Tag Archives: PC

Training J 2Object Oriented Analysis And Design Using UML – 5 days

Class overview :

Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process

Class goals :

  • Know the Purpose and Parts of the UML
  • Drive the Development of a System Using Use Cases
  • Describe How Objects Interact Using a Sequence Diagram
  • Create Class and Object Diagrams
  • Interface-based Design
  • Layer your System into Packages
  • Model Dynamic Behavior using Collaboration,

Statechart, and Activity Diagrams

  • Using Component and Deployment Diagrams
  • Manage and Schedule the Software Development Process

Content of J 2Object Oriented Analysis And Design Using UML

Students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:

  • Know the purpose and parts of UML.
  • Drive the development of a system based on Use Cases.
  • Use the CRC method to identify classes.
  • Describe how objects interact using a Sequence Diagram.
  • Create Class and Object Diagrams.
  • Use Interface-based Design.
  • Layer your system into packages.
  • Model Dynamic Behavior using Collaboration,

Statechart, and Activity Diagrams.

  • Use Component and Deployment Diagrams.
  • Manage and Schedule the Software Development Process.
J 2Object Oriented Analysis And Design Using UML
Training J 2Object Oriented Analysis And Design Using UML

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Java 2: Object-Oriented Analysis and Design Using UML introduces the major elements of the Unified Modeling Language and the Unified Software Development Process

Training Java 2: Enterprise Connectivity – 5 days

Class overview :

Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.

Class goals :

  • The Java 2 Enterprise Architecture
  • Essential Concepts
  • Java Database Connectivity (JDBC)
  • Using JDBC
  • The Essentials of Java Server Pages (JSP)
  • Java Server Page Objects
  • The Architecture of Java Server Pages (JSP)
  • Java Servlet Essentials
  • Java Servlets—Construction Time
  • Enterprise Java Bean (EJB) Essentials
  • The Session Bean

Content of Java 2: Enterprise Connectivity

Upon successful completion of this course, students will be able to:

  • Understand the basic architectures for the Java 2 Enterprise Edition and its

implementation architectures.

  • Understand the flow of documents and control on the World Wide Web

(WWW).

  • Describe the structure of Java Database Connectivity (JDBC).
  • Utilize JDBC to connect to a database, retrieve meta data, and execute

SQL queries.

  • Understand how Java Server Pages (JSP) can be used, and how it

compares to Common Gateway Interface (CGI) and Active Server Pages

(ASP).

  • Use JSP objects to manipulate data on the World Wide Web.
  • Understand the elements of the JSP language set, and utilize JSP Action elements and Directives.
  • Describe the Java Servlet lifecycle and utilize Servlet packages.
  • Understand and use the Servlet development process.
  • Understand and implement Enterprise Java Beans (EJB).
  • Understand and implement Session beans.
Java 2: Enterprise Connectivity
Training Java 2: Enterprise Connectivity

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.

Training ADVANCED JAVA PROGRAMMING – 5 days

Class overview :

Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.

Class goals :

Java programmers who wish to increase their depth of knowledge in Java programming and explore the uses of the various advanced packages.

Content of ADVANCED JAVA PROGRAMMING

Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.

ADVANCED JAVA PROGRAMMING
Training ADVANCED JAVA PROGRAMMING

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Client/server applications can be written utilizing both the java.net and java.rmi packages. Security is also covered in detail throughout several chapters including security policies and data encryption. XML parsing is done using the JAXP API. Programmers can use C and C++ functions from their Java programs using JNI. The course ends with several chapters on design patterns and how they can be put to best use in different types of Java applications.

Training Ethical Hacker – 5 days

Class overview :

This program  prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Class goals :

• Developing the hacker’s mind. • Network surveying. • Port scanning. • System identification/OS fingerprinting. • Vulnerability research and verification. • Service identification. • Internet application testing. • Document grinding. • Recognizing security issues within an organization. • Performing legal assessments on remote/foreign networks. • Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor. • Implementing the right tools for each task of the Methodology • Competitive Intelligence. • Exploiting vulnerabilities remotely. • Examining appropriate countermeasures to thwart malicious hacking.

Content of Ethical Hacker

This class will immerse the student into an interactive environment where they will be shown how to scan, test, and secure their own systems. The lab-intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about intrusion detection, policy creation, social engineering, open source intelligence, incident handling, and log interpretation.

Ethical Hacker
Training Ethical Hacker

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

This program  prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

Training Comprehensive HTML5 Training – 4 days

Class overview :

In this comprehensive HTML5 class, you will learn to learn to use HTML5 to develop modern websites.

Class goals :

  • Learn how to start building HTML5 pages today.
  • Learn the major benefits of HTML5.
  • Understand the difference between HTML5 and HTML 4.
  • Become familiar with HTML5′s new elements and attributes.
  • Learn to work with audio and video in HTML5.
  • Learn to work with HTML5′s new Canvas element to create code-based drawings.
  • Learn to use Web Storage for offline applications.
  • Learn to use all the cool new HTML5 form elements.
  • Learn the current state of browser support for HTML5 and how to make your HTML5 sites degrade gracefully.
  • Learn to acquire the users location with the geolocation API.
  • Learn to send messages between web pages and cross-domain with the Web Messaging API.
  • Learn to speed up slow web pages with Web Workers.
  • Learn to implement Drag and Drop.
  • Learn to use Web Applications while offline.
  • Learn to use the XMLHttpRequest Level 2 to access cross-domain resources.
  • Understand Web Sockets.
  • Learn to work with user Server-Sent events to update a web page.

Content of Comprehensive HTML5 Training

  1. Laying out a Page with HTML5
    1. Page Structure
      1. Laying out a Page with HTML 4 – the « old » way
      2. Laying out a Page with HTML5
    2. New HTML5 Structural Tags
    3. Page Simplification
  2. HTML5 – How We Got Here
    1. The Problems HTML 4 Addresses
    2. The Problems XHTML Addresses
    3. The New More Flexible Approach of HTML5 – Paving the Cowpaths
    4. New Features of HTML5
      1. HTML5 and JavaScript
      2. Additional Changes
      3. Modernizr
    5. The HTML5 Spec(s)
    6. Current State of Browser Support
  3. Sections and Articles
    1. The section Tag
      1. The HTML 4 Way
      2. The HTML5 Way
      3. Display of HTML5 Structural Elements
    2. The article Tag
    3. Outlining
      1. Sectioning
    4. Accessibility
  4. HTML5 Audio and Video
    1. Supported Media Types
    2. The audio Element
      1. Audio Formats
      2. Multiple Sources
      3. Audio Tag Attributes
      4. Getting and Creating Audio Files
    3. The video Element
      1. Video Tag Attributes
      2. Creating and Converting Video Files
    4. Accessibility
    5. Scripting Media Elements
    6. Dealing with Non-Supporting Browsers
      1. Graceful Degradation
  5. HTML5 Forms
    1. Modernizr
    2. New Input Types
      1. search
      2. tel
      3. url and email
      4. date/time input types
      5. number
      6. range
      7. min, max, and step attributes
      8. color
    3. HTML5 New Form Attributes
      1. autocomplete
      2. novalidate
    4. Some Other New Form Field Attributes
      1. required
      2. placeholder
      3. autofocus
      4. autocomplete
      5. form
      6. pattern
    5. New Form Elements
      1. datalist
      2. progress and meter
  6. HTML5 Web Storage
    1. Overview of HTML5 Web Storage
    2. Web Storage
      1. Browser Support
      2. Local Storage
      3. Session Storage
      4. Prefixing your Keys
    3. Other Storage Methods
      1. Web Database Storage
      2. Indexed Database API
  7. HTML5 Canvas
    1. Getting Started with Canvas
      1. Context
    2. Drawing Lines
      1. Multiple Sub-Paths
      2. The Path Drawing Process
      3. The fill() Method
    3. Color and Transparency
    4. Rectangles
    5. Circles and Arcs
      1. Radians
    6. Quadratic and Bézier Curves
      1. Practice
    7. Images
      1. drawImage() – Basic
      2. drawImage() – Sprites
    8. Text
      1. Text Properties
  8. Integrated APIs
    1. Offline Application API
      1. Cache Manifest File
      2. The HTML File
      3. Managing ApplicationCache with JavaScript
      4. A Sample Application
    2. Drag and Drop API
  9. Geolocation
    1. What is Geolocation Used for?
    2. Browser Support for geolocation
    3. The Geolocation Object
    4. Geolocation API Methods
    5. PositionOptions Object Properties
    6. Position Interface Attributes
  10. Web Messaging
    1. Web Messaging Methods
    2. Establishing Trust between Domains
    3. Establishing Trust with ORIGIN
    4. Cross Origin Resource Sharing (CORS)
    5. Ports and Channel Messaging
    6. MessagePort Methods
    7. The Message Event Object
    8. Additional Security Checks
  11. Web Workers
    1. Why use Web Workers
    2. What are Web Workers
    3. Features Available to Workers
    4. How do Web Workers work?
    5. The Worker Object
    6. WorkerGlobalScope
    7. WorkerGlobalScope Properties
    8. WorkerGlobalScope Methods
    9. WorkerGlobalScope Events
    10. Browser Support for Web Workers
    11. Types of Web Workers
    12. Terminating the worker from the Worker Script
  12. Drag and Drop
    1. What is Drag and Drop
    2. What is Drag and Drop Used for?
    3. Browser Support for Drag and Drop
    4. Understanding Drag and Drop
    5. Drag and Drop with a Data « payload »
    6. Drag Events
    7. Drop Event
    8. A jQuery UI Drag and Drop Example
  13. Offline Applications
    1. Why do we need offline Applications?
    2. Browser Support for Offline Applications
    3. Emptying the Browser Cache
    4. Understanding applicationCache
    5. The navigator.online property
    6. Associating the Cache Manifest with a Web Page
  14. XMLHttpRequest Level 2
    1. What is XmtlHttpRequest (XHR)?
    2. Benefits of XHR Level 2
    3. The XHR object: States
    4. The XHR object: Event Handlers
    5. The XHR Object: Methods
    6. The XHR object: Properties
  15. Web Sockets
    1. HTTP
    2. The Web Socket
    3. WebSocket Properties
    4. Web Socket Event Handlers
    5. WebSocket Methods
    6. Using a WebSocket Server with the WebSocket API
  16. Server-Sent Events
    1. What are Server Sent Events?
    2. The Server Messages
    3. Creating an EventSource
    4. The EventSource Properties
    5. The EventSource Events
    6. The Advantages of Server-Sent Events
    7. The Disadvantages of Server-Sent Events
    8. Server-Sent Events Summary
Comprehensive HTML5 Training
Training Comprehensive HTML5 Training

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

In this comprehensive HTML5 class, you will learn to learn to use HTML5 to develop modern websites.

Training HTML5 Training for Managers – 2 days

Class overview :

This HTML5 training class is for people who need to have a better understanding of HTML5, but are not going to be writing HTML5 code themselves (or at least not yet). It covers the structural differences between HTML5 and HTML 4 and addresses the benefits of HTML5 and the current state of HTML5 support.

Class goals :

  • Learn the benefits and purpose of HTML5.
  • Learn the differences between HTML5 and HTML 4 and XHTML.
  • Learn the state of browsers and other device support for HTML5.
  • Learn how to embed video in HTML5.

Content of HTML5 Training for Managers

  1. What is HTML5
    1. Time Line History HTML 1995 to 2010
    2. Review Standard for HTML, XHTML, and the HTML DOM
    3. Previous version of HTML came in 1999
    4. Goal is to reduce the need for proprietary RIA technologies, Adobe Flash, Microsoft Silverlight and Sun JavaFX
    5. Still a work in progress
    6. Able to develop more powerful multimedia
    7. Relies heavily on JavaScript
    8. Some elements that have been dropped from HTML 4.01
    9. Syntax is no longer based on SGML
    10. Application Focused
    11. Error Handling
    12. What HTML5 is, is not, is important
    13. Current State of HTML5
  2. HTML5 vs. HTML 4
    1. Specification
    2. Doctype simplified
    3. Character Encoding
    4. Forms
    5. Integrated APIs
    6. Associated APIs
  3. Rules for HTML5
    1. Some rules for HTML5 were established:
    2. New features should be based on HTML, CSS, DOM, and JavaScript
    3. Reduce the need for external plugins (like Flash)
    4. Better error handling
    5. More markup to replace scripting
    6. HTML5 should be device independent
    7. The development process should be visible to the public
  4. HTML5 New Features
    1. The canvas element for drawing
    2. The video and audio elements for media playback
    3. Better support for local offline storage
    4. New content specific elements, like article, footer, header, nav, section
    5. New form controls, like calendar, date, time, email, url, search
    6. Reduce need for plug-ins
  5. HTML5 Browser Support
    1. For each feature
    2. Code determination of supported features
    3. Fallback content when a browser doesn’t support the element
    4. How to check status of Browsers
    5. Using Modernizr
  6. HTML5 New Elements an Attributes
    1. New elements for better structure
    2. New standard for media content
    3. Canvas element uses JavaScript to make drawings on a web page
    4. More form elements, with more functionality
    5. Input element’s type attribute for better input control before sending it to the server
  7. Demos
    1. Embedding video
    2. Embedding audio
HTML5 Training for Managers
Training HTML5 Training for Managers

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training PHP / Introduction – 4 days

Class overview :

In this PHP training course, students will learn to create database-driven websites using PHP and MySQL or the database of their choice.

Class goals :

Learn how PHP works.
Learn the basic syntax of PHP.
Learn to create dynamic interactive pages with PHP.
Learn to manipulate files with PHP.
Learn to work with arrays in PHP.
Learn to validate forms with PHP.
Learn to write functions in PHP.
Learn to manipulate and manage database data with PHP.
Learn to authenticate users with PHP.
Learn to manage sessions with PHP.
Learn to work with the MDB2 package.
Learn advanced form validation with regular expressions.
Learn to send email with PHP.

Content of Training PHP / Introduction

Class Outline

  1. PHP Basics
    1. How PHP Works
    2. The php.ini File
    3. Basic PHP Syntax
      1. PHP Tags
      2. PHP Statements and Whitespace
      3. Comments
      4. PHP Functions
      5. Hello World!
    4. Variables
      1. Variable Types
      2. Variable Names (Identifiers
      3. Type Strength
      4. Hello Variables!
      5. Variable Scope
      6. Superglobals
      7. Constants
      8. Variable-Testing and Manipulation Functions
    5. First PHP Script
    6. PHP Operators
    7. Creating Dynamic Pages
      1. Single Quotes vs. Double Quotes
      2. Passing Variables on the URL
    8. Passing Variables via the Query String
  2. Flow Control
    1. Conditional Processing
      1. If Conditions
    2. Working with Conditions
    3. Loops
      1. while
      2. do…while
      3. for
      4. break and continue
    4. Working with Loops
  3. Arrays
    1. Enumerated Arrays
      1. Initializing Arrays
      2. Appending to an Array
      3. Reading from Arrays
      4. Looping through Arrays
    2. Working with Enumerated Arrays
    3. Associative Arrays
      1. Initializing Associative Arrays
      2. Reading from Associative Arrays
      3. Looping through Associative Arrays
      4. Superglobal Arrays
    4. Working with Associative Arrays
    5. Two-dimensional Arrays
      1. Reading from Two-dimensional Arrays
      2. Looping through Two-dimensional Arrays
    6. Array Manipulation Functions
  4. PHP and HTML Forms
    1. HTML Forms
      1. How HTML Forms Work
      2. A Sample HTML Form
      3. Form Variables
    2. Processing Form Input
  5. String Manipulation
    1. Formatting Strings
      1. Concatenation
      2. String Manipulation Functions
      3. Examples of String Functions
    2. Working with String Manipulation Functions
    3. Magic Quotes
      1. magic_quotes_gpc
      2. magic_quotes_runtime
      3. Recommendation on Magic Quotes
  6. Reusing Code and Writing Functions
    1. Including Files
      1. require
      2. require_once
      3. auto_prepend_file and auto_append_file
    2. Adding a Header and Footer
    3. User Functions
      1. Defining and Calling Functions
      2. Default Values
      3. Variable Scope
      4. By Reference vs. By Value
    4. Form Processing
      1. Code Organization
    5. Form Validation and Presentation Functions
  7. Managing Data
    1. Querying a Database
      1. mysqli() Overview
      2. mysqli Methods and Properties
      3. Inserting and Updating Records
      4. mysqli Prepared Statements
    2. Inserting Records
  8. MDB2
    1. Advantages and Disadvantages of MDB2
      1. Why use a database abstraction layer?
      2. When not to use a database abstraction layer?
    2. Using MDB2
    3. Creating a Customer Report
  9. Authentication with PHP and SQL
    1. A Database-less Login Form
    2. Authenticating Users
  10. Regular Expressions
    1. Perl-compatible Regular Expression Functions
      1. preg_match()
      2. preg_replace()
      3. Regular Expression Tester
    2. Regular Expression Syntax
      1. Start and End ( ^ $ )
      2. Number of Occurrences ( ? + * {} )
      3. Common Characters ( . d D w W s S )
      4. Grouping ( [] )
      5. Negation ( ^ )
      6. Subpatterns ( () )
      7. Alternatives ( | )
      8. Escape Character ( )
    3. Form Validation Functions with Regular Expressions
  11. Session Control and Cookies
    1. Sessions
      1. Configuring Sessions
      2. Session Functions
    2. Cookies
    3. Authentication with Session Control
  12. Sending Email with PHP
    1. mail()
      1. Shortcomings of mail()
    2. PHPMailer
    3. Sending a Password by Email
  13. File System Management
    1. Opening a File
      1. fopen()
    2. Reading from a File
      1. fgets()
    3. Writing to a File
      1. fwrite()
    4. Writing to a File
    5. File Locking
      1. flock()
    6. Uploading Files via an HTML Form
    7. Getting File Information
    8. More File Functions
    9. Directory Functions
      1. Getting a Directory Listing
    10. Creating a Resume Management Page
PHP / Introduction
Training PHP / Introduction

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Citrix Virtualisation (CVE400/CVA500) FastTrack – 5 days

Class overview :

This is an intensive 5-day course combining CVA500 ‘Architecting a Citrix Virtualization Solution’ and CVE400 ‘Engineering a Citrix Virtualization Solution’ courses

Class goals :

Upon completion of this course, learners are able to:

  • Explain the benefits and considerations for VM storage, including local host disk, iSCSI SAN, Fibre Channel SAN and NFS SAN
  • Explain how network considerations, including network topology, utilization requirements and the number of interfaces, affect a virtualization host server
  • Configure network connectivity and storage for the XenServer host
  • Configure a resource pool for optimal performance
  • Identify information in the project documentation that is required for project decision-making purposes
  • Create an order of execution plan that reflects the tasks required to implement the virtual solution and organizational goals
  • Identify the available Provisioning Services server optimizations
  • Install, configure and test a Provisioning Services configuration
  • Configure XenApp for optimal performance in a virtualized environment
  • Prepare, install and configure a provisioned XenApp server within a Citrix virtualization solution
  • Identify the components that comprise a XenDesktop virtual solution
  • Provision a XenDesktop pool in a virtual solution
  • Identify the uses and differences of EdgeSight for Load Testing, EdgeSight for Endpoints and EdgeSight for XenApp
  • Configure an EdgeSight alert to trigger a Workflow Studio workflow
  • Identify common workflows that can be automated using Workflow Studio
  • Perform a XenApp server upgrade using the vDisk update process
  • Describe the phases of the Citrix Consulting Methodology and distinguish between Assessment and Design projects
  • Determine the type of information to be collected about the existing desktop infrastructure and supporting processes
  • Describe how applications can be delivered within a Citrix virtualization infrastructure
  • Identify the server performance metrics that determine whether a server is a good virtualization candidate
  • Identify areas of the network architecture that should be included in an infrastructure assessment
  • Identify which factors to check when assessing security and the user authentication process
  • Gather data about testing, control and support processes, as well as user issues, backup and recovery plans in an environment
  • Define the purpose of the conceptual architecture diagram, documentation and validation process
  • Evaluate and recommend delivery methods for application types
  • Recognize tuning and optimizations that can improve the performance of the operating system and server
  • Describe the design considerations for the Desktop Delivery Controller and Citrix XenDesktop farms
  • Identify options for providing Provisioning Services bootstrap redundancy and available network optimizations for Provisioning Services
  • Determine the optimal shared storage design to provide high availability for vDisks and the optimal vDisk type to implement in an environment
  • Determine the appropriate network design for a XenServer implementation in an environment
  • Determine how to configure an Access Gateway implementation for an environment
  • Describe general ICA protocol optimization techniques
  • Evaluate design considerations for integrating Branch Repeater into an Access Gateway design
  • Recognize how risk can impact a virtualization solution

Content of Citrix Virtualisation (CVE400/CVA500) FastTrack

Host Server Concepts

  • Key Virtualization Terms
  • Hardware Configuration
  • Memory Considerations
  • CPU Considerations
  • Network Considerations
  • Virtual Machine Management
  • Virtual Machine Migration
  • Identifying Media Storage Considerations
  • Differentiating Between Local Storage and SAN
  • Determining RAM Scalability
  • Determining CPU Scalability
  • Determining Network Interface Strategies
  • Determining HA Priority Levels
  • Identifying Storage Overcommitment Risks

XenServer Integration

  • ISO Storage
  • Pre-Installation Considerations
  • Troubleshooting
  • Configuring XenServer Networking
  • Configuring XenServer Storage
  • Creating a Resource Pool
  • Testing High Availability

Project Planning and Implementation Strategies

  • Project Roles
  • Project Documentation
  • Implementation Planning
  • Implementation Case Studies
  • Identifying Gaps in Documentation
  • Interpreting Project Documentation and Identifying Goals

Provisioning Services Integration

  • Network Support of Streaming
  • Provisioning Services Optimizations
  • Streaming Other Workloads
  • Troubleshooting
  • Installing and Configuring Provisioning Services Server
  • Creating and Configuring the vDisk
  • Testing the Configuration
  • Adding Additional Server to Farm
  • Configuring Load Balancing and HA for Provisioning Services

XenApp Integration

  • Application Delivery
  • XenApp Configurations
  • Provisioning Services with XenApp
  • XenApp Migration
  • Troubleshooting
  • Installing XenApp
  • Provisioning XenApp Servers
  • Configuring XenApp Servers

XenDesktop Integration

  • Virtual Desktop Components
  • Desktop Groups
  • XenDesktop Management
  • NetScaler VPX
  • Troubleshooting
  • Installing the Desktop Delivery Controller
  • Installing the Additional Desktop Delivery Controllers
  • Configuring the XenDesktop Farm
  • Creating a Virtual Desktop VM
  • Provisioning the XenDesktop Pool
  • Configuring the Desktop Group
  • Testing the Desktop Pool
  • Configuring NetScaler VPX

Virtualized Environment Monitoring

  • EdgeSight
  • EdgeSight for Load Testing
  • Installing EdgeSight for Load Testing
  • Installing EdgeSight Server
  • Configuring the EdgeSight Server
  • Installing EdgeSight Agent Database Server
  • Installing EdgeSight Agent on XenDesktop Desktops
  • Configuring EdgeSight
  • Testing the Monitoring Environment

Virtualized Environment Maintenance

  • Workflow Studio Overview
  • Workflow Automation
  • Sample Maintenance Workflows
  • XenApp and XenDesktop Server Backup
  • Configuring a XenServer Metadata Backup Schedule
  • Performing a XenServer Hotfix Update
  • Performing a XenApp Application Update
  • Upgrading a Provisioned XenApp Server
  • Configuring Lab Manager
  • Configuring Citrix Receiver for Citrix Dazzle

Project Management

  • Overview: Objectives
  • Citrix Consulting Methodology
  • Assessment and Design Projects
  • Documentation

Business Goals

  • 3-to-5 Year Plan
  • Growth
  • IT Projects

User Community

  • User Groups
  • Endpoints
  • Usage Habits
  • User Locations
  • User Satisfaction

Operating System Delivery

  • Desktop Images
  • Image Build Process
  • Desktop Maintenance

Application Delivery

  • General Applications
  • Special Applications
  • Application Virtualization

Server Virtualization

  • Current Solution
  • Physical Server Assessment

Infrastructure

  • Server Hardware
  • Network Architecture
  • Windows Server and Active Directory
  • Enterprise Storage
  • Databases

Security and Personalization

  • Authentication
  • Permissions
  • A/V
  • Logon Scripts
  • Profiles
  • Active Directory Policies

Operations and Support

  • Monitoring and Management
  • Testing and Change Control
  • Support
  • Disaster Recovery

Conceptual Architecture

  • Executive Summary
  • Enterprise Design

Virtualization Infrastructure Design

  • Virtualized Components
  • Server Hardware
  • Network Configuration
  • High Availability
  • Storage
  • Resource Pool Design
  • Capacity Planning
  • Physical Server Migration

Operating System Delivery Design

  • Provisioning Services Operating System
  • Hardware
  • Capacity Planning
  • HA
  • Cache
  • Farm Design
  • A/V
  • Bootstrap Redundancy
  • Device Collections
  • Optimization
  • SQL Database
  • vDisk Storage Location
  • Enterprise Storage
  • vDisk Type
  • Write Cache Encryption

Application Delivery Design

  • Applications
  • Integration
  • Application Streaming Cache
  • Optimizations

Desktop Delivery Design

  • Desktop Delivery Controller
  • Farm Design
  • Virtual Machine Specifications
  • Desktop Groups
  • Desktop Images
  • Profiles Design
  • Policy Design
  • Desktop Monitoring

Access Design

  • Resource Delivery
  • Access Scenarios
  • Access Gateway Deployment Modes
  • Server Load Balancing

Delivery Optimization

  • ICA Acceleration
  • WAN Acceleration
  • Branch Repeater and Access Gateway Integration

Business Continuity Design

  • Component Failover
  • Site Failover
Citrix Virtualisation (CVE400/CVA500) FastTrack
Training Citrix Virtualisation (CVE400/CVA500) FastTrack

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Engineering a Citrix Virtualization Solution – 5 days

Class overview :

The CVE-400-2 Engineering a Citrix Virtualization Solution (also known as CVE-4002, CVE4002, CVE-4002) course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate the component technologies that make up a Citrix virtualization solution in a Windows Server 2008 environment.

Class goals :

Upon successful completion of this course, learners will be able to:

  • Explain the benefits and considerations for VM storage, including local host disk, iSCSI SAN, Fibre Channel SAN and NFS SAN.
  • Explain how network considerations, including network topology, utilization requirements and the number of interfaces, affect a virtualization host server.
  • Configure network connectivity and storage for the XenServer host
  • Configure a resource pool for optimal performance
  • Identify information in the project documentation that is required for project decision-making purposes
  • Create an order of execution plan that reflects the tasks required to implement the virtual solution and organizational goals
  • Identify the available Provisioning Services server optimizations
  • Install, configure and test a Provisioning Services configuration
  • Configure XenApp for optimal performance in a virtualized environment
  • Prepare, install and configure a provisioned XenApp server within a Citrix virtualization solution
  • Identify the components that comprise a XenDesktop virtual solution
  • Provision a XenDesktop pool in a virtual solution
  • Identify the uses and differences of EdgeSight for Load Testing, EdgeSight for Endpoints and EdgeSight for XenApp.
  • Configure an EdgeSight alert to trigger a Workflow Studio workflow
  • Identify common workflows that can be automated using Workflow Studio
  • Perform a XenApp server upgrade using the vDisk update process

Content of Engineering a Citrix Virtualization Solution

Host Server Concepts

  • Key Virtualization Terms
  • Hardware Configuration
  • Memory Considerations
  • CPU Considerations
  • Network Considerations
  • Virtual Machine Management
  • Virtual Machine Migration
  • Identifying Media Storage Considerations
  • Differentiating Between Local Storage and SAN
  • Determining RAM Scalability
  • Determining CPU Scalability
  • Determining Network Interface Strategies
  • Determining HA Priority Levels
  • Identifying Storage Overcommitment Risks

XenServer Integration

  • ISO Storage
  • Pre-Installation Considerations
  • Troubleshooting
  • Configuring XenServer Networking
  • Configuring XenServer Storage
  • Creating a Resource Pool
  • Testing High Availability

Project Planning and Implementation Strategies

  • Project Roles
  • Project Documentation
  • Implementation Planning
  • Implementation Case Studies
  • Identifying Gaps in Documentation
  • Interpreting Project Documentation and Identifying Goals

Provisioning Services Integration

  • Network Support of Streaming
  • Provisioning Services Optimizations
  • Streaming Other Workloads
  • Troubleshooting
  • Installing and Configuring Provisioning Services Server
  • Creating and Configuring the vDisk
  • Testing the Configuration
  • Adding Additional Server to Farm
  • Configuring Load Balancing and HA for Provisioning Services

XenApp Integration

  • Application Delivery
  • XenApp Configurations
  • Provisioning Services with XenApp
  • XenApp Migration
  • Troubleshooting
  • Installing XenApp
  • Provisioning XenApp Servers
  • Configuring XenApp Servers

XenDesktop Integration

  • Virtual Desktop Components
  • Desktop Groups
  • XenDesktop Management
  • NetScaler VPX
  • Troubleshooting
  • Installing the Desktop Delivery Controller
  • Installing the Additional Desktop Delivery Controllers
  • Configuring the XenDesktop Farm
  • Creating a Virtual Desktop VM
  • Provisioning the XenDesktop Pool
  • Configuring the Desktop Group
  • Testing the Desktop Pool
  • Configuring NetScaler VPX

Virtualized Environment Monitoring

  • EdgeSight
  • EdgeSight for Load Testing
  • Installing EdgeSight for Load Testing
  • Installing EdgeSight Server
  • Configuring the EdgeSight Server
  • Installing EdgeSight Agent Database Server
  • Installing EdgeSight Agent on XenDesktop Desktops
  • Configuring EdgeSight
  • Testing the Monitoring Environment

Virtualized Environment Maintenance

  • Workflow Studio Overview
  • Workflow Automation
  • Sample Maintenance Workflows
  • XenApp and XenDesktop Server Backup
  • Configuring a XenServer Metadata Backup Schedule
  • Performing a XenServer Hotfix Update
  • Performing a XenApp Application Update
  • Upgrading a Provisioned XenApp Server
  • Configuring Lab Manager
  • Configuring Citrix Receiver for Citrix Dazzle
Engineering a Citrix Virtualization Solution
Training Engineering a Citrix Virtualization Solution

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Implementing Citrix XenApp 5.0 for Windows Server 2008 – 5 days

Class overview :

CXA-201-2I Implementing Citrix XenApp 5.0 for Windows Server 2008 (also known as CXA-201-2I, CXA2012I, CXA-2012I, CXA-2012, CXA2012) provides the foundation necessary to effectively deploy and administer Citrix XenApp and its components, including Web Interface, Application Streaming, Load Manager, Installation Manager, and Secure Gateway.

Class goals :

Upon successful completion of this course, learners are able to demonstrate the following objectives:

  • Install Citrix XenApp
  • Install and distribute Citrix XenApp Plugins for Windows software
  • Create and customize Web Interface sites
  • Publish applications, server desktops and content
  • Configure XenApp Web and XenApp Services sites
  • Create and assign load evaluators
  • Configure printers and printer policies and manage print drivers and printer bandwidth
  • Create and configure XenApp administrator accounts and their permissions
  • Configure display and SpeedScreen settings
  • Configure SecureICA encryption, SSL Relay and Secure Gateway
  • Install and distribute applications, service packs and hotfixes using Installation Manager
  • Identify the key features of Citrix XenApp Platinum Edition additional components

Content of Implementing Citrix XenApp 5.0 for Windows Server 2008

Introducing XenApp 5.0

  • Components of XenApp 5.0
  • Citrix XenApp 5.0 Architecture and Communications
  • Features of XenApp 5.0
  • Management Consoles in XenApp 5.0
  • License Management Console
  • Access Management Console
  • XenApp Advanced Configuration

Installing XenApp

  • XenApp Installation Decisions
  • XenApp Installation
  • Citrix XenApp Plugins for Windows
  • Architecture and Communication
  • Citrix XenApp Plugins Installation
  • Custom Installation Package
  • Citrix XenApp Plugin Usage
    • Using the Citrix XenApp Web Plugin
    • Using the Citrix XenApp Plugin
  • Session Reliability

Installing and Configuring Web Interface

  • Web Interface Architecture and Communications
  • Web Interface Installation
  • Creating XenApp Web Sites
  • XenApp Services Sites
  • Configuring a XenApp Services Site
  • Site Appearance
    • Configuring the Site Appearance
    • Configuring Session Preferences
    • Configuring Workspace Control
  • XenApp Plugins and the Web Interface
    • Configuring Plugin Deployment
    • Configuring Client for Java Settings
  • Authentication Configuration
    • Configuring Explicit Authentication
    • Configuring Pass-Through Authentication
    • Configuring Smart Card Authentication
  • Web Interface Access Methods
    • Configuring an Access Method
  • Client-Side Proxy Setting Configuration
  • Server Configuration
    • Adding Server Farms
    • Configuring Load Balancing
    • Enabling Fault Tolerance
    • Configuring the Citrix XML Service
  • Web Interface Site Removal

Delivering Applications and Content

  • Resource Publishing
    • Publishing Resources
    • Organizing Published Resources for Users
  • Advanced Published Resource Settings
  • Configuring Advanced Access Control Properties
  • Configuring Client-to-Server Content Redirection
  • Configuring Server-to-Client Content Redirection
  • Implementing Resource Limits and Client Options and Configuring Resource Appearance
  • Published Resource Management
    • Viewing Published Resource Usage
    • Modifying Published Resource Properties
    • Disabling or Hiding a Published Resource

Streaming Applications

  • Application Streaming Components Overview
  • Application Streaming Communications
  • XenApp Plugin for Streamed Applications
  • Citrix Streaming Profiler
  • Profile Configuration
    • Setting Profiler Preferences
    • Configuring Profiles
    • Configuring Inter-isolation Communication
    • Viewing and Changing Profile Properties
    • Changing Target Properties
    • Adding a Target to a Profile
    • Deleting a Target from a Profile
    • Upgrading an Application in a Target and Deleting an Obsolete Version of a Target
  • Streaming Application Configuration
    • Publishing a Streamed Application
    • Changing the Application Type
    • Specifying an Alternate Profile for a Published Application
    • Enabling the Least-Privileged User Account and Configuring Sites for Streaming Applications
  • Offline Access Management
    • Providing Offline Access
    • Customizing the Offline License Setting
    • Caching Applications for Offline Access

Configuring Policies in XenApp

  • Architecture and Communication
  • Policies in XenApp
    • Identifying Policy Rules
    • Using the Streamed Application Policy
    • Creating Policies in XenApp
    • Applying Policies Using Filters
  • Policy Administration
    • Prioritizing Policies
    • Using the Policy Search Engine
    • Merging Shadow Policies
    • Common Policy Configuration Missteps

Configuring Load Management

  • Load Balancing Process
  • Preferential Load Balancing
  • Load Calculation
  • Load Evaluator Configuration
    • Creating Custom Load Evaluators
    • Assigning Load Evaluators to Servers and Applications
  • Load Monitoring
    • Monitoring Load Evaluator Usage
    • Monitoring Load Evaluator Rule Activity
    • Logging Load Manager Activity
  • Common Load Management Configuration Missteps

Configuring Printing

  • Architecture and Communication
  • Print Drivers
  • Client Printer Policies
    • Enabling Client Printer Auto-Creation
    • Creating Auto-Retained Printers
    • Creating Permanent Client Printers
    • Creating Auto-Restored Client Printers
  • Network Printers
    • Importing Print Servers
    • Assigning Network Printers to Users
    • Limiting Printer Bandwidth
  • Print Driver Management
    • Replicating Print Drivers
    • Maintaining Print Driver Compatibility Lists
    • Configuring Print Driver Mappings
    • Assigning Printer Creation Settings to Published Applications
  • Common Printing Configuration Missteps

Administrative Configuration

  • Administrative Permissions
    • Adding Administrator Accounts
    • Configuring Administrator Permissions
    • Configuring Folder Permissions
  • Remote Console Connections
    • Enabling Remote Console Connections
  • Configuration Logging
    • Creating the Configuration Logging Database
    • Configuring Configuration Logging

Display and SpeedScreen Configuration

  • Session Performance Configuration
    • Configuring Display Settings
    • Configuring SpeedScreen Browser Acceleration
    • Configuring SpeedScreen Multimedia Acceleration
    • Configuring SpeedScreen Flash Acceleration
    • Configuring SpeedScreen Latency Reduction
    • Configuring SpeedScreen Image Acceleration

XenApp Security

  • ICA Encryption
    • Configuring ICA Encryption in a Policy
    • Configuring ICA Encryption Through a Hosted or Streamed Application
  • Citrix SSL Relay
    • Configuring Citrix SSL Relay
  • Access Gateway
  • Citrix Secure Gateway
    • Using Digital Certificates
    • Installing the Secure Gateway
  • Web Interface Configuration
    • Configuring the Access Method
    • Configuring Secure Gateway Settings
  • Secure Gateway Monitoring
  • Common Security Configuration Missteps

Installing Applications, Service Packs and Hotfixes

  • Application Installation
  • Installation Manager for Citrix XenApp
    • Installing Installation Manager
    • Using Installation Manager
  • Task Management
    • Installing Service Packs and Hotfixes
  • Shadow Key

Platinum Edition Additional Components

  • Application Performance Monitoring Overview
  • EdgeSight Architecture
  • SmartAccess Overview
    • Deploying Access Gateway with XenApp
  • SmartAuditor Overview
  • SmartAuditor Architecture
  • Single Sign-on Overview
  • Password Manager Architecture
  • EasyCall Overview
    • EasyCall Architecture
  • WAN Optimization Overview
  • Reviewing the Branch Repeater Architecture
Implementing Citrix XenApp 5.0 for Windows Server 2008
Training Implementing Citrix XenApp 5.0 for Windows Server 2008

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …