In this Citrix XenServer 6.0 training course, students are provided the foundational knowledge necessary to effectively install, configure, administer, and troubleshoot XenServer 6.0 and Provisioning Services 6.0. Students will have the opportunity to apply that foundational knowledge through the use of hands-on labs.
Class goals :
In this Citrix XenServer 6.0 training course, students will learn skills necessary to configure and administer XenServer 6.0, XenCenter, and Provisioning Services 6.0. Through hands-on labs, students will gain experience with:
Installing and Implementing XenServer
Creating and Managing Virtual Machines
Configuring the Network
Configuring Storage
Creating, Configuring, and Managing Resource Pools
Configuring the Distributed Virtual Switch (DVS)
Configuring Workload Balancing (WLB)
Configuring High Availability, Back up, and Restore
Managing and Troubleshooting Hosts
Installing and Configuring Provisioning Services
Managing vDisks
Content of Citrix XenServer 6.0 Administration
Training Citrix XenServer 6.0 Administration
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides the foundation necessary for administrators to effectively centralize and manage desktops in the datacenter and deliver them as a service to users anywhere. Students will learn how to select a desktop delivery model for each user group based on their needs, build proof-of-concept and production XenDesktop environments, assign virtual desktops to users and customize the user experience through policies.
Class goals :
Upon successful completion of this course, learners will be able to:
Determine the best Flexcast delivery model for each user group.
Build a XenDesktop proof-of-concept environment.
Configure a XenServer host for desktop delivery.
Build and configure a production XenDesktop site.
Manage virtual desktops as a single entity by creating a desktop catalog.
Modify a desktop image without impacting user productivity.
Restrict or allow certain XenDesktop features using policies.
Monitor site activity and troubleshoot issues in Desktop Director.
Install and configure Provisioning services.
Copy a desktop image to a virtual disk that can be streamed to virtual and physical target devices.
Identify the XenClient infrastructure.
Install and configure Synchronizer for XenClient.
Content of Citrix XenDesktop 5 Administration
Introducing XenDesktop
Five Core Strengths of XenDesktop
Desktop Virtualization
XenDesktop Product Family
Test Your Knowledge: XenDesktop Product Family
FlexCast
Use Cases
Virtual Desktop Models
Test Your Knowledge: Virtual Desktop Models
HDX Technologies
Hosted Desktop Delivery
Quick Deploy
Quick Deploy System Requirements
To Run Quick Deploy
Configuring the Hypervisor for Desktop Delivery
Virtualization
Virtualization Components
Hypervisors
Hypervisor Role in Desktop Delivery
Test Your Knowledge: The Hypervisor Role in Desktop Delivery
Windows Virtual Machine Architecture
Installation from an ISO
To Create an ISO Library
Windows Virtual Machine Device Support
Windows Virtual Machine Creation
XenServer Tools
Test Your Knowledge: To Create an ISO Library
Test Your Knowledge: Windows Virtual Machine Creation
Templates and Life-Cycle Operations
Virtual Machine Templates
To Provision a New Virtual Machine Using a Template
Virtual Machine Export and Import
Virtual Machine Duplication
Test Your Knowledge: Export, Import, and Copy Virtual Machines
Snapshots
Virtual Machine Operations
XenConvert
To Convert a Server or Desktop to a Virtual Machine
Virtual Machine Resource Management
Events and Alerts
Resource Pools
Virtual Machine Movement
Network Components and Architecture
External Networks
Internal-only Network
NIC Bonds
To Create a NIC Bond in XenCenter
VLANs
Storage
Storage Repositories
Remote Storage
Storage Capability Comparison
Test Your Knowledge: Storage Components
Troubleshooting Hypervisor Issues
Installing and Configuring XenDesktop
XenDesktop Architecture
Production Site Configuration
License File Management
Obtaining License Files
Security Considerations
Active Directory Considerations
Supported Active Directory Environments
Active Directory-Based Controller Discovery
Active Directory Objects
Test Your Knowledge: Active Directory Considerations
Configuring a XenDesktop Site
To Configure a XenDesktop Site
Web Interface
Web Interface Considerations
Desktop Delivery Communication Process
Access Gateway
ICA Proxy Mode
Access Gateway Deployment Scenarios
Access Gateway Communications
Access Gateway Authentication
Single Sign-on to Web Interface
SmartAccess
Managing Desktop Catalogs and Groups
Administration Roles
To Add an Administrator Account
Preparing a Virtual Desktop for Delivery
Virtual Desktop Agent Installation
Virtual Desktop Agent Wizard Settings
Manual Firewall Configuration
Machine Creation Services
Machine Creation Services Host and Storage Requirements
Desktop Catalogs
Machine Types
Pooled Machine Type
Dedicated Machine Type
Existing Machine Type
Physical Machine Type
Streamed Machine Type
Virtual Desktop Updates
To Modify the Master Virtual Machine
To Revert to the Previous Master Virtual Machine
Desktop Groups
Desktop Group Types
Desktop Group Examples
To Create a Desktop Group
Power Management
Pools and Buffers
To Configure Power Management
Troubleshooting Desktop Catalog and Group Issues
Customizing the User Experience
User Device Types
Display Modes
Profile Management
User Profiles
User Profile Types
Redirecting User Data
Managing User Profiles
Profile Management Logon Process
To Enable Profile Management
FlexCast for Apps
Application Delivery Method
Test Your Knowledge: Application Delivery Method
XenDesktop Policies
Policy Creation
To Create a Policy
Policy Settings
Policy Setting Best Practices
Policy Prioritization
Test Your Knowledge: Policies, Printers, and Client Drive Mapping
Troubleshooting Customization Issues
Monitoring XenDesktop Sites
Desktop Director
Installing Desktop Director
Accessing Desktop Director
Desktop Director Pages
Filters
Searching for a User or Machine
User and Machine Management
Managing Machines
Managing End Users
User Shadowing
To Shadow a User
Troubleshooting Site Monitoring Issues
Streaming Desktops to Virtual and Physical Machines
Streamed VHDs and Catalogs
Provisioning Services
Citrix Provisioning Services Infrastructure
Citrix Provisioning Services Components
Key Services
Provisioning Services Administration
Installation Planning
Network Boot Services
Boot Process
DHCP Deployment Options
DHCP Configuration
Provisioning Services Farm Design
Farms
SQL Database Server
Service Account Permissions
Sites
Stores
Write Caches
Storage Requirements
Sample vDisk Storage Requirements
Provisioning Services Installation
To Install Provisioning Services
Provisioning Services Configuration
To Configure a Provisioning Services Farm
Store Configuration
Troubleshooting Provisioning Services Installation and Configuration
Creating a Shared vDisk
vDisk Image Modes
Standard Image Mode
Difference Disk Image Mode
Private Image Mode
Write-Cache Types
Cache on Server Disk
Cache on Server Disk: Local Storage
Cache on Server Disk: Shared Storage
Cache on Device’s Hard Drive
Cache on Device’s Hard Drive: Local Storage
Cache on Device’s Hard Drive: Shared Storage
Target Device-based RAM Cache
Target Device RAM
To Create a vDisk
Imaging Wizard
vDisk File Creation
VHD Format
vDisk Mounting
vDisk Formatting
Master Target Device
Boot Order
Master Target Device Software
To Create a Windows Master Target Device using the Imaging Wizard
XenConvert Overview
To Image Windows Target Devices with XenConvert
Troubleshooting vDisk Creation Issues
Administering Provisioning Services Components
Provisioning Services Hosts in the Console
Target Device Connections
Provisioning Services Host Properties
Target Device Management
Target Device Collection
Target Device Views
Target Device Properties
Active Directory Integration
To Manage Domain Passwords
Automatic Password Renegotiation
To Integrate Active Directory
Test Your Knowledge: Active Directory Login Issue
vDisk Management
vDisk Properties
To Create a vDisk File
To Unassign vDisks from Target Devices
To Delete a vDisk
vDisk Locks
vDisk Backup
Streamed Desktop Catalogs
To Create a Streamed Desktop Catalog
vDisk Updates
Automatic Update
Incremental Update
Autoupdate Tool
Incremental Update Rollback
Scheduled vDisk Updates
vDisk Update Strategies
Troubleshooting Provisioning Services Issues
Delivering Local VM Desktops
Local VM Desktops with XenClient
XenClient Architecture
Synchronizer for XenClient
Test Your Knowledge: XenClient Components
XenClient Installation
To Install XenClient
XenClient Configuration
Receiver for XenClient
To Create a Virtual Machine
XenClient Tools
Synchronizer Installation and Configuration
Image Management
To Upload a Virtual Machine to the Synchronizer
To Assign Desktops to End Users
User Management
To Create a Local User or Group
To Link an Existing AD User or Group
Device Management
XenClient User Experience
Secure Application Sharing
Troubleshooting Local VM Desktop Issues
Training Citrix XenDesktop 5 Administration
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides learners with the skills necessary to monitor, maintain, optimize and troubleshoot Citrix XenApp 6.5 environments running on Windows Server 2008 R2 software. Learners are introduced to the tools used to monitor the XenApp farm, record farm activity and generate reports.
Class goals :
On completion of this course, students will have learnt about:
Troubleshooting the XenApp environment
Scaling the XenApp environment
Creating farm redundancy
Maintaining the XenApp environment
Optimizing the XenApp environment
Optimizing printing
Monitoring XenApp with standard utilities
Monitoring XenApp with EdgeSight
Securing XenApp
Content of Citrix XenApp 6.5 Advanced Administration
Module 1: Troubleshooting the XenApp Environment
Troubleshooting Methodology
Logon Issues
User Sessions
Server Resources
Exercise 1-1: Troubleshooting an AppCenter Issue
Exercise 1-2: Troubleshooting Web Interface and XML Issues
Exercise 1-3: Troubleshooting Launching a Hosted Application
In this course, students will learn the skills necessary to configure and administer Citrix XenServer 5.6, Citrix XenCenter, and Citrix Provisioning Services 5.6. Through hands-on labs, students will gain experience configuring a XenServer virtualization server; creating XenServer resource pools and connecting to remote storage; using XenMotion and automatic virtual machine placement; and creating, assigning and administering virtual disks.
Class goals :
Upon successful completion of this course, learners are able to demonstrate the following objectives:
This course provides the foundation to manage, configure and monitor advanced features and components of Citrix NetScaler 9.0 Platinum Edition. Interactive discussion and hands-on labs guide learners through advanced administration tasks such as troubleshooting, configuring application security with the Citrix Application Firewall feature, tuning the NetScaler for high traffic, configuring Authentication Authorization and Accounting for system management, and configuring Advanced Policies using service callouts.
Class goals :
Upon successful completion of this course, learners are able to:
Identify common web attacks and vulnerabilities
Write PERL compatible regular expressions
Configure Citrix Application Firewall 9.0 to protect web applications
Troubleshoot Citrix Application Firewall 9.0
Install and configure Citrix EdgeSight for NetScaler to monitor web application performance
Install, configure, and use Citrix Command Center to manage NetScaler devices
Configure and use additional advanced features of NetScaler 9.0 including NetScaler Web Logging, HTTP Callout, and AAA authentication for web applications
Content of Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Application Attacks (Application Attack Description; Goals of Application Attacks; Most Common Types of Web Application Attacks; The Application Firewall Solution; Business Problems)
The Benefits of Application Firewall (Application Layer Protection; Positive Security Model; Negative Security Model; Deep Stream Inspection; Adaptive Learning Engine; Web Application Vulnerabilities; Security Audits and Application Firewalls)
Payment Card Industry Data Security Standard (Importance of PCI; Common Coding Vulnerabilities; PCI-DSS Report; Packet Processing and Inspection; Request Process; Response Process; Deployment Considerations)
Profiles and Policies (Profiles; Policies)
Profiles and Policies
Profiles (Profile Types; Default Profiles; Creating a Profile in the Configuration Utility; Creating a Profile in the Command-Line Interface; Action Settings; Sessionization and Security Checks; Profile Settings; Error Page; HTML Comment Stripping; XML Error Object; Other Profile Settings)
Policies (Policy Creation; Policy Binding; Policy State; Policy Priorities; Creating a Policy in the Configuration Utility; Creating Policies in the Command-Line Interface; Binding and Prioritizing a Policy in the Configuration Utility; Binding Policies in the Command-Line Interface)
Engine Settings
Regular Expressions
Regular Expressions
Forms of Regular Expressions
Using Regular Expressions
Metacharacters and Literal Characters
Metacharacters
Escapes
Quantifiers
Backreferencing
Lookaheads
Regular Expression Scope
Attacks and Protections
Security Checks (Profile Types; Common Security Checks; HTML Security Checks; XML Security Checks; Request-Side and Response-Side Checks)
HTTPS Web Applications
Buffer Overflow Exploits (Goals of a Buffer Overflow Attack; Consequences of a Buffer Overflow Attack)
Buffer Overflow Protection (Default Maximum Values; Modifying Buffer Overflow Settings)
Deny URL Protection (The Deny URL List; Adding a Deny URL in the Command-Line Interface; Deleting a Deny URL in the Command-Line Interface)
SQL Injection (How SQL Injection Works)
HTML SQL Injection Protection (SQL Keywords and Special Characters; Modifying SQL Injection Action Settings; XML SQL Injection Security Check; Cross-Site Scripting; Attacking the Trust Relationship; How Cross-Site Scripting Attacks Work; Results of a Cross-Site Scripting Attack; Preventing Cross-Site Scripting Attacks; HTML Cross-Site Scripting Protection; Cross-Site Scripting Action Settings; Transform Cross-Site Scripts; Check Complete URLs for Cross-Site Scripting; Additional Action Settings; Relaxations; Modifying Cross-Site Scripting Action Settings; Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface; Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface; XML Cross-Site Scripting Security Check)
Command Injection (Command Injection Examples)
Field Format Protection (Field Types and Field Formats; Predefined Field Types; Custom Field Types; Field Format Configuration; Default Field Format; Confidential Fields; Adding a Custom Field Type; Setting a Default Field Type; Modifying Field Format Settings; Adding a Confidential Field; Modifying a Confidential Field)
Cookie Tampering and Poisoning (Types of Cookies; How Cookies Are Added; Web Server Sessions)
Cookie Consistency Protection (Sessionization and Cookies; Relaxations; Adding a Cookie Consistency Relaxation in the Command-Line Interface; Deleting a Cookie Relaxation in the Command-Line Interface)
Form/Hidden Field Manipulation (Example of Hidden Field Manipulation)
Form Field Consistency Protection (Field Consistencies; User Sessions; Adding a Form Field Consistency Relaxation Using the Command-Line Interface; Deleting a Form Field Consistency Relaxation Using the Command-Line Interface)
Forceful Browsing (Forceful Browsing Protection)
Start URLs (The Start URL List; Sessionization and Start URLs; Modify Start URL Check; Adding a Start URL in the Command-Line Interface; Deleting a Start URL in the Command-Line Interface)
Backdoors and Misconfigurations
URL Closure (Enforcing URL Closure in the Configuration Utility; Enforcing URL Closure in the Command-Line Interface)
Identity Theft Attacks (Types of Identity Theft Attacks; Application Firewall Protection Against Identity Theft)
HTTP Connection Management and NetScaler HTTP Behavior (Client Keep-Alive; Connection IP Address Control; Maximum Requests and Maximum Connections; Connection Idle Settings; Trackable Connections)
TCP Buffering (Down-State Flush and Access Down Connection Settings; TCP Optimization; Advertised Window Size; Window Scaling; Selective Acknowledgement)
Surge Queue
Surge Protection (Request and Response Rates; Throttle Rate; Disabling Surge Protection in the Configuration Utility; Disabling Surge Protection for a Service in the Configuration Utility; Setting Thresholds in the Configuration Utility)
Priority Queuing (Enabling Priority Queuing in the Configuration Utility; Creating a Priority Queuing Policy in the Configuration Utility; Binding Priority Queuing Policies in the Configuration Utility; Weighted Queuing)
HTTP Denial-of-Service Protection (Enabling HTTP DoS Protection in the Configuration Utility; Adding a HTTP DoS Policy in the Configuration Utility; Challenged JavaScript Responses; Client Detection Tuning and JavaScript Challenge Response Rate; HTTP DoS Protection Deployment Guidelines; Attack Characteristics)
IP Rate Limiting (Rate Control by Subnet Example; IP Rate Limiting Best Practices)
Authentication, Authorization, and Auditing
Users, Groups and Command Policies (Authentication, Authorization, and Auditing; Systems and AAA Users Groups; Local Accounts; External Authentication)
External Authentication for System Users (Authentication Actions and Policies; Configuring Local Authentication; Configuring External Authentication with Explicit Accounts; Configuring External Authentication with Group Extraction; Creating an External Authentication Policy; Creating local groups in the Command-Line Interface; Binding Groups in the Command-Line Interface; Creating an LDAP Authentication Action in the Command-Line Interface; Creating an Authentication Policy in the Command-Line Interface; Binding the Policy in the Command Line Interface; Authentication Troubleshooting; External Authentication Common Issues)
AAA for Traffic Management (Enabling AAA for Traffic Management; AAA for Application Traffic; Basic AAA Setup for Application Traffic; Workflow for AAA Traffic Management)
Configuration (Creating an Authentication Virtual Server; Creating an Authentication Virtual Server in the Command-Line Interface; Binding an SSL Certificate in the Command-Line Interface; Binding a Virtual Server to an Authentication Policy in the Command-Line Interface; Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface; Configuring Authorization Policies for Traffic Management; Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface; Creating an Authorization Policy to Allow Access
Audit Logging (Audit Logging Troubleshooting)
HTTP Service Callouts
HTTP Callouts
Configuring HTTP Callouts (Configuring HTTP Callouts in the Configuration Utility; Configuring HTTP Callouts in the Command-Line Interface; Callout Examples; HTTP Callout Response Parsing)
HTTP Callout Use Cases (Scenario 1: Filter Clients Based on an IP Address Blacklist; Scenario 2: Fetch and Update Content; HTTP Callout Auditing)
EdgeSight for NetScaler Server Components (Component Installation Scenarios)
EdgeSight for NetScaler Installation Considerations (Installing EdgeSight for Netscaler; SQL Server; SQL Reporting Services; EdgeSight for NetScaler Components; Installing EdgeSight Database Components; Installing EdgeSight Report Console and Data Collector Components; EdgeSight Post-Installation Wizard; Upgrading EdgeSight for NetScaler)
Reporting Services Initial Configuration (NetScaler Configuration Overview; Configuring HTML Injection; Editing the prebody.js script; Configuration Example in the Command-Line Interface; Add NetScaler System to EdgeSight for NetScaler Data Collector; Topology Data Collectors with SSL)
EdgeSight Charts and Reports
EdgeSight Troubleshooting (Troubleshooting OS Components; Troubleshooting HTML Injection; Troubleshooting Injection Request; Troubleshooting Unknown Device; Troubleshooting from the NetScaler Command-Line Interface)
Command Center
Command Center Introduction (Command Center NetScaler Features; NetScaler and WANScaler Support)
Command Center Clients (Connecting to Command Center)
Server Requirements (Disk Space Requirements; MySQL Considerations; MicrosoftSQL Server 2005 Considerations)
Port Setting Requirements (Command Center Installation; Linux Considerations; Installation; Capacity Planning; Backup; Installation Modes; Installation Considerations)
Command Center Functionality (Command Center Home Page; Discovery; Fault Management; Configuration Management; Change Management; Centralized Certificate Management; Performance Monitoring)
Command Center Administration (Security Administration; Administration Operations; Administration Configuration; Server Details)
Command Center Troubleshooting (Microsoft SQL Database Issues; Discovery Issues; Performance Data Issues; Linux Command-Line Interface Access Issues; Reporting Issues)
NetScaler Web Logging
NetScaler Web Logging Introduction (Architecture Overview; Communication Process)
NetScaler System Configuration (Enabling Web Logging in the Configuration Utility; Enabling Web Logging in the Command-Line Interface; Configuring the Buffer Size in the Configuration Utility; Configuring the Buffer Size in the Command-Line Interface)
NSWL Client Installation (Logging System Components; Installing the NSWL Client on Windows; NSWL Options; Windows Service Registry Key)
NSWL Client Configuration (NetScaler IP Addresses; Log Filters; Defining Log Properties; Running NSWL; Verifying the Configuration)
Troubleshooting Web Logging (NSWL Troubleshooting; NetScaler Troubleshooting; Buffer Overflow)
Training Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This CTX1259CI course (also known as: CTX-1259, CTX1259, CTX-1259CI) provides the foundation necessary to effectively deploy and administer Citrix XenApp 5 for Windows Server 2003 and its components, including Web Interface, Application Streaming, Load Manager, Installation Manager and Secure Gateway.
Class goals :
Upon successful completion of this Citrix course, learners are able to perform the following:
Install XenApp in a Windows Server 2003 environment
Install and distribute Citrix XenApp Plugins
Create and customize Web Interface sites
Publish applications, server desktops and content
Configure XenApp Web and XenApp Services sites
Configure, apply and prioritize policies in a XenApp environment
Create and assign load evaluators
Configure printers and printer policies and manage print drivers and printer bandwidth
Create and configure XenApp administrator accounts and their permissions
Configure HDX settings
Configure SecureICA encryption, SSL Relay and Secure Gateway
Install and distribute applications, service packs and hotfixes
Content of Citrix XenApp 5 for Windows Server 2003: Administration
An Apache webserver training course which provides a technical introduction to installing, configuring and managing the Apache web server and to supporting CGI programming on the Apache server.
Class goals :
Content of Intro to Apache Web Server Administration
Getting started
Apache
Webservers
Apache features
Apache versions
Installing Apache
Installing XAMPP
Compiling Apache
Running Apache
Running Apache automatically: Unix/Linux & MS Windows
SUSE Linux Enterprise Server is a highly reliable, interoperable and manageable server operating system that enables firms to cost-effectively and securely deliver mission critical services. In this class you will learn the tasks essential to server administration.
Class goals :
Delegates will learn how to:
Install and configure SUSE Linux Enterprise Server 11
Manage printing
Configure a web server
Perform health checks
And much more
Content of SUSE Linux Enterprise Server 11 Administration
Configure Fundamental Networking Services
Manage Printing
Configure and Use Open LDAP
Configure and Use Samba
Configure a Web Server
Configure and Use IPv6
Perform a Health Check and Performance Tuning
Create Shell Scripts
Deploy SUSE Linux Enterprise
Xen
LiveFire Exercise
Training SUSE Linux Enterprise Server 11 Administration
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course covers the installation and use of Navicat for administering PostgreSQL database. It will cover the administration, tuning, backup and recovery of PostgreSQL databases using the Navicat Database Administration Tool.
Class goals :
This course covers the installation and use of Navicat for administering PostgreSQL database. It will cover the administration, tuning, backup and recovery of PostgreSQL databases using the Navicat Database Administration Tool.
Content of PostgreSQL Administration using Navicat
INavicat for PostgreSQL – installation and configuration
Configuring connectivity
SSL vs. non SSL
Tunneling connections through SSH
Understanding Connection keep-alives
connection parameter storage
Navicat and Cluster Management
Adding and dropping databases
Configuring database defaults
Carrying out database VACCUUM and ANALYZE operations
Duplicating database objects
Using server monitor to modify and manage systems
Backup and Recovery
creating backups
Converting a backup files into an SQL Script
Running recovery scripts
Exporting data using Navicat Data export tools
Working with the Navicat Data Viewer/Editor
Form and Grid Views
BLOB and large text editing
custom display formats
Sorting & Searching
Following Primary Key – Foreign key relationships
more complex record filtering
Working with the Navicat Query Builder
Overview and features – Syntax highlighting. SQL code completion
SQL console
Navicat Query logging
Importing and exporting data
importing via ODBC
importing data from MS-Excel, CSV, Text, DBF …
exporting data to Excel, Access, PDF, HTML
Graphical exploration of database/table structure
Managing schemas, view and stored procedures
Managing privileges amd access control
visual user manager
cloning users and their permissions
group membership management
Overview of the Navicat Report Management Tools
Report Builder
Report Viewer
Training PostgreSQL Administration using Navicat
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides students with the knowledge and skills to utilize Windows PowerShell for administering and automating administration of Windows based servers.
Class goals :
On completion of this training course, delegates should be able to:
Explain how Windows PowerShell works
Use Windows PowerShell as an interactive, command-line shell
Use Core Windows PowerShell cmdlets for everyday purpose
Customize the output using Windows PowerShell Formatting Subsystem
Explain what Windows Management Instrumentation (WMI) is and how it can be used from Windows PowerShell
Manage Active Directory objects using Windows PowerShell cmdlets
Write basic Windows PowerShell scripts that execute batches of commands
Work with Windows PowerShell’s background jobs and remote administration functionality
Master the scripting language of Windows PowerShell
Use advanced techniques related to structured programming within Windows PowerShell
Automate Windows Server 2008 R2 Administration using Windows PowerShell
Identify the best practices for working with Windows PowerShell
Content of Automating Administration with Windows PowerShell 2.0
Fundamentals for Using Windows PowerShell v2
This module provides background on Windows PowerShell v2 and where it fits into the Windows technology family. It also covers installation and configuration of Windows PowerShell. It familiarizes students with the interactive shell console, and shows how to operate and interpret the built-in help system. This module focuses on shell’s discoverability features, including the online help system and cmdlet inventory. Finally, this module describes how the Windows PowerShell pipeline works at a basic level.
Windows PowerShell Technology Background and Overview
Windows PowerShell as an Interactive Command-Line Shell
Using the Windows PowerShell Pipeline
Lab: Using Windows PowerShell as an Interactive Command-Line Shell
Searching for text files
Browsing the registry
Discovering additional commands and viewing help
Adding additional commands to your session
Formatting output
Lab: Using the Windows PowerShell Pipeline
Stopping and restarting a Windows service
Exploring objects returned by PowerShell commands
Processing PowerShell output
Core Windows PowerShell Cmdlets
This module describes several core cmdlets that are used in many different administrative tasks. This module also covers the basics of filtering objects that are in the PowerShell pipeline. It explains advanced pipeline techniques including pipeline parameter binding and in-pipeline object manipulation.
Core Cmdlets for Everyday Use
Comparison Operators, Pipeline Filtering, and Object Enumeration
Advanced Pipeline Techniques
Lab: Using the Core Cmdlets
Sorting and selecting objects
Retrieving objects remotely and saving to a file
Comparing objects with XML
Saving objects to a CSV file
Measuring a collection of objects
Exporting a collection of objects to a text file
Lab: Filtering and Enumerating Objects in the Pipeline
Comparing numbers (integer objects)
Comparing string objects
Retrieving processes from a computer
Retrieving services from a computer
Iterating through a list of objects
Lab: Using Pipeline Parameter Binding
Using advanced pipeline features
Binding properties to parameters
Working with multiple computers
Stopping a list of processes
Understanding and Using the Formatting System
This module explains how the PowerShell formatting subsystem works, and shows how to customize the output of cmdlets. It covers the rules that the shell follows for formatting objects by default, and explains how to use the four formatting cmdlets – and their parameters – to customize and control the output displayed on-screen or written to a file, printer, or other output destination.
Understanding the Formatting System
Using the Formatting System
Lab: Using the Formatting Subsystem
Displaying calculated properties
Displaying a limited number of columns
Displaying all properties and values of objects
Viewing objects via HTML
Displaying a limited number of properties
Displaying objects using different formatting
Displaying a sorted list of objects
Windows Management Instrumentation
This module explains what Windows Management Instrumentation (WMI) is, how it works, and how it can be used from within Windows PowerShell. It describes the structure and security of WMI, and how to query WMI information both from local and remote computers. It also explains how to invoke WMI methods to accomplish configuration changes and other tasks, and how to write commands that respond to WMI events triggered by the operating system.
Windows Management Instrumentation Overview
Using Windows Management Instrumentation
Advanced WMI Techniques
Lab: Using WMI in Windows PowerShell
Building computer inventory
Discovering the WMI classes and namespaces
Generating a logical disk report for all computers
Listing local users and groups
Lab: Using Advanced WMI Techniques
Learning about WMI class capabilities
Changing properties and state on a remote service using WMI
Looking up and storing remote security event log information
Remotely checking hard disk integrity
Monitoring WMI events
Looking up static IP addresses on all computers
Automating Active Directory Administration
This module introduces the concept of Active Directory administrative automation. It explains how to retrieve, create, modify, move, and remove objects in the Active Directory. It focuses on PowerShell-centric techniques rather than scripting, and heavily leverages on basic and advanced pipeline techniques covered in previous modules.
Active Directory Automation Overview
Managing Users and Groups
Managing Computers and Other Directory Objects
Lab: Managing Users and Groups
Retrieving a filtered list of users from Active Directory
Resetting user passwords and address information
Disabling users that belong to a specific group
Browsing Active Directory using the AD drive and moving a user to a new Organizational Unit
Lab: Managing Computers and Other Directory Objects
Listing all computers that appear to be running a specific operating system according to Active Directory information
Creating a report showing all Windows Server 2008 R2 servers
Managing fine-grained password policies in Active Directory
Discovering Organizational Units that are not protected against accidental deletion
Windows PowerShell Scripts
This module introduces basic Windows PowerShell scripts that execute a batch of shell commands in a single operation. It points out the security concerns associated with scripting, and how to configure and control the shell’s security settings that relate to scripting. It also explains how to write basic scripts that execute batches of commands, and how to parameterize scripts in order to make them more flexible in a variety of situations
Script Security
Basic Scripts
Parameterized Scripts
Lab: Writing Windows PowerShell Scripts
Executing scripts
Using positional script parameters
Using named script parameters
Module 7: Background Jobs and Remote Administration
This module explains how to work with Windows PowerShell’s background jobs and remote administration functionality. It shows how to create, monitor, and manage local background jobs, and receive results from completed jobs. It also covers how to configure Windows PowerShell remoting both locally and in a domain environment. This module describes how to create and manage session connections to remote computers, and explain how to use those session connections in one-to-one remote shell instances as well as one-to-many remote command invocation. Finally, it shows how to invoke remote commands as background jobs, and how to manage those jobs and receive results from them.
Working with Background Jobs
Using Windows PowerShell Remoting
Lab: Working with Background Jobs
Using background jobs with WMI
Using background jobs for local computers
Receiving the results from a completed job
Removing a completed job
Waiting for a background job to complete
Stopping a background job before it completes
Working with the properties of a job
Lab: Using Windows PowerShell Remoting
Interactive remoting
Fan-out remoting
Fan-out remoting using background jobs
Saving information from background jobs
Intermediate Scripting
This module explains the concepts and techniques related to structured scripting and programming within Windows PowerShell. It describes how to create, manage, and use variables. It also introduces the complete « scripting language » of Windows PowerShell, which consists of several programming constructs.
Variables, Arrays, Escaping, and More Operators
What is Scope?
Scripting Constructs
Lab: Using Variables and Arrays
Creating variables and interact with them
Understanding arrays and hashtables
Using Single- and double-quoted strings and the backtick
Using Arrays and array lists
Using ‘Contains’, ‘like’, and ‘equals’ operators
Lab : Using Scripting Constructs
Processing and validating input
Working with For, While, ForEach, and Switch
Exploiting the power of the one-liner
Error Handling, Debugging, and Modularization
This module covers advanced topics and techniques related to structured programming within Windows PowerShell. It explains how to trap and handle errors that occur during script execution, and also describes the proper techniques and practices for debugging a script that is not executing as expected. It also shows how to modularize scripts into a variety of reusable functions, with the ultimate goal of producing a function that mimics the structure of a shell cmdlet.
Error Trapping and Handling
Debugging Techniques
Modularization
Lab: Error Trapping and Handling
Retrieving error information
Handling errors
Integrating error handling
Lab: Debugging a Script
Debugging from the Windows PowerShell console
Debugging using the Windows PowerShell ISE
Lab: Modularization
Generating an inventory audit report
Testing network performance
Automating Windows Server 2008 R2 Administration
This module gives an opportunity to complete several real-world administration tasks related to Windows Server 2008 R2. It provides minimal instruction in how to use the cmdlets and techniques required to accomplish the lab portion of this module; instead, it lets students rely on the skills they have learned in the preceding modules of this course.
Windows Server 2008 R2 Modules Overview
Server Manager Cmdlets Overview
Group Policy Cmdlets Overview
Troubleshooting Pack Overview
Best Practices Analyzer Cmdlets Overview
IIS Cmdlets Overview
Lab: Using the Server Manager Cmdlets
Listing all currently installed features
Comparing objects
Installing a new server feature
Removing a server feature
Exporting current configuration to XML
Lab: Using the Group Policy Cmdlets
Listing all the Group Policy Objects in the domain
Creating a text-based report
Creating an HTML report
Taking Backup of all Group Policy Objects
Lab: Using the Troubleshooting Pack Cmdlets
Importing the Troubleshooting Pack module
Solving an end-user problem interactively
Solving a problem using answer files
Lab: Using the Best Practice Analyzer Cmdlets
Importing the Best Practice module
Viewing existing models
Running a Best Practices scan
Lab: Using the IIS Cmdlets
Importing the IIS module
Creating a new web site
Backing up IIS
Modifying web site bindings
Using the IIS PSDrive
Restoring an IIS Configuration
Advanced Windows PowerShell Tips and Tricks
This module introduces several advanced Windows PowerShell techniques. While these techniques do not contribute directly to any particular business goal, they do enable more efficient use of the shell itself, which leads to more efficient administration and automation. It shows how to use profiles to consistently configure the shell environment, and how to use several techniques for effectively re-using and sharing existing modularized scripts. It also points out best practices and techniques related to script documentation.
Using Profiles
Re-Using Scripts and Functions
Writing Comment-Based Help
Lab: Advanced PowerShell Tips and Tricks
Writing a profile script
Creating a script module
Adding help information to a function
Practical Administrative Automation
This module allows students to practice all of the skills they have learned in this course in a series of practical, real-world tasks. These tasks will require students to use everything they have learned in this course, including the ability to discover new cmdlets and learn how they work – without using external references. This module is intended to serve as a form of « confidence course », enabling students to prove to themselves that they can return to their work environment and begin accomplishing tasks in Windows PowerShell without further instruction.
Practical Lab Overview
Further Exploration
Lab: New User Provisioning
Creating an Active Directory user account
Adding users to security groups
Creating a home folder
Copying files to the home folder
Creating IIS virtual directories
Automating Workflow
Training Automating Administration with Windows PowerShell 2.0
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …