Associate VMware Security
- Description
- Curriculum
- Reviews

The VMware Certified Technical Associate – Security 2024 (VCTA-SEC 2024) certification validates an individual’s foundational knowledge and skills in endpoint security and with VMware Carbon Black Cloud. This certification is intended for entry-level professionals who are interested in working with security technologies. Job-roles associated with this certification include entry-level security administrators and technicians.
Exam Details (Last Updated: 8/15/2022)
The VMware Security Technical Associate exam (1V0-91.22) which leads to VMware Certified Technical Associate – Security 2024 (VCTA-SEC 2024) certification is a 50-item exam, with a passing score of 300 using a scaled method. Candidates are given an appointment time of 120 minutes, which includes adequate time to complete the exam for non-native English speakers. This exam may contain a variety of item types including multiple-choice, multiple-selection multiple-choice, matching, drag-and-drop, and hot area. Additional item types may be used but will appear less frequently than those previously mentioned.
Exam Delivery
This is a proctored exam delivered through Pearson VUE. For more information, visit the Pearson VUE website.
Certification Information
For details and a complete list of requirements and recommendations for attainment, please reference the VMware Learning Services – Certification website.
Minimally Qualified Candidate
The candidate can describe and explain endpoint security concepts and can explain VMware Carbon Black Cloud components, features, and capabilities, but occasionally needs to research topics. The candidate can clearly perform navigation of the VMware Carbon Black Cloud user interface and make configuration changes, but occasionally needs to research topics. The candidate occasionally requires assistance or supervision with security related tasks. The candidate occasionally needs to research security related topics. The candidate possesses most, but perhaps not all the knowledge shown in the exam sections (blueprint).
-
1Define the term cybersecurity
-
2Identify types of cybersecurity vulnerabilities
-
3Recognize attack mitigation strategies
-
4Describe the stages of an attack from the point of view of the attacker
-
5Identify different types of cybersecurity attacks
-
6Identify examples of behaviors associated with security tactics, techniques, and procedures
-
7Identify examples of indicators of compromise
-
8Identify the pillars of a zero-trust approach to security
-
9Describe a defense-in-depth security approach
-
10Identify the functions of basic security controls
-
11Distinguish between antivirus and next-generation antivirus solutions
-
12Explain the purpose of a watchlist
-
13Recognize the central concepts in the intrinsic approach to security developed by VMware
-
14Identify the control points in the VMware approach to security
-
15Recognize VMware products that support the implementation of a zero-trust approach to security
-
16Identify features of VMware Carbon Black Cloud solutions
-
17Identify the priority of different reputations in VMware Carbon Black Cloud
-
18Recognize when and how to assign reputations in VMware Carbon Black Cloud
-
19Identify use cases for Carbon Black Cloud Endpoint Standard
-
20Identify use cases for Carbon Black Cloud Audit and Remediation
-
21Identify use cases for Carbon Black Cloud Enterprise EDR
-
22Identify tasks that can be performed in the VMware Carbon Black Cloud console
-
23Describe the term unknown file in the context of VMware Carbon Black Cloud
-
24Describe how cloud analysis helps prevent malware
-
25Describe how to remove malware from endpoints
-
26Describe when and how to use the Inbox in the VMware Carbon Black Cloud console
-
27Describe when and how to use audit logs in the VMware Carbon Black Cloud console
-
28Determine the appropriate VMware Carbon Black Cloud sensor installation method for given use cases
-
29Recognize the steps for performing an attended installation of a VMware Carbon Black Cloud sensor
-
30Recognize the steps for performing an unattended installation of a VMware Carbon Black Cloud sensor
-
31Identify types of data collected in VMware Carbon Black Cloud
-
32Recognize the search capabilities in VMware Carbon Black Cloud
-
33Describe the use cases for watchlists in VMware Carbon Black Cloud
-
34Recognize different alert types
-
35Identify ways to respond to and dismiss alerts in VMware Carbon Black Cloud
-
36Describe the purpose of using recommended queries in VMware Carbon Black Cloud
-
37Identify categories of recommended queries
-
38Describe when and how to use Live Response
-
39Recognize the purpose of built-in policies
-
40Recognize how to modify settings on the Policy page in VMware Carbon Black Cloud
-
41Describe the benefits to integrating security solutions
-
42Identify the integration capabilities of VMware Carbon Black Cloud