Free

Hyper-V

Microsoft Hyper-V is a technology that allows you to create virtual environments like operating systems, virtual servers, and virtual components like hard drives and network switches. In this Hyper-V training, you’ll learn how to build, configure, and understand virtual machines in both the server and client environments.

5
8
M
Time
beginner
difficulty
5
ceu/cpe

Course Content

3.1 Virtual Machine, Network, Hard Disk Creation Part 1

3m

Module 3: Virtual Machine, Network, Hard Disk Creation
2.1 Virtual Networking Part 1

3m

Module 2: Virtual Networking
1.1 Setting Up Hyper-V Part 1

4m

Module 1: Setting Up Hyper-V
4.1 Management and What Comes Next Part 1

5m

Module 4: Management and What Comes Next
3.2 Virtual Machine, Network, Hard Disk Creation Part 2

10m

Module 3: Virtual Machine, Network, Hard Disk Creation
1.2 Setting Up Hyper-V Part 2

7m

Module 1: Setting Up Hyper-V
2.2 Virtual Networking Part 2

15m

Module 2: Virtual Networking
4.2 Management and What Comes Next Part 2

4m

Module 4: Management and What Comes Next
3.3 Virtual Machine, Network, Hard Disk Creation Part 3

8m

Module 3: Virtual Machine, Network, Hard Disk Creation
1.3 Setting Up Hyper-V Part 3

10m

Module 1: Setting Up Hyper-V
2.3 Virtual Networking Part 3

5m

Module 2: Virtual Networking
4.3 Management and What Comes Next Part 3

5m

Module 4: Management and What Comes Next
3.4 Virtual Machine, Network, Hard Disk Creation Part 4

12m

Module 3: Virtual Machine, Network, Hard Disk Creation
2.4 Virtual Networking Part 4

4m

Module 2: Virtual Networking
1.4 Setting Up Hyper-V Part 4

10m

Module 1: Setting Up Hyper-V
4.4 Management and What Comes Next Part 4

8m

Module 4: Management and What Comes Next
3.5 Virtual Machine, Network, Hard Disk Creation Part 5

10m

Module 3: Virtual Machine, Network, Hard Disk Creation
2.5 Virtual Networking Part 5

3m

Module 2: Virtual Networking
1.5 Setting Up Hyper-V Part 5

7m

Module 1: Setting Up Hyper-V
4.5 Management and What Comes Next Part 5

7m

Module 4: Management and What Comes Next
3.6 Virtual Machine, Network, Hard Disk Creation Part 6

5m

Module 3: Virtual Machine, Network, Hard Disk Creation
2.6 Virtual Networking Part 6

1m

Module 2: Virtual Networking
1.6 Setting Up Hyper-V Part 6

10m

Module 1: Setting Up Hyper-V
4.6 Management and What Comes Next Part 6

10m

Module 4: Management and What Comes Next
3.7 Virtual Machine, Network, Hard Disk Creation Part 7

16m

Module 3: Virtual Machine, Network, Hard Disk Creation
Course Description

In our online Hyper-V training course, you will learn the fundamentals of Microsoft Hyper-V. You will gain the knowledge and skills to build, configure, and understand virtual machines in both the server and client environments.

What is Microsoft Hyper-V?

Microsoft Hyper-V is a technology that provides users with the ability to create virtual computer environments like operating systems and hardware components, like hard drives and network switches. Unlike other virtualization software, Hyper-V isn’t limited to users’ devices. It can also be used for server virtualization.

Hyper-V is available to users in three versions including Hyper-V for Windows Servers, Hyper-V Servers, and Hyper-V on Windows 10.

What Does This Hyper V Course Entail?

In our beginner-level Hyper-V online training class, you will learn the basics of Microsoft Hyper-V for both client and server environments. The topics that are included in the course include setting up Hyper-V; virtual networking; virtual machine, network, and hard disk creation; and management of Hyper-V and where to go from here. When you are finished with the course, you will possess the fundamental understanding required to build, configure, and understand virtual machines in these environments.

This Hyper-V training is 5 hours and 8 minutes of clock time for the included lessons. Upon finishing the course, you will have earned 5 CEU/CPE and you will receive a Certificate of Completion.

Why is Hyper-V Technology Important?

As technology grows at lightning speed, computers are faster, and the storage, CPU, and RAM count increase exponentially with each new generation, the idea of running multiple systems with multiple operating systems and providing multiple services, all from just one physical device, is a reality.

Additionally, as more services migrate to cloud infrastructures and numerous applications switch to service models, the demand for multiple servers has become a fairly antiquated deployment method – especially when paired with quicker multicore processors, RAM totals in the double or triple digits, and storage that has terabytes of data storage potential.

These newer servers can have the same resources available on production servers – but multiplied several times. These additional resources can handle the workload of most, if not all, of the physical servers from just one physical device.

What are the Benefits of Hyper-V?

The Hyper-V technology has a number of benefits. One of the biggest reasons that organizations utilize Hyper-V over other similar options, is because it’s cost-effective. The basic Hyper-V tools come free with an enterprise agreement, and other more advanced functions and licensing will cost, but the pricing of Hyper-V is still more economical than its competitors.

* It makes live migrations easier. With Hyper-V you are able to move running VMs from one host to another without experiencing any downtime.
* It integrates with other Microsoft products seamlessly. Organizations that are using Microsoft products already, will be able to adopt the Microsoft technology for their hypervisor without any glitches.


It supports multiple operating systems. Because Microsoft supports various operating Hyper-V systems (Linux included), you are not limited to only using its native operating system.

  • It has the capability to create a virtual switch at no extra charge. A virtual switch is an integral component of virtual networking, as it allows all VMs to communicate with one another. Virtual switches are intelligent, which means they inspect data packets prior to routing the information. That capability improves security within a virtual environment.
  • You can see why many organizations are using virtualization technology, and why they are using Hyper-V to do so. It’s a cost-effective choice that supports multiple operating systems and provides you with all the basic functionality you need.

    This course is part of a Career Path:
    Become a System Administrator
    The System Administrator Career Path is the perfect starting point for professionals with little background in IT or cybersecurity. Build your foundation of knowledge, skills, and abilities that will launch you into your next industry position.
    System Administrator Collection

    The System Administrator Collection helps build a foundation of knowledge and skills in understanding network devices and configurations, maintaining business systems, and leveraging security tools.

    Instructed by

    Instructor
    Christian D'Amico
    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Hyper-V Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.