified management.
- Analyze threat intelligence feed integration and correlation with NSX security events failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of threat intelligence feed integration and correlation with NSX security events changes on dependent services and infrastructure stability.
- Design comprehensive threat intelligence feed integration and correlation with NSX security events procedures including automation, monitoring, escalation, and documentation.
6
Domain 6: Operations
2 topics
Security Monitoring
- Apply NSX security monitoring with firewall logs, flow analysis, and security dashboards configuration and operational procedures for enterprise VMware environments.
- Apply NSX security monitoring with firewall logs, flow analysis, and security dashboards best practices including deployment standards and integration with related components.
- Analyze NSX security monitoring with firewall logs, flow analysis, and security dashboards configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze NSX security monitoring with firewall logs, flow analysis, and security dashboards tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a NSX security monitoring with firewall logs, flow analysis, and security dashboards strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Incident Response
- Apply security incident response procedures using NSX quarantine, policy override, and forensic capture techniques for complex scenarios requiring multi-component coordination and integration.
- Apply security incident response procedures using NSX quarantine, policy override, and forensic capture integration with monitoring, automation, and third-party systems for unified management.
- Analyze security incident response procedures using NSX quarantine, policy override, and forensic capture failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of security incident response procedures using NSX quarantine, policy override, and forensic capture changes on dependent services and infrastructure stability.
- Design comprehensive security incident response procedures using NSX quarantine, policy override, and forensic capture procedures including automation, monitoring, escalation, and documentation.
7
Domain 7: Troubleshooting
2 topics
Policy Issues
- Apply DFW policy troubleshooting for blocked traffic, rule ordering, and applied-to scope issues configuration and operational procedures for enterprise VMware environments.
- Apply DFW policy troubleshooting for blocked traffic, rule ordering, and applied-to scope issues best practices including deployment standards and integration with related components.
- Analyze DFW policy troubleshooting for blocked traffic, rule ordering, and applied-to scope issues configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze DFW policy troubleshooting for blocked traffic, rule ordering, and applied-to scope issues tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a DFW policy troubleshooting for blocked traffic, rule ordering, and applied-to scope issues strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Performance
- Apply NSX security performance troubleshooting for DFW throughput, IDS/IPS impact, and latency techniques for complex scenarios requiring multi-component coordination and integration.
- Apply NSX security performance troubleshooting for DFW throughput, IDS/IPS impact, and latency integration with monitoring, automation, and third-party systems for unified management.
- Analyze NSX security performance troubleshooting for DFW throughput, IDS/IPS impact, and latency failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of NSX security performance troubleshooting for DFW throughput, IDS/IPS impact, and latency changes on dependent services and infrastructure stability.
- Design comprehensive NSX security performance troubleshooting for DFW throughput, IDS/IPS impact, and latency procedures including automation, monitoring, escalation, and documentation.
Scope
Included Topics
- NSX security architecture, distributed firewall policies, gateway firewall, IDS/IPS, malware prevention, URL filtering, NDR, security operations, and zero-trust implementation.
- Enterprise-level VMware technology knowledge for VMware NSX Security Specialist.
Not Covered
- Implementation details beyond stated certification scope.
- Vendor-specific third-party configurations.
- Current pricing and partner program details.
Official Exam Page
Learn more at VMware/Broadcom
5V0-36.22 is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified