Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process
Class goals :
Know the Purpose and Parts of the UML
Drive the Development of a System Using Use Cases
Describe How Objects Interact Using a Sequence Diagram
Create Class and Object Diagrams
Interface-based Design
Layer your System into Packages
Model Dynamic Behavior using Collaboration,
Statechart, and Activity Diagrams
Using Component and Deployment Diagrams
Manage and Schedule the Software Development Process
Content of J 2Object Oriented Analysis And Design Using UML
Students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:
Know the purpose and parts of UML.
Drive the development of a system based on Use Cases.
Use the CRC method to identify classes.
Describe how objects interact using a Sequence Diagram.
Create Class and Object Diagrams.
Use Interface-based Design.
Layer your system into packages.
Model Dynamic Behavior using Collaboration,
Statechart, and Activity Diagrams.
Use Component and Deployment Diagrams.
Manage and Schedule the Software Development Process.
Training J 2Object Oriented Analysis And Design Using UML
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process
Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.
Class goals :
The Java 2 Enterprise Architecture
Essential Concepts
Java Database Connectivity (JDBC)
Using JDBC
The Essentials of Java Server Pages (JSP)
Java Server Page Objects
The Architecture of Java Server Pages (JSP)
Java Servlet Essentials
Java Servlets—Construction Time
Enterprise Java Bean (EJB) Essentials
The Session Bean
Content of Java 2: Enterprise Connectivity
Upon successful completion of this course, students will be able to:
Understand the basic architectures for the Java 2 Enterprise Edition and its
implementation architectures.
Understand the flow of documents and control on the World Wide Web
(WWW).
Describe the structure of Java Database Connectivity (JDBC).
Utilize JDBC to connect to a database, retrieve meta data, and execute
SQL queries.
Understand how Java Server Pages (JSP) can be used, and how it
compares to Common Gateway Interface (CGI) and Active Server Pages
(ASP).
Use JSP objects to manipulate data on the World Wide Web.
Understand the elements of the JSP language set, and utilize JSP Action elements and Directives.
Describe the Java Servlet lifecycle and utilize Servlet packages.
Understand and use the Servlet development process.
Understand and implement Enterprise Java Beans (EJB).
Understand and implement Session beans.
Training Java 2: Enterprise Connectivity
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.
Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
Class goals :
Java programmers who wish to increase their depth of knowledge in Java programming and explore the uses of the various advanced packages.
Content of ADVANCED JAVA PROGRAMMING
Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
Training ADVANCED JAVA PROGRAMMING
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.
This program prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
Class goals :
• Developing the hacker’s mind. • Network surveying. • Port scanning. • System identification/OS fingerprinting. • Vulnerability research and verification. • Service identification. • Internet application testing. • Document grinding. • Recognizing security issues within an organization. • Performing legal assessments on remote/foreign networks. • Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor. • Implementing the right tools for each task of the Methodology • Competitive Intelligence. • Exploiting vulnerabilities remotely. • Examining appropriate countermeasures to thwart malicious hacking.
Content of Ethical Hacker
This class will immerse the student into an interactive environment where they will be shown how to scan, test, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about intrusion detection, policy creation, social engineering, open source intelligence, incident handling, and log interpretation.
Training Ethical Hacker
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This program prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
This HTML5 training class is for people who need to have a better understanding of HTML5, but are not going to be writing HTML5 code themselves (or at least not yet). It covers the structural differences between HTML5 and HTML 4 and addresses the benefits of HTML5 and the current state of HTML5 support.
Class goals :
Learn the benefits and purpose of HTML5.
Learn the differences between HTML5 and HTML 4 and XHTML.
Learn the state of browsers and other device support for HTML5.
Learn how to embed video in HTML5.
Content of HTML5 Training for Managers
What is HTML5
Time Line History HTML 1995 to 2010
Review Standard for HTML, XHTML, and the HTML DOM
Previous version of HTML came in 1999
Goal is to reduce the need for proprietary RIA technologies, Adobe Flash, Microsoft Silverlight and Sun JavaFX
Still a work in progress
Able to develop more powerful multimedia
Relies heavily on JavaScript
Some elements that have been dropped from HTML 4.01
Syntax is no longer based on SGML
Application Focused
Error Handling
What HTML5 is, is not, is important
Current State of HTML5
HTML5 vs. HTML 4
Specification
Doctype simplified
Character Encoding
Forms
Integrated APIs
Associated APIs
Rules for HTML5
Some rules for HTML5 were established:
New features should be based on HTML, CSS, DOM, and JavaScript
Reduce the need for external plugins (like Flash)
Better error handling
More markup to replace scripting
HTML5 should be device independent
The development process should be visible to the public
HTML5 New Features
The canvas element for drawing
The video and audio elements for media playback
Better support for local offline storage
New content specific elements, like article, footer, header, nav, section
New form controls, like calendar, date, time, email, url, search
Reduce need for plug-ins
HTML5 Browser Support
For each feature
Code determination of supported features
Fallback content when a browser doesn’t support the element
How to check status of Browsers
Using Modernizr
HTML5 New Elements an Attributes
New elements for better structure
New standard for media content
Canvas element uses JavaScript to make drawings on a web page
More form elements, with more functionality
Input element’s type attribute for better input control before sending it to the server
Demos
Embedding video
Embedding audio
Training HTML5 Training for Managers
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
In this PHP training course, students will learn to create database-driven websites using PHP and MySQL or the database of their choice.
Class goals :
Learn how PHP works.
Learn the basic syntax of PHP.
Learn to create dynamic interactive pages with PHP.
Learn to manipulate files with PHP.
Learn to work with arrays in PHP.
Learn to validate forms with PHP.
Learn to write functions in PHP.
Learn to manipulate and manage database data with PHP.
Learn to authenticate users with PHP.
Learn to manage sessions with PHP.
Learn to work with the MDB2 package.
Learn advanced form validation with regular expressions.
Learn to send email with PHP.
Content of Training PHP / Introduction
Class Outline
PHP Basics
How PHP Works
The php.ini File
Basic PHP Syntax
PHP Tags
PHP Statements and Whitespace
Comments
PHP Functions
Hello World!
Variables
Variable Types
Variable Names (Identifiers
Type Strength
Hello Variables!
Variable Scope
Superglobals
Constants
Variable-Testing and Manipulation Functions
First PHP Script
PHP Operators
Creating Dynamic Pages
Single Quotes vs. Double Quotes
Passing Variables on the URL
Passing Variables via the Query String
Flow Control
Conditional Processing
If Conditions
Working with Conditions
Loops
while
do…while
for
break and continue
Working with Loops
Arrays
Enumerated Arrays
Initializing Arrays
Appending to an Array
Reading from Arrays
Looping through Arrays
Working with Enumerated Arrays
Associative Arrays
Initializing Associative Arrays
Reading from Associative Arrays
Looping through Associative Arrays
Superglobal Arrays
Working with Associative Arrays
Two-dimensional Arrays
Reading from Two-dimensional Arrays
Looping through Two-dimensional Arrays
Array Manipulation Functions
PHP and HTML Forms
HTML Forms
How HTML Forms Work
A Sample HTML Form
Form Variables
Processing Form Input
String Manipulation
Formatting Strings
Concatenation
String Manipulation Functions
Examples of String Functions
Working with String Manipulation Functions
Magic Quotes
magic_quotes_gpc
magic_quotes_runtime
Recommendation on Magic Quotes
Reusing Code and Writing Functions
Including Files
require
require_once
auto_prepend_file and auto_append_file
Adding a Header and Footer
User Functions
Defining and Calling Functions
Default Values
Variable Scope
By Reference vs. By Value
Form Processing
Code Organization
Form Validation and Presentation Functions
Managing Data
Querying a Database
mysqli() Overview
mysqli Methods and Properties
Inserting and Updating Records
mysqli Prepared Statements
Inserting Records
MDB2
Advantages and Disadvantages of MDB2
Why use a database abstraction layer?
When not to use a database abstraction layer?
Using MDB2
Creating a Customer Report
Authentication with PHP and SQL
A Database-less Login Form
Authenticating Users
Regular Expressions
Perl-compatible Regular Expression Functions
preg_match()
preg_replace()
Regular Expression Tester
Regular Expression Syntax
Start and End ( ^ $ )
Number of Occurrences ( ? + * {} )
Common Characters ( . d D w W s S )
Grouping ( [] )
Negation ( ^ )
Subpatterns ( () )
Alternatives ( | )
Escape Character ( )
Form Validation Functions with Regular Expressions
Session Control and Cookies
Sessions
Configuring Sessions
Session Functions
Cookies
Authentication with Session Control
Sending Email with PHP
mail()
Shortcomings of mail()
PHPMailer
Sending a Password by Email
File System Management
Opening a File
fopen()
Reading from a File
fgets()
Writing to a File
fwrite()
Writing to a File
File Locking
flock()
Uploading Files via an HTML Form
Getting File Information
More File Functions
Directory Functions
Getting a Directory Listing
Creating a Resume Management Page
Training PHP / Introduction
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This is an intensive 5-day course combining CVA500 ‘Architecting a Citrix Virtualization Solution’ and CVE400 ‘Engineering a Citrix Virtualization Solution’ courses
Class goals :
Upon completion of this course, learners are able to:
Explain the benefits and considerations for VM storage, including local host disk, iSCSI SAN, Fibre Channel SAN and NFS SAN
Explain how network considerations, including network topology, utilization requirements and the number of interfaces, affect a virtualization host server
Configure network connectivity and storage for the XenServer host
Configure a resource pool for optimal performance
Identify information in the project documentation that is required for project decision-making purposes
Create an order of execution plan that reflects the tasks required to implement the virtual solution and organizational goals
Identify the available Provisioning Services server optimizations
Install, configure and test a Provisioning Services configuration
Configure XenApp for optimal performance in a virtualized environment
Prepare, install and configure a provisioned XenApp server within a Citrix virtualization solution
Identify the components that comprise a XenDesktop virtual solution
Provision a XenDesktop pool in a virtual solution
Identify the uses and differences of EdgeSight for Load Testing, EdgeSight for Endpoints and EdgeSight for XenApp
Configure an EdgeSight alert to trigger a Workflow Studio workflow
Identify common workflows that can be automated using Workflow Studio
Perform a XenApp server upgrade using the vDisk update process
Describe the phases of the Citrix Consulting Methodology and distinguish between Assessment and Design projects
Determine the type of information to be collected about the existing desktop infrastructure and supporting processes
Describe how applications can be delivered within a Citrix virtualization infrastructure
Identify the server performance metrics that determine whether a server is a good virtualization candidate
Identify areas of the network architecture that should be included in an infrastructure assessment
Identify which factors to check when assessing security and the user authentication process
Gather data about testing, control and support processes, as well as user issues, backup and recovery plans in an environment
Define the purpose of the conceptual architecture diagram, documentation and validation process
Evaluate and recommend delivery methods for application types
Recognize tuning and optimizations that can improve the performance of the operating system and server
Describe the design considerations for the Desktop Delivery Controller and Citrix XenDesktop farms
Identify options for providing Provisioning Services bootstrap redundancy and available network optimizations for Provisioning Services
Determine the optimal shared storage design to provide high availability for vDisks and the optimal vDisk type to implement in an environment
Determine the appropriate network design for a XenServer implementation in an environment
Determine how to configure an Access Gateway implementation for an environment
Describe general ICA protocol optimization techniques
Evaluate design considerations for integrating Branch Repeater into an Access Gateway design
Recognize how risk can impact a virtualization solution
Content of Citrix Virtualisation (CVE400/CVA500) FastTrack
Host Server Concepts
Key Virtualization Terms
Hardware Configuration
Memory Considerations
CPU Considerations
Network Considerations
Virtual Machine Management
Virtual Machine Migration
Identifying Media Storage Considerations
Differentiating Between Local Storage and SAN
Determining RAM Scalability
Determining CPU Scalability
Determining Network Interface Strategies
Determining HA Priority Levels
Identifying Storage Overcommitment Risks
XenServer Integration
ISO Storage
Pre-Installation Considerations
Troubleshooting
Configuring XenServer Networking
Configuring XenServer Storage
Creating a Resource Pool
Testing High Availability
Project Planning and Implementation Strategies
Project Roles
Project Documentation
Implementation Planning
Implementation Case Studies
Identifying Gaps in Documentation
Interpreting Project Documentation and Identifying Goals
Provisioning Services Integration
Network Support of Streaming
Provisioning Services Optimizations
Streaming Other Workloads
Troubleshooting
Installing and Configuring Provisioning Services Server
Creating and Configuring the vDisk
Testing the Configuration
Adding Additional Server to Farm
Configuring Load Balancing and HA for Provisioning Services
XenApp Integration
Application Delivery
XenApp Configurations
Provisioning Services with XenApp
XenApp Migration
Troubleshooting
Installing XenApp
Provisioning XenApp Servers
Configuring XenApp Servers
XenDesktop Integration
Virtual Desktop Components
Desktop Groups
XenDesktop Management
NetScaler VPX
Troubleshooting
Installing the Desktop Delivery Controller
Installing the Additional Desktop Delivery Controllers
Configuring the XenDesktop Farm
Creating a Virtual Desktop VM
Provisioning the XenDesktop Pool
Configuring the Desktop Group
Testing the Desktop Pool
Configuring NetScaler VPX
Virtualized Environment Monitoring
EdgeSight
EdgeSight for Load Testing
Installing EdgeSight for Load Testing
Installing EdgeSight Server
Configuring the EdgeSight Server
Installing EdgeSight Agent Database Server
Installing EdgeSight Agent on XenDesktop Desktops
Configuring EdgeSight
Testing the Monitoring Environment
Virtualized Environment Maintenance
Workflow Studio Overview
Workflow Automation
Sample Maintenance Workflows
XenApp and XenDesktop Server Backup
Configuring a XenServer Metadata Backup Schedule
Performing a XenServer Hotfix Update
Performing a XenApp Application Update
Upgrading a Provisioned XenApp Server
Configuring Lab Manager
Configuring Citrix Receiver for Citrix Dazzle
Project Management
Overview: Objectives
Citrix Consulting Methodology
Assessment and Design Projects
Documentation
Business Goals
3-to-5 Year Plan
Growth
IT Projects
User Community
User Groups
Endpoints
Usage Habits
User Locations
User Satisfaction
Operating System Delivery
Desktop Images
Image Build Process
Desktop Maintenance
Application Delivery
General Applications
Special Applications
Application Virtualization
Server Virtualization
Current Solution
Physical Server Assessment
Infrastructure
Server Hardware
Network Architecture
Windows Server and Active Directory
Enterprise Storage
Databases
Security and Personalization
Authentication
Permissions
A/V
Logon Scripts
Profiles
Active Directory Policies
Operations and Support
Monitoring and Management
Testing and Change Control
Support
Disaster Recovery
Conceptual Architecture
Executive Summary
Enterprise Design
Virtualization Infrastructure Design
Virtualized Components
Server Hardware
Network Configuration
High Availability
Storage
Resource Pool Design
Capacity Planning
Physical Server Migration
Operating System Delivery Design
Provisioning Services Operating System
Hardware
Capacity Planning
HA
Cache
Farm Design
A/V
Bootstrap Redundancy
Device Collections
Optimization
SQL Database
vDisk Storage Location
Enterprise Storage
vDisk Type
Write Cache Encryption
Application Delivery Design
Applications
Integration
Application Streaming Cache
Optimizations
Desktop Delivery Design
Desktop Delivery Controller
Farm Design
Virtual Machine Specifications
Desktop Groups
Desktop Images
Profiles Design
Policy Design
Desktop Monitoring
Access Design
Resource Delivery
Access Scenarios
Access Gateway Deployment Modes
Server Load Balancing
Delivery Optimization
ICA Acceleration
WAN Acceleration
Branch Repeater and Access Gateway Integration
Business Continuity Design
Component Failover
Site Failover
Training Citrix Virtualisation (CVE400/CVA500) FastTrack
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
The CVE-400-2 Engineering a Citrix Virtualization Solution (also known as CVE-4002, CVE4002, CVE-4002) course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate the component technologies that make up a Citrix virtualization solution in a Windows Server 2008 environment.
Class goals :
Upon successful completion of this course, learners will be able to:
Explain the benefits and considerations for VM storage, including local host disk, iSCSI SAN, Fibre Channel SAN and NFS SAN.
Explain how network considerations, including network topology, utilization requirements and the number of interfaces, affect a virtualization host server.
Configure network connectivity and storage for the XenServer host
Configure a resource pool for optimal performance
Identify information in the project documentation that is required for project decision-making purposes
Create an order of execution plan that reflects the tasks required to implement the virtual solution and organizational goals
Identify the available Provisioning Services server optimizations
Install, configure and test a Provisioning Services configuration
Configure XenApp for optimal performance in a virtualized environment
Prepare, install and configure a provisioned XenApp server within a Citrix virtualization solution
Identify the components that comprise a XenDesktop virtual solution
Provision a XenDesktop pool in a virtual solution
Identify the uses and differences of EdgeSight for Load Testing, EdgeSight for Endpoints and EdgeSight for XenApp.
Configure an EdgeSight alert to trigger a Workflow Studio workflow
Identify common workflows that can be automated using Workflow Studio
Perform a XenApp server upgrade using the vDisk update process
Content of Engineering a Citrix Virtualization Solution
Host Server Concepts
Key Virtualization Terms
Hardware Configuration
Memory Considerations
CPU Considerations
Network Considerations
Virtual Machine Management
Virtual Machine Migration
Identifying Media Storage Considerations
Differentiating Between Local Storage and SAN
Determining RAM Scalability
Determining CPU Scalability
Determining Network Interface Strategies
Determining HA Priority Levels
Identifying Storage Overcommitment Risks
XenServer Integration
ISO Storage
Pre-Installation Considerations
Troubleshooting
Configuring XenServer Networking
Configuring XenServer Storage
Creating a Resource Pool
Testing High Availability
Project Planning and Implementation Strategies
Project Roles
Project Documentation
Implementation Planning
Implementation Case Studies
Identifying Gaps in Documentation
Interpreting Project Documentation and Identifying Goals
Provisioning Services Integration
Network Support of Streaming
Provisioning Services Optimizations
Streaming Other Workloads
Troubleshooting
Installing and Configuring Provisioning Services Server
Creating and Configuring the vDisk
Testing the Configuration
Adding Additional Server to Farm
Configuring Load Balancing and HA for Provisioning Services
XenApp Integration
Application Delivery
XenApp Configurations
Provisioning Services with XenApp
XenApp Migration
Troubleshooting
Installing XenApp
Provisioning XenApp Servers
Configuring XenApp Servers
XenDesktop Integration
Virtual Desktop Components
Desktop Groups
XenDesktop Management
NetScaler VPX
Troubleshooting
Installing the Desktop Delivery Controller
Installing the Additional Desktop Delivery Controllers
Configuring the XenDesktop Farm
Creating a Virtual Desktop VM
Provisioning the XenDesktop Pool
Configuring the Desktop Group
Testing the Desktop Pool
Configuring NetScaler VPX
Virtualized Environment Monitoring
EdgeSight
EdgeSight for Load Testing
Installing EdgeSight for Load Testing
Installing EdgeSight Server
Configuring the EdgeSight Server
Installing EdgeSight Agent Database Server
Installing EdgeSight Agent on XenDesktop Desktops
Configuring EdgeSight
Testing the Monitoring Environment
Virtualized Environment Maintenance
Workflow Studio Overview
Workflow Automation
Sample Maintenance Workflows
XenApp and XenDesktop Server Backup
Configuring a XenServer Metadata Backup Schedule
Performing a XenServer Hotfix Update
Performing a XenApp Application Update
Upgrading a Provisioned XenApp Server
Configuring Lab Manager
Configuring Citrix Receiver for Citrix Dazzle
Training Engineering a Citrix Virtualization Solution
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
CXA-201-2I Implementing Citrix XenApp 5.0 for Windows Server 2008 (also known as CXA-201-2I, CXA2012I, CXA-2012I, CXA-2012, CXA2012) provides the foundation necessary to effectively deploy and administer Citrix XenApp and its components, including Web Interface, Application Streaming, Load Manager, Installation Manager, and Secure Gateway.
Class goals :
Upon successful completion of this course, learners are able to demonstrate the following objectives:
Install Citrix XenApp
Install and distribute Citrix XenApp Plugins for Windows software
Create and customize Web Interface sites
Publish applications, server desktops and content
Configure XenApp Web and XenApp Services sites
Create and assign load evaluators
Configure printers and printer policies and manage print drivers and printer bandwidth
Create and configure XenApp administrator accounts and their permissions
Configure display and SpeedScreen settings
Configure SecureICA encryption, SSL Relay and Secure Gateway
Install and distribute applications, service packs and hotfixes using Installation Manager
Identify the key features of Citrix XenApp Platinum Edition additional components
Content of Implementing Citrix XenApp 5.0 for Windows Server 2008