Citrix Virtual Apps and Desktops 7 Advanced Administration

Virtualizzazione e Cloud
5 Giorni
CCP-V Citrix Certified Professional - Virtualization
Descrizione del corso

Designed to learn how to set up scalability, redundancy and security configurations. You will learn advance features to optimize management of your app and desktop images by building and combining App Layers and Workspace Environment Management, which can improve logon times, centralize user settings management, optimize the performance of machines running the Virtual Delivery Agent (VDA). In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health. You’ll leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. This training will prepare you for the 1Y0-312 Exam valid for CCP-V Citrix Certified Professional - Virtualization certification


Backup, recovery and security considerations and configurations
Module 1: Implementing Redundancy and Scalability
• StoreFront and Citrix Gateway
• Site Infrastructure
• Machines Running the Virtual Delivery Agent
Module 2: Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones
• VDA Registration in a Multi-Zone Environment
• Zone Preference
• Optimal Gateway Routing and Zones
• Managing StoreFront Store Subscriptions in a Multi-Location Environment
• StoreFront and Citrix ADC Branding
Module 3: Implementing Backups and Disaster Recovery
• Backups
• Disaster Recovery Considerations
• Disaster Recovery Process
Module 4: Implementing Advanced Authentication Methods
• Multi-factor Authentication – RADIUS & OTP
• Multi-factor Authentication – Smart Card Authentication
• Federated Authentication – ADFS, SAML, and FAS
Module 5: Improving App and Data Security
• Introduction to Application Security
• Preventing Jailbreak Attacks
• Minimizing the Impact of Attacks
Module 6: Securing Machines Running the Virtual Delivery Agent
• TLS to VDA Encryption
• GPOs and Citrix Policies
• Image Management

Troubleshooting techniques and tools
Module 7: Introduction to Troubleshooting
• Troubleshooting Methodology Process (Standard Slide)
• Resource Tools and Utilities
• Introduction to PowerShell
Module 8: Troubleshooting Access Issues
• Troubleshooting StoreFront
• Troubleshooting Citrix Gateway
Module 9: Troubleshooting Delivery Controller Issues
• Validating FMA Services
Module 10: Troubleshooting VDA Registration Issues
• Troubleshooting VDA Registration
Module 11: Troubleshooting HDX Connection Issues
• Troubleshooting HDX Connections

CWS-315 Course Description

Citrix App Layering Considerations and Configuration
Module 12: Introduction to App Layering
• App Layering Introduction
• Architecture and How it Works
Module 13: Creating an OS Layer
• The OS Layer
Module 14: Creating a Platform Layer
• The Platform Layer
Module 15: Creating App Layers
• The App Layers
Module 16: Creating Elastic App and User Layers
• Elastic App Layering
• User Layers
Module 17: Deploying a Layered Image using Citrix Virtual Apps and Desktops
• Using Templates in App Layering
• Using Layered Images in a Citrix Virtual Apps and Desktops Site
Module 18: Exploring Layer Priority
• Layer Priority
Module 19: Maintaining an App Layering Environment
• Updating Layers
• Maintaining and Updating the App Layering Environment
• Common App Layering Considerations and Additional Resources

Workspace Environment Management (WEM) considerations and configuration
Module 20: Introduction to Workspace Environment Management (WEM)
• Workspace Environment Management (WEM) Introduction
• WEM Administration
Module 21: Using WEM to Centralize Environment Management
• Managing User Resources with WEM
• Managing Profiles with WEM
• Managing Endpoints with the WEM Transformer Feature
Module 22: Using WEM for Performance Optimization
• Optimizing Machine Performance with WEM
• Optimizing User Experience with WEM
Module 23: Using WEM to Secure Environments
• WEM Security Features
Module 24: Migrating and Upgrading WEM
• Migrating to WEM
• Upgrading a WEM Deployment
• WEM Multi-Location Considerations

Ad hoc

Cerchi un
corso su misura?
Richiedilo ora


Hai bisogno
di aiuto?