Tag Archives: administration

Training Citrix XenServer 6.0 Administration – 5 days

Class overview :

In this Citrix XenServer 6.0 training course, students are provided the foundational knowledge necessary to effectively install, configure, administer, and troubleshoot XenServer 6.0 and Provisioning Services 6.0. Students will have the opportunity to apply that foundational knowledge through the use of hands-on labs.

Class goals :

In this Citrix XenServer 6.0 training course, students will learn skills necessary to configure and administer XenServer 6.0, XenCenter, and Provisioning Services 6.0. Through hands-on labs, students will gain experience with:

  • Installing and Implementing XenServer
  • Creating and Managing Virtual Machines
  • Configuring the Network
  • Configuring Storage
  • Creating, Configuring, and Managing Resource Pools
  • Configuring the Distributed Virtual Switch (DVS)
  • Configuring Workload Balancing (WLB)
  • Configuring High Availability, Back up, and Restore
  • Managing and Troubleshooting Hosts
  • Installing and Configuring Provisioning Services
  • Managing vDisks

Content of Citrix XenServer 6.0 Administration

Citrix XenServer 6.0 Administration
Training Citrix XenServer 6.0 Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix XenDesktop 5 Administration – 5 days

Class overview :

This course provides the foundation necessary for administrators to effectively centralize and manage desktops in the datacenter and deliver them as a service to users anywhere. Students will learn how to select a desktop delivery model for each user group based on their needs, build proof-of-concept and production XenDesktop environments, assign virtual desktops to users and customize the user experience through policies.

Class goals :

Upon successful completion of this course, learners will be able to:

  • Determine the best Flexcast delivery model for each user group.
  • Build a XenDesktop proof-of-concept environment.
  • Configure a XenServer host for desktop delivery.
  • Build and configure a production XenDesktop site.
  • Manage virtual desktops as a single entity by creating a desktop catalog.
  • Modify a desktop image without impacting user productivity.
  • Restrict or allow certain XenDesktop features using policies.
  • Monitor site activity and troubleshoot issues in Desktop Director.
  • Install and configure Provisioning services.
  • Copy a desktop image to a virtual disk that can be streamed to virtual and physical target devices.
  • Identify the XenClient infrastructure.
  • Install and configure Synchronizer for XenClient.

Content of Citrix XenDesktop 5 Administration

Introducing XenDesktop

  • Five Core Strengths of XenDesktop
  • Desktop Virtualization
  • XenDesktop Product Family
  • Test Your Knowledge: XenDesktop Product Family
  • FlexCast
  • Use Cases
  • Virtual Desktop Models
  • Test Your Knowledge: Virtual Desktop Models
  • HDX Technologies
  • Hosted Desktop Delivery
  • Quick Deploy
  • Quick Deploy System Requirements
  • To Run Quick Deploy

Configuring the Hypervisor for Desktop Delivery

  • Virtualization
  • Virtualization Components
  • Hypervisors
  • Hypervisor Role in Desktop Delivery
  • Test Your Knowledge: The Hypervisor Role in Desktop Delivery
  • Windows Virtual Machine Architecture
  • Installation from an ISO
  • To Create an ISO Library
  • Windows Virtual Machine Device Support
  • Windows Virtual Machine Creation
  • XenServer Tools
  • Test Your Knowledge: To Create an ISO Library
  • Test Your Knowledge: Windows Virtual Machine Creation
  • Templates and Life-Cycle Operations
  • Virtual Machine Templates
  • To Provision a New Virtual Machine Using a Template
  • Virtual Machine Export and Import
  • Virtual Machine Duplication
  • Test Your Knowledge: Export, Import, and Copy Virtual Machines
  • Snapshots
  • Virtual Machine Operations
  • XenConvert
  • To Convert a Server or Desktop to a Virtual Machine
  • Virtual Machine Resource Management
  • Events and Alerts
  • Resource Pools
  • Virtual Machine Movement
  • Network Components and Architecture
  • External Networks
  • Internal-only Network
  • NIC Bonds
  • To Create a NIC Bond in XenCenter
  • VLANs
  • Storage
  • Storage Repositories
  • Remote Storage
  • Storage Capability Comparison
  • Test Your Knowledge: Storage Components
  • Troubleshooting Hypervisor Issues

Installing and Configuring XenDesktop

  • XenDesktop Architecture
  • Production Site Configuration
  • License File Management
  • Obtaining License Files
  • Security Considerations
  • Active Directory Considerations
  • Supported Active Directory Environments
  • Active Directory-Based Controller Discovery
  • Active Directory Objects
  • Test Your Knowledge: Active Directory Considerations
  • Configuring a XenDesktop Site
  • To Configure a XenDesktop Site
  • Web Interface
  • Web Interface Considerations
  • Desktop Delivery Communication Process
  • Access Gateway
  • ICA Proxy Mode
  • Access Gateway Deployment Scenarios
  • Access Gateway Communications
  • Access Gateway Authentication
  • Single Sign-on to Web Interface
  • SmartAccess

Managing Desktop Catalogs and Groups

  • Administration Roles
  • To Add an Administrator Account
  • Preparing a Virtual Desktop for Delivery
  • Virtual Desktop Agent Installation
  • Virtual Desktop Agent Wizard Settings
  • Manual Firewall Configuration
  • Machine Creation Services
  • Machine Creation Services Host and Storage Requirements
  • Desktop Catalogs
  • Machine Types
  • Pooled Machine Type
  • Dedicated Machine Type
  • Existing Machine Type
  • Physical Machine Type
  • Streamed Machine Type
  • Virtual Desktop Updates
  • To Modify the Master Virtual Machine
  • To Revert to the Previous Master Virtual Machine
  • Desktop Groups
  • Desktop Group Types
  • Desktop Group Examples
  • To Create a Desktop Group
  • Power Management
  • Pools and Buffers
  • To Configure Power Management
  • Troubleshooting Desktop Catalog and Group Issues

Customizing the User Experience

  • User Device Types
  • Display Modes
  • Profile Management
  • User Profiles
  • User Profile Types
  • Redirecting User Data
  • Managing User Profiles
  • Profile Management Logon Process
  • To Enable Profile Management
  • FlexCast for Apps
  • Application Delivery Method
  • Test Your Knowledge: Application Delivery Method
  • XenDesktop Policies
  • Policy Creation
  • To Create a Policy
  • Policy Settings
  • Policy Setting Best Practices
  • Policy Prioritization
  • Test Your Knowledge: Policies, Printers, and Client Drive Mapping
  • Troubleshooting Customization Issues

Monitoring XenDesktop Sites

  • Desktop Director
  • Installing Desktop Director
  • Accessing Desktop Director
  • Desktop Director Pages
  • Filters
  • Searching for a User or Machine
  • User and Machine Management
  • Managing Machines
  • Managing End Users
  • User Shadowing
  • To Shadow a User
  • Troubleshooting Site Monitoring Issues

Streaming Desktops to Virtual and Physical Machines

  • Streamed VHDs and Catalogs
  • Provisioning Services
  • Citrix Provisioning Services Infrastructure
  • Citrix Provisioning Services Components
  • Key Services
  • Provisioning Services Administration
  • Installation Planning
  • Network Boot Services
  • Boot Process
  • DHCP Deployment Options
  • DHCP Configuration
  • Provisioning Services Farm Design
  • Farms
  • SQL Database Server
  • Service Account Permissions
  • Sites
  • Stores
  • Write Caches
  • Storage Requirements
  • Sample vDisk Storage Requirements
  • Provisioning Services Installation
  • To Install Provisioning Services
  • Provisioning Services Configuration
  • To Configure a Provisioning Services Farm
  • Store Configuration
  • Troubleshooting Provisioning Services Installation and Configuration

Creating a Shared vDisk

  • vDisk Image Modes
  • Standard Image Mode
  • Difference Disk Image Mode
  • Private Image Mode
  • Write-Cache Types
  • Cache on Server Disk
  • Cache on Server Disk: Local Storage
  • Cache on Server Disk: Shared Storage
  • Cache on Device’s Hard Drive
  • Cache on Device’s Hard Drive: Local Storage
  • Cache on Device’s Hard Drive: Shared Storage
  • Target Device-based RAM Cache
  • Target Device RAM
  • To Create a vDisk
  • Imaging Wizard
  • vDisk File Creation
  • VHD Format
  • vDisk Mounting
  • vDisk Formatting
  • Master Target Device
  • Boot Order
  • Master Target Device Software
  • To Create a Windows Master Target Device using the Imaging Wizard
  • XenConvert Overview
  • To Image Windows Target Devices with XenConvert
  • Troubleshooting vDisk Creation Issues

Administering Provisioning Services Components

  • Provisioning Services Hosts in the Console
  • Target Device Connections
  • Provisioning Services Host Properties
  • Target Device Management
  • Target Device Collection
  • Target Device Views
  • Target Device Properties
  • Active Directory Integration
  • To Manage Domain Passwords
  • Automatic Password Renegotiation
  • To Integrate Active Directory
  • Test Your Knowledge: Active Directory Login Issue
  • vDisk Management
  • vDisk Properties
  • To Create a vDisk File
  • To Unassign vDisks from Target Devices
  • To Delete a vDisk
  • vDisk Locks
  • vDisk Backup
  • Streamed Desktop Catalogs
  • To Create a Streamed Desktop Catalog
  • vDisk Updates
  • Automatic Update
  • Incremental Update
  • Autoupdate Tool
  • Incremental Update Rollback
  • Scheduled vDisk Updates
  • vDisk Update Strategies
  • Troubleshooting Provisioning Services Issues

Delivering Local VM Desktops

  • Local VM Desktops with XenClient
  • XenClient Architecture
  • Synchronizer for XenClient
  • Test Your Knowledge: XenClient Components
  • XenClient Installation
  • To Install XenClient
  • XenClient Configuration
  • Receiver for XenClient
  • To Create a Virtual Machine
  • XenClient Tools
  • Synchronizer Installation and Configuration
  • Image Management
  • To Upload a Virtual Machine to the Synchronizer
  • To Assign Desktops to End Users
  • User Management
  • To Create a Local User or Group
  • To Link an Existing AD User or Group
  • Device Management
  • XenClient User Experience
  • Secure Application Sharing
  • Troubleshooting Local VM Desktop Issues
Citrix XenDesktop 5 Administration
Training Citrix XenDesktop 5 Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix XenApp 6.5 Advanced Administration – 5 days

Class overview :

This course provides learners with the skills necessary to monitor, maintain, optimize and troubleshoot Citrix XenApp 6.5 environments running on Windows Server 2008 R2 software. Learners are introduced to the tools used to monitor the XenApp farm, record farm activity and generate reports.

Class goals :

On completion of this course, students will have learnt about:

  • Troubleshooting the XenApp environment
  • Scaling the XenApp environment
  • Creating farm redundancy
  • Maintaining the XenApp environment
  • Optimizing the XenApp environment
  • Optimizing printing
  • Monitoring XenApp with standard utilities
  • Monitoring XenApp with EdgeSight
  • Securing XenApp

Content of Citrix XenApp 6.5 Advanced Administration

Module 1: Troubleshooting the XenApp Environment

  • Troubleshooting Methodology
  • Logon Issues
  • User Sessions
  • Server Resources
  • Exercise 1-1: Troubleshooting an AppCenter Issue
  • Exercise 1-2: Troubleshooting Web Interface and XML Issues
  • Exercise 1-3: Troubleshooting Launching a Hosted Application
  • Exercise 1-4: Troubleshooting Streaming Applications

Module 2: Scaling the XenApp Environment

  • Farm Configuration Recommendations
  • Farm Scalability
  • Scripted Installation
  • Server Build Scripting
  • XenApp Server Templates
  • Data Store Database Migration
  • Dedicated Data Collector
  • Web Interface Planning
  • Delivery Services
  • XenApp and XenDesktop Integration
  • XenApp and Provisioning Services Integration
  • XenApp and Merchandising Server Integration
  • Exercise 2-1: Preparing to Clone a XenApp Server
  • Exercise 2-2: Cloning a XenApp Server
  • Exercise 2-3: Preparing a XenApp Server for Scripted Configuration
  • Exercise 2-4: Performing a Scripted Configuration

Module 3: Creating Farm Redundancy

  • Eliminating Single Points of Failure
  • Disaster Recovery
  • Load Balancing
  • XenApp and NetScaler Integration
  • Exercise 3-1: Load Balancing Web Interface and XML Services Using Citrix NetScaler
  • Exercise 3-2: Testing Load Balancing through Citrix NetScaler
  • Exercise: 3-3: Installing and Configuring Web Interface on Citrix NetScaler

Module 4: Maintaining the XenApp Environment

  • Farm Setting Migration
  • Data Store Database Maintenance
  • Data Store Database Recovery
  • Local Host Cache
  • XML Service Overview
  • Routine Operations
  • Power and Capacity Management
  • Exercise 4-1: Updating the Mozilla Firefox Streaming Profile
  • Exercise 4-2: Performing Data Store Maintenance Commands
  • Exercise 4-3: Configuring Power and Capacity Management
  • Exercise 4-4: Creating a Restart Schedule for the XenApp Servers

Module 5: Optimizing the XenApp Environment

  • Performance Tuning
  • Windows Server Tuning for XenApp
  • XenApp Tuning
  • Virtual Memory Optimization
  • CPU Optimization
  • Virtual Machine Sizing
  • Multi-Streaming
  • Accelerating ICA Traffic with Branch Repeater
  • QoS through Branch Repeater
  • Exercise 5-1: Enabling Multi-Stream ICA Policies for Specific ICA Traffic
  • Exercise 5-2: Enabling CPU and Memory Optimization

Module 6: Optimizing the User Environment

  • Access methods
  • Application Compatibility
  • Application Streaming
  • General Guidelines For Improving Application Performance
  • User Profiles
  • Session Pre-Launch
  • User Connection Configuration
  • Exercise 6-1: Configuring Profile Management
  • Exercise 6-2: Profiling an Application Requiring A Service
  • Exercise 6-3: Configuring Session Pre-Launch

Module 7: Optimizing Printing

  • Printing Architecture Review
  • Managing Printers
  • Citrix Universal Printer
  • Printing Performance Policies
  • Non-Native Printer Drivers
  • Printer Driver Isolation
  • Printing Tools
  • Troubleshooting Printing
  • Exercise 7-1: Verifying Printer Driver Compatibility with XenApp
  • Exercise 7-2: Replicating Print Drivers Using PowerShell
  • Exercise 7-3: Troubleshooting a Printer Issue with the Citrix Group Policy Modeling Wizard

Module 8: Securing XenApp

  • Setting Rights and Permissions
  • XenVault
  • SSL Certificates
  • XenApp Security with Access Gateway
  • Exercise 8-1: Creating and Distributing a Root CA Certificate
  • Exercise 8-2: Encrypting External ICA Traffic Using ICA Proxy
  • Exercise 8-3: Restricting External Application Access
  • Exercise 8-4: Encrypting XML Traffic With SSL Relay

Module 9: Monitoring XenApp with Standard Utilities

  • XenApp Monitoring
  • XenApp Utilities
  • Citrix Utilities
  • Third-party tools
  • Execise 9-1: Using Desktop Director to View Session Data
  • Exercise 9-2: Monitoring XenApp using Performance Monitor
  • Exercise 9-3: Monitoring XenApp Using Command Line Utilities

Module 10: Monitoring XenApp with EdgeSight

  • EdgeSight Components
  • Real-Time Information
  • Reports
  • Alerts
  • Active Application Monitoring
  • Exercise 10-1: Viewing EdgeSight Historical Data
  • Exercise 10-2: Viewing EdgeSight Real-Time Data
Citrix XenApp 6.5 Advanced Administration
Training Citrix XenApp 6.5 Advanced Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix XenServer 5.6 Administration – 5 days

Class overview :

In this course, students will learn the skills necessary to configure and administer Citrix XenServer 5.6, Citrix XenCenter, and Citrix Provisioning Services 5.6. Through hands-on labs, students will gain experience configuring a XenServer virtualization server; creating XenServer resource pools and connecting to remote storage; using XenMotion and automatic virtual machine placement; and creating, assigning and administering virtual disks.

Class goals :

Upon successful completion of this course, learners are able to demonstrate the following objectives:

  • Install, configure and administer XenServer 5.6
  • Configure and administer XenCenter
  • Deploy and manage Provisioning Services 5.6
  • Configure a XenServer virtualization server
  • Manage a XenServer using XenCenter
  • Create Windows and Linux virtual machines
  • Create XenServer resource pools and connect to remote storage
  • Use XenMotion and automatic virtual machine placement
  • Design a Provisioning Services farm
  • Create, assign and administer virtual disks
  • Manage target devices

Content of Citrix XenServer 5.6 Administration

Module 1: Introductions and Course Overview

Module 2: XenServer Introduction

Module 3: XenServer and XenCenter Installation

Module 4: Windows Virtual Machines

Module 5: Linux Virtual Machines

Module 6: Templates and Life-Cycle Operations

Module 7: XenConvert

Module 8: Resource Management

Module 9: Managing XenServer

Module 10: Networking

Module 11: Storage

Module 12: Resource Pools

Module 13: High Availability

Module 14: Workload Balancing

Module 15: Troubleshooting XenServer

Module 16: Provisioning Services Installation and Configuration

Module 17: vDisk Administration

Citrix XenServer 5.6 Administration
Training Citrix XenServer 5.6 Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition – 5 days

Class overview :

This course provides the foundation to manage, configure and monitor advanced features and components of Citrix NetScaler 9.0 Platinum Edition. Interactive discussion and hands-on labs guide learners through advanced administration tasks such as troubleshooting, configuring application security with the Citrix Application Firewall feature, tuning the NetScaler for high traffic, configuring Authentication Authorization and Accounting for system management, and configuring Advanced Policies using service callouts.

Class goals :

Upon successful completion of this course, learners are able to:

  • Identify common web attacks and vulnerabilities
  • Write PERL compatible regular expressions
  • Configure Citrix Application Firewall 9.0 to protect web applications
  • Troubleshoot Citrix Application Firewall 9.0
  • Install and configure Citrix EdgeSight for NetScaler to monitor web application performance
  • Install, configure, and use Citrix Command Center to manage NetScaler devices
  • Configure and use additional advanced features of NetScaler 9.0 including NetScaler Web Logging, HTTP Callout, and AAA authentication for web applications

Content of Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Troubleshooting

  • Troubleshooting Resources (Citrix Knowledge Center; Citrix Product Documentation; Citrix Technical Support; Collected NetScaler Data; Troubleshooting Log)
  • NetScaler System Overview (NetScaler Processes)
  • nCore Configuration Architecture
  • Built-In Tools (Nsconmsg; Network Traffic Capture; show and stat Commands; Reporting Tool; Shell Tools; Command-Line Interface Tools; Configuration Utility Tools)
  • Third-Party Tools (Network Protocol Analyzers; Web Browser Plug-ins; SNMP Browsers; FTP Clients)

Introducing Application Firewall

  • Application Attacks (Application Attack Description; Goals of Application Attacks; Most Common Types of Web Application Attacks; The Application Firewall Solution; Business Problems)
  • The Benefits of Application Firewall (Application Layer Protection; Positive Security Model; Negative Security Model; Deep Stream Inspection; Adaptive Learning Engine; Web Application Vulnerabilities; Security Audits and Application Firewalls)
  • Payment Card Industry Data Security Standard (Importance of PCI; Common Coding Vulnerabilities; PCI-DSS Report; Packet Processing and Inspection; Request Process; Response Process; Deployment Considerations)
  • Profiles and Policies (Profiles; Policies)

Profiles and Policies

  • Profiles (Profile Types; Default Profiles; Creating a Profile in the Configuration Utility; Creating a Profile in the Command-Line Interface; Action Settings; Sessionization and Security Checks; Profile Settings; Error Page; HTML Comment Stripping; XML Error Object; Other Profile Settings)
  • Policies (Policy Creation; Policy Binding; Policy State; Policy Priorities; Creating a Policy in the Configuration Utility; Creating Policies in the Command-Line Interface; Binding and Prioritizing a Policy in the Configuration Utility; Binding Policies in the Command-Line Interface)
  • Engine Settings

Regular Expressions

  • Regular Expressions
  • Forms of Regular Expressions
  • Using Regular Expressions
  • Metacharacters and Literal Characters
  • Metacharacters
  • Escapes
  • Quantifiers
  • Backreferencing
  • Lookaheads
  • Regular Expression Scope

Attacks and Protections

  • Security Checks (Profile Types; Common Security Checks; HTML Security Checks; XML Security Checks; Request-Side and Response-Side Checks)
  • HTTPS Web Applications
  • Buffer Overflow Exploits (Goals of a Buffer Overflow Attack; Consequences of a Buffer Overflow Attack)
  • Buffer Overflow Protection (Default Maximum Values; Modifying Buffer Overflow Settings)
  • Parameter Manipulation (Parameter Manipulation Example)
  • Server Misconfiguration
  • Deny URL Protection (The Deny URL List; Adding a Deny URL in the Command-Line Interface; Deleting a Deny URL in the Command-Line Interface)
  • SQL Injection (How SQL Injection Works)
  • HTML SQL Injection Protection (SQL Keywords and Special Characters; Modifying SQL Injection Action Settings; XML SQL Injection Security Check; Cross-Site Scripting; Attacking the Trust Relationship; How Cross-Site Scripting Attacks Work; Results of a Cross-Site Scripting Attack; Preventing Cross-Site Scripting Attacks; HTML Cross-Site Scripting Protection; Cross-Site Scripting Action Settings; Transform Cross-Site Scripts; Check Complete URLs for Cross-Site Scripting; Additional Action Settings; Relaxations; Modifying Cross-Site Scripting Action Settings; Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface; Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface; XML Cross-Site Scripting Security Check)
  • Command Injection (Command Injection Examples)
  • Field Format Protection (Field Types and Field Formats; Predefined Field Types; Custom Field Types; Field Format Configuration; Default Field Format; Confidential Fields; Adding a Custom Field Type; Setting a Default Field Type; Modifying Field Format Settings; Adding a Confidential Field; Modifying a Confidential Field)
  • Cookie Tampering and Poisoning (Types of Cookies; How Cookies Are Added; Web Server Sessions)
  • Cookie Consistency Protection (Sessionization and Cookies; Relaxations; Adding a Cookie Consistency Relaxation in the Command-Line Interface; Deleting a Cookie Relaxation in the Command-Line Interface)
  • Form/Hidden Field Manipulation (Example of Hidden Field Manipulation)
  • Form Field Consistency Protection (Field Consistencies; User Sessions; Adding a Form Field Consistency Relaxation Using the Command-Line Interface; Deleting a Form Field Consistency Relaxation Using the Command-Line Interface)
  • Forceful Browsing (Forceful Browsing Protection)
  • Start URLs (The Start URL List; Sessionization and Start URLs; Modify Start URL Check; Adding a Start URL in the Command-Line Interface; Deleting a Start URL in the Command-Line Interface)
  • Backdoors and Misconfigurations
  • URL Closure (Enforcing URL Closure in the Configuration Utility; Enforcing URL Closure in the Command-Line Interface)
  • Identity Theft Attacks (Types of Identity Theft Attacks; Application Firewall Protection Against Identity Theft)
  • Credit Card Protection (Predefined Credit Cards; Credit Card Settings)
  • Protecting Credit Cards (Protecting Credit Cards in the Configuration Utility; Protecting Credit Cards in the Command-Line Interface)
  • Errors Triggering Sensitive Information Leaks
  • Safe Object Protection (Defining a Safe Object; Adding a Safe Object; Adaptive Learning for Security; Learning Over Time; Learning Thresholds; Generalized and Simple Rules; Learned Rules; Enabling Learning; Setting Learning Thresholds; Managing Learned Rules)

Application Firewall Troubleshooting

  • Application Firewall and Applications (HTTP Headers; HTML Comment Stripping)
  • Configuration Issues (Policy Issues; Profile Issues; Suggested Actions)

Queuing and Connection Tuning

  • HTTP Connections (Keep-alive HTTP Connections; HTTP 1.0 and 1.1 Behavior; Pipelined Requests)
  • HTTP Connection Management and NetScaler HTTP Behavior (Client Keep-Alive; Connection IP Address Control; Maximum Requests and Maximum Connections; Connection Idle Settings; Trackable Connections)
  • TCP Buffering (Down-State Flush and Access Down Connection Settings; TCP Optimization; Advertised Window Size; Window Scaling; Selective Acknowledgement)
  • Surge Queue
  • Surge Protection (Request and Response Rates; Throttle Rate; Disabling Surge Protection in the Configuration Utility; Disabling Surge Protection for a Service in the Configuration Utility; Setting Thresholds in the Configuration Utility)
  • Priority Queuing (Enabling Priority Queuing in the Configuration Utility; Creating a Priority Queuing Policy in the Configuration Utility; Binding Priority Queuing Policies in the Configuration Utility; Weighted Queuing)
  • HTTP Denial-of-Service Protection (Enabling HTTP DoS Protection in the Configuration Utility; Adding a HTTP DoS Policy in the Configuration Utility; Challenged JavaScript Responses; Client Detection Tuning and JavaScript Challenge Response Rate; HTTP DoS Protection Deployment Guidelines; Attack Characteristics)
  • IP Rate Limiting (Rate Control by Subnet Example; IP Rate Limiting Best Practices)

Authentication, Authorization, and Auditing

  • Users, Groups and Command Policies (Authentication, Authorization, and Auditing; Systems and AAA Users Groups; Local Accounts; External Authentication)
  • External Authentication for System Users (Authentication Actions and Policies; Configuring Local Authentication; Configuring External Authentication with Explicit Accounts; Configuring External Authentication with Group Extraction; Creating an External Authentication Policy; Creating local groups in the Command-Line Interface; Binding Groups in the Command-Line Interface; Creating an LDAP Authentication Action in the Command-Line Interface; Creating an Authentication Policy in the Command-Line Interface; Binding the Policy in the Command Line Interface; Authentication Troubleshooting; External Authentication Common Issues)
  • AAA for Traffic Management (Enabling AAA for Traffic Management; AAA for Application Traffic; Basic AAA Setup for Application Traffic; Workflow for AAA Traffic Management)
  • Configuration (Creating an Authentication Virtual Server; Creating an Authentication Virtual Server in the Command-Line Interface; Binding an SSL Certificate in the Command-Line Interface; Binding a Virtual Server to an Authentication Policy in the Command-Line Interface; Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface; Configuring Authorization Policies for Traffic Management; Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface; Creating an Authorization Policy to Allow Access
  • Audit Logging (Audit Logging Troubleshooting)

HTTP Service Callouts

  • HTTP Callouts
  • Configuring HTTP Callouts (Configuring HTTP Callouts in the Configuration Utility; Configuring HTTP Callouts in the Command-Line Interface; Callout Examples; HTTP Callout Response Parsing)
  • HTTP Callout Use Cases (Scenario 1: Filter Clients Based on an IP Address Blacklist; Scenario 2: Fetch and Update Content; HTTP Callout Auditing)

EdgeSight for NetScaler

  • Data Flow Overview
  • JavaScript Response Injection (User Metrics; NetScaler Metrics; NetScaler Metric Example; Data Validity)
  • EdgeSight for NetScaler Server Components (Component Installation Scenarios)
  • EdgeSight for NetScaler Installation Considerations (Installing EdgeSight for Netscaler; SQL Server; SQL Reporting Services; EdgeSight for NetScaler Components; Installing EdgeSight Database Components; Installing EdgeSight Report Console and Data Collector Components; EdgeSight Post-Installation Wizard; Upgrading EdgeSight for NetScaler)
  • Reporting Services Initial Configuration (NetScaler Configuration Overview; Configuring HTML Injection; Editing the prebody.js script; Configuration Example in the Command-Line Interface; Add NetScaler System to EdgeSight for NetScaler Data Collector; Topology Data Collectors with SSL)
  • EdgeSight Charts and Reports
  • EdgeSight Troubleshooting (Troubleshooting OS Components; Troubleshooting HTML Injection; Troubleshooting Injection Request; Troubleshooting Unknown Device; Troubleshooting from the NetScaler Command-Line Interface)

Command Center

  • Command Center Introduction (Command Center NetScaler Features; NetScaler and WANScaler Support)
  • Command Center Clients (Connecting to Command Center)
  • Server Requirements (Disk Space Requirements; MySQL Considerations; MicrosoftSQL Server 2005 Considerations)
  • Port Setting Requirements (Command Center Installation; Linux Considerations; Installation; Capacity Planning; Backup; Installation Modes; Installation Considerations)
  • Command Center Functionality (Command Center Home Page; Discovery; Fault Management; Configuration Management; Change Management; Centralized Certificate Management; Performance Monitoring)
  • Command Center Administration (Security Administration; Administration Operations; Administration Configuration; Server Details)
  • Command Center Troubleshooting (Microsoft SQL Database Issues; Discovery Issues; Performance Data Issues; Linux Command-Line Interface Access Issues; Reporting Issues)

NetScaler Web Logging

  • NetScaler Web Logging Introduction (Architecture Overview; Communication Process)
  • NetScaler System Configuration (Enabling Web Logging in the Configuration Utility; Enabling Web Logging in the Command-Line Interface; Configuring the Buffer Size in the Configuration Utility; Configuring the Buffer Size in the Command-Line Interface)
  • NSWL Client Installation (Logging System Components; Installing the NSWL Client on Windows; NSWL Options; Windows Service Registry Key)
  • NSWL Client Configuration (NetScaler IP Addresses; Log Filters; Defining Log Properties; Running NSWL; Verifying the Configuration)
  • Troubleshooting Web Logging (NSWL Troubleshooting; NetScaler Troubleshooting; Buffer Overflow)
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix XenApp 5 for Windows Server 2003: Administration – 5 days

Class overview :

This CTX1259CI course (also known as: CTX-1259, CTX1259, CTX-1259CI) provides the foundation necessary to effectively deploy and administer Citrix XenApp 5 for Windows Server 2003 and its components, including Web Interface, Application Streaming, Load Manager, Installation Manager and Secure Gateway.

Class goals :

Upon successful completion of this Citrix course, learners are able to perform the following:

  • Install XenApp in a Windows Server 2003 environment
  • Install and distribute Citrix XenApp Plugins
  • Create and customize Web Interface sites
  • Publish applications, server desktops and content
  • Configure XenApp Web and XenApp Services sites
  • Configure, apply and prioritize policies in a XenApp environment
  • Create and assign load evaluators
  • Configure printers and printer policies and manage print drivers and printer bandwidth
  • Create and configure XenApp administrator accounts and their permissions
  • Configure HDX settings
  • Configure SecureICA encryption, SSL Relay and Secure Gateway
  • Install and distribute applications, service packs and hotfixes

Content of Citrix XenApp 5 for Windows Server 2003: Administration

Installing Citrix XenApp

  • Identifying Components of Citrix XenApp 5
  • Features of XenApp 5 Feature Pack 2
  • Identifying XenApp Management Consoles
  • Installation of Citrix XenApp
  • Making Installation Decisions

Installing and Configuring Citrix XenApp Plugins

  • Citrix XenApp Plugins for Windows
  • Architecture and Communication
  • Citrix Online Plug-in Installation
  • Installing the Citrix Online Plug-in
  • Citrix Online Plug-in Usage
  • Session Reliability

Publishing Resources

  • Publishing Resources
  • Organizing Published Resources for Users
  • Advanced Settings for Published Resource
  • Configuring Advanced Access Control Properties
  • Configuring Server-to-Client Content Redirection
  • Implementing Resource Limits and Client Options
  • Configuring Resource Appearance
  • Published Resource Management
  • Viewing Published Resource Usage
  • Modifying Published Resource Properties
  • Disabling or Hiding a Published Resource

Enabling Web Access to Published Resources

  • Web Interface Architecture and Communications
  • Web Interface Installation
  • Site Creation
  • Creating XenApp Web Sites
  • Creating XenApp Services Sites
  • Modifying a Web Interface Site
  • Site Appearance
  • Configuring the Site Appearance
  • Configuring Session Preferences
  • Configuring Workspace Control
  • XenApp Plugins and the Web Interface
  • Configuring Plugin Deployment
  • Configuring Client for Java Settings
  • Authentication Configuration
  • Configuring Explicit Authentication
  • Configuring Pass-through Authentication
  • Configuring Smart Card Authentication
  • Web Interface Access Methods
  • Configuring an Access Method
  • Client-side Proxy Setting Configuration
  • Server Configuration
  • Adding Server Farms
  • Configuring Load Balancing
  • Enabling Fault Tolerance
  • Configuring the Citrix XML Service
  • Web Interface Site Removal

Configuring Policies in Citrix XenApp

  • Architecture and Communication
  • Policies in Citrix XenApp
  • Identifying Policy Rules
  • Using the Streamed Applications Rule
  • Creating Policies in Citrix XenApp
  • Applying Policies Using Filters
  • Prioritizing Policies
  • Using the Policy Search Engine
  • Merging Shadow Policies
  • Common Policy Configuration Missteps

Configuring Sessions in Citrix XenApp

  • Session Connection Settings
  • Configuring Virtual IP Addresses
  • Configuring Broadcast Setting
  • Configuring the Citrix XML Service
  • Configuring Time Zone Settings
  • Configuring Novell Directory Services
  • Session Reconnection Configuration
  • Configuring Keep-Alive Setting
  • Configuring Session Reliability
  • Configuring Auto Client Reconnect
  • Session Performance Configuration
  • Configuring HDX Broadcast Display
  • Configuring HDX 3D Browser Acceleration
  • Configuring HDX MediaStream Multimedia Acceleration
  • Configuring HDX MediaStream for Flash
  • Configuring SpeedScreen Latency Reduction
  • Configuring HDX 3D Progressive Display

Configuring Citrix XenApp

  • Citrix Administrator Accounts and Permissions
  • Adding Administrator Accounts
  • Configuring Administrator Permissions
  • Configuring Folder Permissions
  • Configuration Logging
  • Creating the Configuration Logging Database
  • Configuring Configuration Logging
  • Data Collectors and License Servers
  • Configuring Data Collectors
  • Specifying the License Server
  • Performance Settings
  • Optimizing CPU Utilization
  • Implementing Virtual Memory Management
  • Administration Settings
  • Configuring Health Monitoring and Recovery
  • Configuring Remote Console Connections
  • Configuring ICA Connection Limits
  • Configuring Shadow Settings
  • Power and Capacity Management

Configuring Load Management

  • Load Balancing Process
  • Load Calculation
  • Load Evaluator Configuration
  • Creating Custom Load Evaluators
  • Assigning Load Evaluators to Servers and Applications
  • Load Monitoring
  • Monitoring Load Evaluator Usage
  • Monitoring Load Evaluator Rule Activity
  • Logging Load Manager Activity

Delivering Applications with XenApp

  • Application Installation
  • Shadow Isolation Environments
  • Creating an Isolation Environment
  • Configuring Isolation Environment Settings
  • Associating an Application with an Isolation Environment
  • Installation Manager Overview
  • Installation Manager Packaging
  • Rolling Back the Packager
  • Packaging an Application
  • Packaging a File or Folder Contents
  • Packaging an Unattended Installation
  • Package Delivery
  • Adding a Package to the Installation Manager Database
  • Installing a Package
  • Publishing a Package
  • Installation Manager Administration
  • Configuring Installation Manager Properties
  • Creating Server Groups
  • Creating and Using Package Groups
  • Viewing Package Status
  • Uninstalling a Package

Configuring Printing

  • Architecture and Communication
  • Printer Provisioning
  • Secure Client Printing
  • Workspace Control
  • Network Considerations
  • Print Drivers
  • Client Printers
  • Enabling Client Printer Auto-creation
  • Creating Auto-retained Printers
  • Creating Permanent Client Printers
  • Creating Auto-restored Client Printers
  • Network Printers
  • Importing Print Servers
  • Assigning Network Printers to Users
  • Managing Printer Bandwidth
  • Print Driver Management
  • Replicating Print Drivers
  • Maintaining Print Driver Compatibility Lists
  • Configuring Print Driver Mappings
  • Assigning Printer Creation Settings to Published Applications
  • Common Printing Configuration Missteps

Streaming Applications

  • Application Streaming Components Overview
  • Application Streaming Communications
  • Citrix Offline Plug-in
  • Citrix Streaming Profiler
  • Installing the Streaming Profiler
  • Profile Configuration
  • Setting Profiler Preferences
  • Configuring Profiles
  • Configuring Inter-isolation Communication
  • Viewing and Changing Profile Properties
  • Changing Target Properties
  • Adding a Target to a Profile
  • Deleting a Target from a Profile
  • Upgrading an Application in a Target
  • Deleting an Obsolete Version of a Target
  • Streaming Application Configuration
  • Publishing a Streaming Application
  • Changing the Application Type
  • Specifying an Alternate Profile for a Published Application
  • Enabling the Least-Privileged User Account
  • Using a Policy for Application Delivery
  • Configuring Sites for Streaming Applications
  • Offline Access Management
  • Providing Offline Access
  • Customizing the Offline License Setting
  • Caching Applications for Offline Access

Securing Access to Published Resources

  • SecureICA Encryption
  • Configuring SecureICA Encryption in a Policy Configuring
  • SecureICA Encryption Through a Published Application
  • Citrix SSL Relay
  • Configuring Citrix SSL Relay
  • Access Gateway
  • Secure Gateway
  • Using Digital Certificates
  • Installing the Secure Gateway
  • Configuration for the Secure Gateway
  • Configuring the Secure Ticket Authority
  • Configuring the Access Method
  • Configuring the Web Interface Secure Gateway Settings
  • Secure Gateway Monitoring
  • Security Best Practices
Citrix XenApp 5 for Windows Server 2003: Administration
Training Citrix XenApp 5 for Windows Server 2003: Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Intro to Apache Web Server Administration – 2 days

Class overview :

An Apache webserver training course which provides a technical introduction to installing, configuring and managing the Apache web server and to supporting CGI programming on the Apache server.

Class goals :

Content of Intro to Apache Web Server Administration

Getting started

  • Apache
  • Webservers
  • Apache features
  • Apache versions
  • Installing Apache
  • Installing XAMPP
  • Compiling Apache
  • Running Apache
  • Running Apache automatically: Unix/Linux & MS Windows
  • Checking Apache is running
  • Serving webpages
  • Location of the apache configuration file
  • Setting the document root
  • Applying configuration changes after testing
  • A little HTTP: GET, POST & status codes
  • Accessing a Web Server with the Telnet Program
  • HTTP 1.1: persistent connections, chuncked transfers, byte serving, ETags, modified dates & conditional transfers, HTTP Pipelineing
  • Googles SPDY — HTTP on Steroids, how it works & implementations

Basic configuration

  • Configuring Apache
  • Directives
  • Modules
  • Enabling/disabling modules in Debian
  • Checking configurations
  • Logging
  • Configuring log-file contents
  • Specifying log-files
  • Logging errors
  • Browser error messages
  • Custom error pages
  • Server and directory index pages
  • Custom index pages
  • Forbidding index pages
  • Trailing slashes in directory paths
  • Directory paths without trailing slashes
  • Per-directory configuration
  • <Location> example
  • Other directives affecting where settings apply
  • Wildcards & Regular expressions in container specifications
  • Containers & Case insensitive file systems
  • Order of merging of containers
  • Context for container directives
  • Accessing files from the network
  • Per-directory configuration outside httpd.conf
  • .htaccess file configuration
  • Protecting files with passwords
  • Creating a password file
  • Maintaining an ht-password file
  • Password authentication example
  • Password authentication details
  • When authentication fails — generating errors
  • Authentication Information in Databases
  • Restricting access by IP address
  • Listening only on specific IP addresses
  • Restricting access by IP address
  • allow,deny and deny,allow
  • Address and password authentication
  • Character Sets and Human Languages
  • Character Set
  • Setting Content MIME Type
  • Content Expirey
  • Directory Options
  • The different MPMs (Multi Processing Modules) available
  • Tunable Parameters for Performance
  • Enabling KeepAlive

Serving multiple sites with virtual hosts

  • Multiple sites on a server
  • Setting up virtual host names
  • Testing host names
  • Enabling virtual hosts
  • Defining virtual hosts
  • Configuring vitual hosts
  • Using virtual hosts
  • Host aliases
  • Managing many hosts

Dynamic pages with CGI, Perl and PHP

  • Dynamic pages
  • CGI
  • CGI programs
  • Sample Unix shell CGI script
  • Sample Perl CGI script
  • Running CGI programs with Apache
  • CGI parameters
  • Perl CGI parameter example
  • CGI issues
  • PHP scripts
  • Using mod_php
  • PHP configuration
  • PHP compiled code caching, persistent database connections
  • Sample PHP scripts
  • mod_perl
  • Installing and using mod_perl
  • Using ModPerl::Registry and ModPerl::PerlRun
  • ModPerl::Registry v CGI Perl, speedup comparison
  • Perl persistent database connections
  • Other mod_perl features

Using modules

  • Modules
  • Loading modules
  • mod_speling
  • Which Modules Got Loaded ?
  • mod_rewrite
  • Why use mod_rewrite ?
  • Rewrite Flags
  • Rewrite Flags Flow Control
  • Rewrite Flags Affect What is Sent to the Browser
  • Rewrite Flags Affect Processing on the Server
  • Internal Rewriting v Redirection
  • Forcing Redirection
  • Transforming URLs
  • Conditional Rewrites
  • RewriteCond File Tests
  • When RewriteCond is done
  • RewriteCond Browser-Dependent Pages
  • RewriteCond Canonical URLS
  • Preventing hot/deep linking
  • Force use of SSL
  • Time based access
  • RewriteMap
  • RewriteMap Example
  • When Container tests and Rewrites are performed
  • Deploying mod_rewrite
  • Redirecting: mod_alias
  • Per User Directories: mod_userdir
  • Per User Directories: Better Security
  • Directory Listings: mod_autoindex
  • Directory Listings: IndexOptions
  • Monitor Apache Performance with mod_status

Web Proxy with mod_proxy

  • mod_proxy
  • Forward Proxy
  • Reverse Proxy / Gateway
  • mod_proxy Support
  • Proxy Modules And Other Related Modules
  • Configuring a Forward Proxy
  • Storage of Cached Pages
  • Conguring What to Proxy Where
  • Configuring a Reverse Proxy
  • Basic Reverse Proxy Config
  • Load Balancing with mod_proxy_balancer, worked example
  • mod_proxy_balancer cluster manager
  • Proxying by Rewriting
  • Backend Optimisations
  • Access to the Proxy Server

Tomcat with mod_jk connector

  • Tomcat overview
  • J2EE platform overview
  • Apache JServ Protocol (Ajp)
  • Installing Tomcat with Apache
  • Testing Tomcat, Welcome Page
  • Connecting Apache and Tomcat
  • Using the Proxy connector
  • Using the mod_jk connector
  • Dynamic pages, servlets and JSP
  • Java Servlets
  • Servlet/JSP Containers
  • Servlets v CGI
  • Sample JSP

Serving pages using HTTPS with mod_ssl

  • HTTP security
  • HTTPS
  • Installing mod_ssl
  • Getting a certificate
  • Configuring mod_ssl
  • HTTP and HTTPS sites cohabiting
  • HTTP and HTTPS virtual hosts
Intro to Apache Web Server Administration
Training Intro to Apache Web Server Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training SUSE Linux Enterprise Server 11 Administration – 5 days

Class overview :

SUSE Linux Enterprise Server is a highly reliable, interoperable and manageable server operating system that enables firms to cost-effectively and securely deliver mission critical services. In this class you will learn the tasks essential to server administration.

Class goals :

Delegates will learn how to:

  • Install and configure SUSE Linux Enterprise Server 11
  • Manage printing
  • Configure a web server
  • Perform health checks
  • And much more

Content of SUSE Linux Enterprise Server 11 Administration

Configure Fundamental Networking Services

Manage Printing

Configure and Use Open LDAP

Configure and Use Samba

Configure a Web Server

Configure and Use IPv6

Perform a Health Check and Performance Tuning

Create Shell Scripts

Deploy SUSE Linux Enterprise

Xen

LiveFire Exercise

SUSE Linux Enterprise Server 11 Administration
Training SUSE Linux Enterprise Server 11 Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training PostgreSQL Administration using Navicat – 2 days

Class overview :

This course covers the installation and use of Navicat for administering PostgreSQL database. It will cover the administration, tuning, backup and recovery of PostgreSQL databases using the Navicat Database Administration Tool.

Class goals :

This course covers the installation and use of Navicat for administering PostgreSQL database. It will cover the administration, tuning, backup and recovery of PostgreSQL databases using the Navicat Database Administration Tool.

Content of PostgreSQL Administration using Navicat

INavicat for PostgreSQL – installation and configuration

Configuring connectivity

  • SSL vs. non SSL
  • Tunneling connections through SSH
  • Understanding Connection keep-alives
  • connection parameter storage

Navicat and Cluster Management

  • Adding and dropping databases
  • Configuring database defaults
  • Carrying out database VACCUUM and ANALYZE operations
  • Duplicating database objects

Using server monitor to modify and manage systems

Backup and Recovery

  • creating backups
  • Converting a backup files into an SQL Script
  • Running recovery scripts
  • Exporting data using Navicat Data export tools

Working with the Navicat Data Viewer/Editor

  • Form and Grid Views
  • BLOB and large text editing
  • custom display formats
  • Sorting & Searching
  • Following Primary Key – Foreign key relationships
  • more complex record filtering

Working with the Navicat Query Builder

  • Overview and features – Syntax highlighting. SQL code completion
  • SQL console
  • Navicat Query logging

Importing and exporting data

  • importing via ODBC
  • importing data from MS-Excel, CSV, Text, DBF …
  • exporting data to Excel, Access, PDF, HTML

Graphical exploration of database/table structure

Managing schemas, view and stored procedures

Managing privileges amd access control

  • visual user manager
  • cloning users and their permissions
  • group membership management

Overview of the Navicat Report Management Tools

  • Report Builder
  • Report Viewer
PostgreSQL Administration using Navicat
Training PostgreSQL Administration using Navicat

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Automating Administration with Windows PowerShell 2.0 – 5 days

Class overview :

This course provides students with the knowledge and skills to utilize Windows PowerShell for administering and automating administration of Windows based servers.

Class goals :

On completion of this training course, delegates should be able to:

  • Explain how Windows PowerShell works
  • Use Windows PowerShell as an interactive, command-line shell
  • Use Core Windows PowerShell cmdlets for everyday purpose
  • Customize the output using Windows PowerShell Formatting Subsystem
  • Explain what Windows Management Instrumentation (WMI) is and how it can be used from Windows PowerShell
  • Manage Active Directory objects using Windows PowerShell cmdlets
  • Write basic Windows PowerShell scripts that execute batches of commands
  • Work with Windows PowerShell’s background jobs and remote administration functionality
  • Master the scripting language of Windows PowerShell
  • Use advanced techniques related to structured programming within Windows PowerShell
  • Automate Windows Server 2008 R2 Administration using Windows PowerShell
  • Identify the best practices for working with Windows PowerShell

Content of Automating Administration with Windows PowerShell 2.0

Fundamentals for Using Windows PowerShell v2

This module provides background on Windows PowerShell v2 and where it fits into the Windows technology family. It also covers installation and configuration of Windows PowerShell. It familiarizes students with the interactive shell console, and shows how to operate and interpret the built-in help system. This module focuses on shell’s discoverability features, including the online help system and cmdlet inventory. Finally, this module describes how the Windows PowerShell pipeline works at a basic level.

  • Windows PowerShell Technology Background and Overview
  • Windows PowerShell as an Interactive Command-Line Shell
  • Using the Windows PowerShell Pipeline
  • Lab: Using Windows PowerShell as an Interactive Command-Line Shell
  • Searching for text files
  • Browsing the registry
  • Discovering additional commands and viewing help
  • Adding additional commands to your session
  • Formatting output
  • Lab: Using the Windows PowerShell Pipeline
  • Stopping and restarting a Windows service
  • Exploring objects returned by PowerShell commands
  • Processing PowerShell output

Core Windows PowerShell Cmdlets

This module describes several core cmdlets that are used in many different administrative tasks. This module also covers the basics of filtering objects that are in the PowerShell pipeline. It explains advanced pipeline techniques including pipeline parameter binding and in-pipeline object manipulation.

  • Core Cmdlets for Everyday Use
  • Comparison Operators, Pipeline Filtering, and Object Enumeration
  • Advanced Pipeline Techniques
  • Lab: Using the Core Cmdlets
  • Sorting and selecting objects
  • Retrieving objects remotely and saving to a file
  • Comparing objects with XML
  • Saving objects to a CSV file
  • Measuring a collection of objects
  • Exporting a collection of objects to a text file
  • Lab: Filtering and Enumerating Objects in the Pipeline
  • Comparing numbers (integer objects)
  • Comparing string objects
  • Retrieving processes from a computer
  • Retrieving services from a computer
  • Iterating through a list of objects
  • Lab: Using Pipeline Parameter Binding
  • Using advanced pipeline features
  • Binding properties to parameters
  • Working with multiple computers
  • Stopping a list of processes

Understanding and Using the Formatting System

This module explains how the PowerShell formatting subsystem works, and shows how to customize the output of cmdlets. It covers the rules that the shell follows for formatting objects by default, and explains how to use the four formatting cmdlets – and their parameters – to customize and control the output displayed on-screen or written to a file, printer, or other output destination.

  • Understanding the Formatting System
  • Using the Formatting System
  • Lab: Using the Formatting Subsystem
  • Displaying calculated properties
  • Displaying a limited number of columns
  • Displaying all properties and values of objects
  • Viewing objects via HTML
  • Displaying a limited number of properties
  • Displaying objects using different formatting
  • Displaying a sorted list of objects

Windows Management Instrumentation

This module explains what Windows Management Instrumentation (WMI) is, how it works, and how it can be used from within Windows PowerShell. It describes the structure and security of WMI, and how to query WMI information both from local and remote computers. It also explains how to invoke WMI methods to accomplish configuration changes and other tasks, and how to write commands that respond to WMI events triggered by the operating system.

  • Windows Management Instrumentation Overview
  • Using Windows Management Instrumentation
  • Advanced WMI Techniques
  • Lab: Using WMI in Windows PowerShell
  • Building computer inventory
  • Discovering the WMI classes and namespaces
  • Generating a logical disk report for all computers
  • Listing local users and groups
  • Lab: Using Advanced WMI Techniques
  • Learning about WMI class capabilities
  • Changing properties and state on a remote service using WMI
  • Looking up and storing remote security event log information
  • Remotely checking hard disk integrity
  • Monitoring WMI events
  • Looking up static IP addresses on all computers

Automating Active Directory Administration

This module introduces the concept of Active Directory administrative automation. It explains how to retrieve, create, modify, move, and remove objects in the Active Directory. It focuses on PowerShell-centric techniques rather than scripting, and heavily leverages on basic and advanced pipeline techniques covered in previous modules.

  • Active Directory Automation Overview
  • Managing Users and Groups
  • Managing Computers and Other Directory Objects
  • Lab: Managing Users and Groups
  • Retrieving a filtered list of users from Active Directory
  • Resetting user passwords and address information
  • Disabling users that belong to a specific group
  • Browsing Active Directory using the AD drive and moving a user to a new Organizational Unit
  • Lab: Managing Computers and Other Directory Objects
  • Listing all computers that appear to be running a specific operating system according to Active Directory information
  • Creating a report showing all Windows Server 2008 R2 servers
  • Managing fine-grained password policies in Active Directory
  • Discovering Organizational Units that are not protected against accidental deletion

Windows PowerShell Scripts

This module introduces basic Windows PowerShell scripts that execute a batch of shell commands in a single operation. It points out the security concerns associated with scripting, and how to configure and control the shell’s security settings that relate to scripting. It also explains how to write basic scripts that execute batches of commands, and how to parameterize scripts in order to make them more flexible in a variety of situations

  • Script Security
  • Basic Scripts
  • Parameterized Scripts
  • Lab: Writing Windows PowerShell Scripts
  • Executing scripts
  • Using positional script parameters
  • Using named script parameters

Module 7: Background Jobs and Remote Administration

This module explains how to work with Windows PowerShell’s background jobs and remote administration functionality. It shows how to create, monitor, and manage local background jobs, and receive results from completed jobs. It also covers how to configure Windows PowerShell remoting both locally and in a domain environment. This module describes how to create and manage session connections to remote computers, and explain how to use those session connections in one-to-one remote shell instances as well as one-to-many remote command invocation. Finally, it shows how to invoke remote commands as background jobs, and how to manage those jobs and receive results from them.

  • Working with Background Jobs
  • Using Windows PowerShell Remoting
  • Lab: Working with Background Jobs
  • Using background jobs with WMI
  • Using background jobs for local computers
  • Receiving the results from a completed job
  • Removing a completed job
  • Waiting for a background job to complete
  • Stopping a background job before it completes
  • Working with the properties of a job
  • Lab: Using Windows PowerShell Remoting
  • Interactive remoting
  • Fan-out remoting
  • Fan-out remoting using background jobs
  • Saving information from background jobs

Intermediate Scripting

This module explains the concepts and techniques related to structured scripting and programming within Windows PowerShell. It describes how to create, manage, and use variables. It also introduces the complete « scripting language » of Windows PowerShell, which consists of several programming constructs.

  • Variables, Arrays, Escaping, and More Operators
  • What is Scope?
  • Scripting Constructs
  • Lab: Using Variables and Arrays
  • Creating variables and interact with them
  • Understanding arrays and hashtables
  • Using Single- and double-quoted strings and the backtick
  • Using Arrays and array lists
  • Using ‘Contains’, ‘like’, and ‘equals’ operators
  • Lab : Using Scripting Constructs
  • Processing and validating input
  • Working with For, While, ForEach, and Switch
  • Exploiting the power of the one-liner

Error Handling, Debugging, and Modularization

This module covers advanced topics and techniques related to structured programming within Windows PowerShell. It explains how to trap and handle errors that occur during script execution, and also describes the proper techniques and practices for debugging a script that is not executing as expected. It also shows how to modularize scripts into a variety of reusable functions, with the ultimate goal of producing a function that mimics the structure of a shell cmdlet.

  • Error Trapping and Handling
  • Debugging Techniques
  • Modularization
  • Lab: Error Trapping and Handling
  • Retrieving error information
  • Handling errors
  • Integrating error handling
  • Lab: Debugging a Script
  • Debugging from the Windows PowerShell console
  • Debugging using the Windows PowerShell ISE
  • Lab: Modularization
  • Generating an inventory audit report
  • Testing network performance

Automating Windows Server 2008 R2 Administration

This module gives an opportunity to complete several real-world administration tasks related to Windows Server 2008 R2. It provides minimal instruction in how to use the cmdlets and techniques required to accomplish the lab portion of this module; instead, it lets students rely on the skills they have learned in the preceding modules of this course.

  • Windows Server 2008 R2 Modules Overview
  • Server Manager Cmdlets Overview
  • Group Policy Cmdlets Overview
  • Troubleshooting Pack Overview
  • Best Practices Analyzer Cmdlets Overview
  • IIS Cmdlets Overview
  • Lab: Using the Server Manager Cmdlets
  • Listing all currently installed features
  • Comparing objects
  • Installing a new server feature
  • Removing a server feature
  • Exporting current configuration to XML
  • Lab: Using the Group Policy Cmdlets
  • Listing all the Group Policy Objects in the domain
  • Creating a text-based report
  • Creating an HTML report
  • Taking Backup of all Group Policy Objects
  • Lab: Using the Troubleshooting Pack Cmdlets
  • Importing the Troubleshooting Pack module
  • Solving an end-user problem interactively
  • Solving a problem using answer files
  • Lab: Using the Best Practice Analyzer Cmdlets
  • Importing the Best Practice module
  • Viewing existing models
  • Running a Best Practices scan
  • Lab: Using the IIS Cmdlets
  • Importing the IIS module
  • Creating a new web site
  • Backing up IIS
  • Modifying web site bindings
  • Using the IIS PSDrive
  • Restoring an IIS Configuration

Advanced Windows PowerShell Tips and Tricks

This module introduces several advanced Windows PowerShell techniques. While these techniques do not contribute directly to any particular business goal, they do enable more efficient use of the shell itself, which leads to more efficient administration and automation. It shows how to use profiles to consistently configure the shell environment, and how to use several techniques for effectively re-using and sharing existing modularized scripts. It also points out best practices and techniques related to script documentation.

  • Using Profiles
  • Re-Using Scripts and Functions
  • Writing Comment-Based Help
  • Lab: Advanced PowerShell Tips and Tricks
  • Writing a profile script
  • Creating a script module
  • Adding help information to a function

Practical Administrative Automation

This module allows students to practice all of the skills they have learned in this course in a series of practical, real-world tasks. These tasks will require students to use everything they have learned in this course, including the ability to discover new cmdlets and learn how they work – without using external references. This module is intended to serve as a form of « confidence course », enabling students to prove to themselves that they can return to their work environment and begin accomplishing tasks in Windows PowerShell without further instruction.

  • Practical Lab Overview
  • Further Exploration
  • Lab: New User Provisioning
  • Creating an Active Directory user account
  • Adding users to security groups
  • Creating a home folder
  • Copying files to the home folder
  • Creating IIS virtual directories
  • Automating Workflow
Automating Administration with Windows PowerShell 2.0
Training Automating Administration with Windows PowerShell 2.0

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …