Tag Archives: server

Training Microsoft SQL Server – 5 days

Class overview :

Implementation and maintenance. This course is intended for professionals who typically pursue careers as database administrators, database developers, or business intelligence developers. Additionally, they can be people who do not work with Microsoft SQL Server as a part of their primary job functions but who want to show their breadth of technology experience, such as developers, systems administrators, and others.

Class goals :

This course measures your ability to accomplish the technical tasks listed below.
-Installing and Configuring SQL Server
-Implementing High Availability and Disaster Recovery
-Supporting Data Consumers
-Maintaining Databases
-Monitoring and Troubleshooting SQL Server Performance
-Creating and Implementing Database Objects

Content of Microsoft SQL Server

Student will learn how to install and configure SQL Server 2005, create databases and database objects, SQL server security, creating views, partitions, and linked servers, transact-SQL programming, working with constraints, triggers, and stored procedures, backup and restore of SQL server with SQL agent jobs, data redundancy and availability, using the service broker,  XML data support, SQL server performance monitoring and tuning, troubleshooting server and database errors.

Microsoft SQL Server
Training Microsoft SQL Server

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Implementation and maintenance. This course is intended for professionals who typically pursue careers as database administrators, database developers, or business intelligence developers. Additionally, they can be people who do not work with Microsoft SQL Server as a part of their primary job functions but who want to show their breadth of technology experience, such as developers, systems administrators, and others.

PIXYSTREE SCS

Rue Beeckmans, 53
1180 Bruxelles

Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Gsm : +32 485 212 722
Email : selossej@pixystree.com

http://www.pixystree.com

Advertisements

Training Oracle SQL 2 users – 4 days

Class overview :

The primary objective of this course is to consider advanced subjects and techniques pertaining to the SQL database language. Even professionals experienced in other implementations of the industry-standard SQL language will benefit from the advanced and Oracle-specific features of SQL discussed in this course.

Class goals :

Learn to use the SQL99 join syntax. Also, performing advanced SQL queries using techniques such as grouping and cube operations.
• Moving beyond basic table definitions, consideration of defining the full range of database objects, such as advanced table definitions, indexes, sequences, views and others.
• Understanding basic database security and object privileges.
• Using the powerful set of built-in SQL functions.
• Protecting the database and extending the basic data model using declarative constraints.
• Developing complex SQL*Plus reports and using SQL*Plus scripts.

Content of Oracle SQL 2 users

The target audience for this course is all Oracle professionals. Further, this course is well suited for non-Oracle professionals already experienced in the SQL but who wish to become acquainted with the unique and advanced features of Oracle SQL. Among the specific groups for whom this course will be helpful are application developers and database administrators.

Oracle SQL 2 users
Training Oracle SQL 2 users

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

The primary objective of this course is to consider advanced subjects and techniques pertaining to the SQL database language. Even professionals experienced in other implementations of the industry-standard SQL language will benefit from the advanced and Oracle-specific features of SQL discussed in this course.

PIXYSTREE SCS

Rue Beeckmans, 53
1180 Bruxelles

Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Gsm : +32 485 212 722
Email : selossej@pixystree.com

http://www.pixystree.com

Training Securing Web Applications, Services and Servers – 4 days

Class overview :

Cybersecurity is a serious challenge today as attackers specifically target Web application vulnerabilities. These vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity.

Class goals :

  • Implement and test secure Web applications in your organization
  • Identify, diagnose and correct the most serious Web application vulnerabilities
  • Configure a Web server to encrypt Web traffic with HTTPS
  • Protect Ajax-powered Web 2.0 applications
  • Secure XML Web services with WS-Security
  • Audit Web application security with manual and automated scanning

Content of Securing Web Applications, Services and Servers

Setting the Stage

  • Defining threats to your Web assets
  • Surveying the legal landscape and privacy issues
  • Exploring common vulnerabilities

Establishing Security Fundamentals

Modeling Web security

  • Achieving Confidentiality, Integrity and Availability (CIA)
  • Performing authentication and authorization

Encrypting and hashing

  • Distinguishing public- and private-key cryptography
  • Verifying message integrity with message digests, digital signatures and digital certificates

Augmenting Web Server Security

Configuring security for HTTP services

  • Managing software updates
  • Restricting HTTP methods

Securing communication with SSL/TLS

  • Obtaining and installing server certificates
  • Enabling HTTPS on the Web server
  • Protecting the exchange of credentials

Detecting unauthorized modification of content

  • Configuring permissions correctly
  • Scanning for file-system changes

Implementing Web Application Security

Employing OWASP resources

  • The Open Web Application Security Project (OWASP) Top Ten
  • Recognizing cybersecurity risks
  • Remediating identified vulnerabilities

Securing database and application interaction

  • Uncovering and preventing SQL injection
  • Defending against an insecure direct object reference
  • Limitations of encrypting database content

Managing session authentication

  • Protecting against session ID hijacking
  • Enforcing URL access control
  • Blocking cross-site request forgery

Controlling information leakage

  • Displaying sanitized error messages to the user
  • Handling request and page faults

Performing input validation

  • Establishing trust boundaries
  • Revealing and removing the threat of cross-site scripting (XSS)
  • Exposing the dangers of client-side validation
  • Preventing E-shoplifting

Enhancing Ajax Security

Ajax features

  • Identifying core Ajax components
  • Exchanging information asynchronously

Assessing risks and evaluating threats

  • Managing unpredictable interactions
  • Exposing JSON vulnerabilities

Securing XML Web Services

Diagnosing XML vulnerabilities

  • Identifying nonterminated tags and field overflows
  • Uncovering Web service weaknesses

Protecting the SOAP message exchange

  • Validating input with an XML schema
  • Encrypting exchanges with HTTPS
  • Implementing WS-Security with a framework
  • Authenticating access to Web services

Scanning Applications for Weaknesses

Operating and configuring scanners

  • Matching patterns to identify faults
  • « Fuzzing » to discover new or unknown vulnerabilities

Detecting application flaws

  • Scanning applications remotely
  • Strategies for testing and scanning
  • Testing Web applications with Netcat, Cryptcat and Wget
  • Intercepting traffic with OWASP WebScarab

Best Practices for Web Security

Adopting standards

  • Reducing risk by implementing proven architectures
  • Handling personal and financial data
  • Developing guidelines for logging

Managing network security

  • Modeling threats to reduce risk
  • Integrating applications with your network architecture

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

PIXYSTREE SCS

Rue Beeckmans, 53
1180 Bruxelles

Tel : +32 2 412 04 10
Fax : +32 2 412 04 19
Gsm : +32 485 212 722
Email : selossej@pixystree.com

http://www.pixystree.com

Training Windows 2008 System Administration – 5 days

Class overview :

This course provides hands on experience installing and configuring Windows Server 2008. Students will perform full and core CD-based standard installation, deploy an image, configure and tune the server and assign roles and services.

Class goals :

Attendees will practice local and remote administration of security, network, data and hardware in hands on labs. After installing an Active Directory domain controller, students will create and assign users, groups, permissions, rights, policies and profiles.

Attendees will configure and troubleshoot the TCP/IP network, create custom consoles and Powershell scripts, and implement a backup strategy. Also covered are many aspects of local security, such as group policy objects (GPO), Encrypting File System (EFS), rights and permissions, Firewall, and Network Level Authentication. Students will learn to use enterprise tools such as Distributed File System (DFS) and File System Resource Manager (FSRM) to facilitate clustering and virtualization. Comprehensive labs and exercises give the students real experience deploying, managing and troubleshooting the Windows 2008 infrastructure.

Content of Windows 2008 System Administration

Windows 2008 System Administration
Training Windows 2008 System Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

This course provides hands on experience installing and configuring Windows Server 2008. Students will perform full and core CD-based standard installation, deploy an image, configure and tune the server and assign roles and services.

Training Windows Server 2008 Active Directory, Group Policy and Security Design – 5 days

Class overview :

Active Directory provides a single administration point for sign-on, policies and authentication control. This hands on course provides experience configuring Active Directory and essential network security components such as AD Certificate Services, IPSec and virtual private networking (VPN).

Class goals :

Students will install Active Directory Domain Services (ADDS), integrate DNS for Active Directory and Internet name resolution, implement AD security for DNS, and configure logical AD components, such as forests, trees, domains and organizational units (OUs). Upgrading and migrating the ADDS structure within or between forests, troubleshooting, backup and restore methods and additional maintenance tools will be explored. Attendees will investigate additional Active Directory roles and services. With ADDS installed, we will monitor and maintain sites and replication to assure up-to-date information.

An administrator needs to control the user environment, so students will look at the architecture, scope, inheritance, replication and troubleshooting in group policy before learning to restrict and enable users with login scripts, rights, desktop policies and software deployment and control. We’ll also look at further controlling computers through security policies, loopback processing, and templates. Attendees will delegate administration of the configuration policies, control application and inheritance and explore tools to refine the user experience. Comprehensive labs and exercises give the students real experience installing and configuring Active Directory while securing the network.

Content of Windows Server 2008 Active Directory, Group Policy and Security Design

  • Introduction to Name Resolution Services
  • Installing and Configuring DNS
  • Managing a Zone
  • Installing and Configuring Active Directory
  • Active Directory Sites and Replication
  • Flexible Single Master Operation (FSMO) Roles
  • Backing Up and Restoring Active Directory
  • Active Directory Support Tools
  • Defining the Active Directory Schema
  • AD Lightweight Directory Services (AD LDS)
  • Implementing Group Policy
  • Group Policy Management Console (GPMC)
  • Understanding User Profiles
  • Implementing Basic Folder Redirection
  • Creating a Starter GPO
  • Public Key Infrastructure (PKI)
  • Granting and Revoking Certificates
  • Security Configuration Wizard (SCW) Basics
  • Configuring NAP Policy Services
  • Configuring NAP Clients
  • Installing and Configuring a Remote Access Server
  • Virtual Private Network (VPN) Configuration
  • Network Policy Server (NPS) Introduction
  • Implementing IPSec
  • Installing and Configuring Internet Information Server (IIS) 7.5
  • Installing ASP.NET
Windows Server 2008 Active Directory, Group Policy and Security Design
Training Windows Server 2008 Active Directory, Group Policy and Security Design

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Active Directory provides a single administration point for sign-on, policies and authentication control. This hands on course provides experience configuring Active Directory and essential network security components such as AD Certificate Services, IPSec and virtual private networking (VPN).

Training Exchange Server 2010 System Administration – 5 days

Class overview :

This course provides hands on experience installing and configuring Exchange Server 2010 and a variety of Microsoft messaging clients. Students will also install and configure Windows Server 2008, Active Directory Domain Services and IIS web services.

Class goals :

Attendees will practice local and remote administration of server roles, network connectivity and user messaging data. After installing Exchange, students will create users and groups, and assign permissions, rights and policies. They will then configure and troubleshoot the Exchange environment using various consoles and management shells. We’ll investigate backup and fault tolerance strategies, as well as security and user access issues. Comprehensive labs and exercises give students real experience deploying, managing and troubleshooting an Exchange Server 2010 infrastructure.

Content of Exchange Server 2010 System Administration

  • Windows Server Installation and Configuration
  • Exchange Server Installation and Configuration
  • Active Directory, DNS and IIS Integration
  • Management Consoles and Shells
  • Exchange Server Roles and Security Management
  • Administrative Management Roles
  • Message and Recipient Management
  • Rights Based Access Control
  • Exchange Backup and Recovery
  • Exchange Database Availability Groups
  • Exchange Server Maintenance, Monitoring and Troubleshooting
  • Outlook, OWA and ActiveSync Installation and Configuration
  • Managing User Email and Calendar Data
  • Managing Global and Personalized Address Lists
Exchange Server 2010 System Administration
Training Exchange Server 2010 System Administration

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

This course provides hands on experience installing and configuring Exchange Server 2010 and a variety of Microsoft messaging clients. Students will also install and configure Windows Server 2008, Active Directory Domain Services and IIS web services.

Training Java 2: Enterprise Connectivity – 5 days

Class overview :

Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.

Class goals :

  • The Java 2 Enterprise Architecture
  • Essential Concepts
  • Java Database Connectivity (JDBC)
  • Using JDBC
  • The Essentials of Java Server Pages (JSP)
  • Java Server Page Objects
  • The Architecture of Java Server Pages (JSP)
  • Java Servlet Essentials
  • Java Servlets—Construction Time
  • Enterprise Java Bean (EJB) Essentials
  • The Session Bean

Content of Java 2: Enterprise Connectivity

Upon successful completion of this course, students will be able to:

  • Understand the basic architectures for the Java 2 Enterprise Edition and its

implementation architectures.

  • Understand the flow of documents and control on the World Wide Web

(WWW).

  • Describe the structure of Java Database Connectivity (JDBC).
  • Utilize JDBC to connect to a database, retrieve meta data, and execute

SQL queries.

  • Understand how Java Server Pages (JSP) can be used, and how it

compares to Common Gateway Interface (CGI) and Active Server Pages

(ASP).

  • Use JSP objects to manipulate data on the World Wide Web.
  • Understand the elements of the JSP language set, and utilize JSP Action elements and Directives.
  • Describe the Java Servlet lifecycle and utilize Servlet packages.
  • Understand and use the Servlet development process.
  • Understand and implement Enterprise Java Beans (EJB).
  • Understand and implement Session beans.
Java 2: Enterprise Connectivity
Training Java 2: Enterprise Connectivity

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.

Training ColdFusion / Comprehensive – 5 days

Class overview :

In this Comprehensive ColdFusion 9 Training course, students will spend the first part of the week learning the basics of ColdFusion and the second part of the week learning advanced ColdFusion techniques.

Class goals :

– Learn to get data from a database and display it on the page
– Learn to insert, Edit and Delete records from a database
– Learn to pass data from one page and receive it on another using HTML Forms
– Learn to create Dynamic Form Fields including Dynamic Select Lists
– Learn to build a Search Interface
– Learn to use Session Variables to provide Password Protection
– Learn to call ColdFusion Components (CFCs) and Custom Tags
– Learn to send email with ColdFusion
– Learn to send email with ColdFusion
– Learn sophisticated data management techniques
– Learn to build and use Custom Tags
– Learn to build and use ColdFusion Components (CFCs)
– Learn to handle errors properly
– Learn to work with ColdFusion and XML

Content of Training ColdFusion / Comprehensive

  1. Introduction to ColdFusion
    1. Static pages vs. Dynamic pages
    2. Server-side Web Technologies
    3. Database Alphabet Soup: ODBC/JDBC, DSNs and SQL
    4. Course Objectives and Prerequisites
    5. Introduction to Course Project
  2. ColdFusion Basics
    1. Using CFML
      1. Code Editors
      2. Dreamweaver Interface
      3. Tag Updaters / Extensions
      4. Tag Editing Dialog Boxes
    2. Embedded Tag Help
    3. Using ColdFusion Comments
    4. Creating Variables
      1. <cfset> and <cfoutput>
    5. Variable Scope/Prefixes
    6. Built-in ColdFusion Functions
      1. CF Function Reference (Dreamweaver specific)
      2. Online Reference (http://livedocs.adobe.com)
      3. Tip: (http://cfquickdocs.com)
    7. Using <cfinclude> to reuse code
  3. Dynamic Data: Querying the Database
    1. Database Basics
      1. Introduction to SQL
      2. Select Statement
      3. Update Statement
      4. Insert Statement
      5. Delete Statement
      6. Data Source Name (DSN) / Remote Development Server (RDS)
      7. The DSN Used in This Class: movieList
    2. Course Project Database
    3. Querying the database with <cfquery>
      1. <cfdump> for Quick Output
    4. Customizing Display with <cfoutput>
      1. Building Dynamic Tables
      2. Shortcut: <cftable>
      3. Shortcut: Dynamic Table Tool (in Dreamweaver)
  4. Creating a Drill-down Interface
    1. Passing Variables between Pages
      1. « Two-page method »
    2. Receive Variables through the URL
      1. Using a WHERE clause in a SQL Statement
      2. Protecting Against SQL Injection Attacks with <cfqueryparam>
  5. Conditional Statements and Forms
    1. Conditional Statements
      1. <cfif>, <cfelseif> and <cfelse>
      2. Comparison Operators
      3. Operator
      4. Description
      5. Using the isDefined() function
    2. HTML Form Review
    3. Self-Submitting Forms
      1. Using the <cfparam> tag to set a default value
      2. Quick Examination of a ColdFusion Framework (Methodology): Fusebox
    4. Dynamically Populating Select Lists
      1. HTML Review: <select> tags
      2. Introducing the <cfform> Tag
      3. Shortcut: <cfselect>
  6. Quick Introduction to RSS and Ajax with <cfform>
    1. Reading an RSS Feed
    2. Introducing the <cfform> Tag
    3. Building a Mask with <cfform>
    4. Automatically Build a Dynamic Select List with <cfselect>
  7. Search Interface
    1. Creating a Search Interface
      1. Using % and _ in a LIKE Statement
  8. Insert Records into the Database
    1. Inserting Records
      1. SQL Insert Statement
      2. Insert Record Step 2 – the Insert
      3. Shortcut: <cfinsert>
      4. Redirect Users with <cflocation>
    2. Automated Form Validation
      1. Client-side vs. Server-side validation: When does the validation code run?
  9. Edit (Update) Database Records
    1. Updating records
      1. SQL UPDATE Statement Review
      2. Passing the Primary Key
      3. Page 2 – View Current Data in a Form
      4. Page 3 – Perform the Update to the Database
      5. Shortcut: <cfupdate>
    2. Deleting Records
      1. Note on Deleting records
      2. Review of the SQL Delete Statement
      3. « Deleting » without deleting
      4. No <cfdelete>!
  10. Reusing Code
    1. Reusing code with <cfinclude> and <cflocation>
    2. Custom Tags
      1. Where to store Custom Tags
      2. CALLER and ATTRIBUTE scopes
      3. Using <cfmodule>
      4. A Note about CFX tags
    3. User Defined Functions (UDFs) and ColdFusion Components (CFCs)
      1. Creating UDFs with the <cffunction> tag
      2. Using ColdFusion Components (CFCs)
    4. Creating Components
      1. Calling or Invoking Components
      2. Passing Arguments to Components
      3. The Component Code
      4. The main CFML page
      5. View a Component directly in the browser
  11. Using Session Variables for Password Protection
    1. Session Variables
      1. Using Application.cfc to Enable Session Management
      2. Creating Password Protected Pages
      3. Password-protect.cfm (the included page)
      4. Application.cfm
      5. Locking Session and Application variables with <cflock>
  12. Tracking User Information with Cookies (optional)
    1. Using Cookies to Track Users
  13. Sending email with <cfmail> (optional)
    1. Using ColdFusion to Send Email
      1. <cfmail> Tag Syntax
  14. Managing Data
    1. Creating a User Administration Page
      1. Displaying Users
      2. Adding Users
      3. Editing and Deleting Users
      4. Controlling Access to the Page
    2. Allowing Users to Add and Edit Data
      1. Displaying Data
      2. Adding Data using Stored Procedures
      3. Editing and Deleting Data
    3. Conclusion
  15. Custom Tags
    1. Calling Custom Tags
      1. thisTag Structure
    2. Storing Custom Tags
    3. Other Ways of Calling Custom Tags
      1. CFMODULE
      2. CFIMPORT
    4. Conclusion
  16. ColdFusion Components
    1. CFC Basics
    2. Creating CFCs
    3. Storing CFCs
    4. Invoking CFCs
      1. Passing Argument Values
    5. Extending ColdFusion Components
    6. Application.cfc
      1. Application.cfc Methods
      2. Application.cfc Benefits
    7. Conclusion
  17. Handling Errors
    1. Handling Exceptions
      1. Compiler Exceptions
      2. Runtime Exceptions
    2. cftry/cfcatch
      1. Exception Types
    3. Locking Code to Prevent Errors
      1. Race Conditions
      2. Named Locks
    4. Conclusion
  18. ColdFusion and XML
    1. XML Functions
      1. Creating New XML Documents
      2. Searching XML Documents
      3. Validating XML Documents
    2. Processing RSS Feeds
      1. Processing RSS Feeds with XmlSearch()
      2. Processing RSS Feeds with XmlTransform()
    3. ColdFusion and WDDX
      1. <cfwddx>
      2. WDDX vs. Web Services
    4. Conclusion
ColdFusion / Comprehensive
Training ColdFusion / Comprehensive

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …

Training Implementing and Managing Microsoft Server Virtualization – 5 days

Class overview :

This five-day, instructor-led course will provide you with the knowledge and skills to deploy and manage a server virtualization environment using Microsoft technologies. The course provides details on how to deploy and manage Hyper-V and Remote Desktop Services on Windows Server 2008 R2.

Class goals :

On completion of this training course, delegates will be able to:

  • Describe server, desktop, and application virtualization.
  • Describe how you use Microsoft System Center is to manage the virtual infrastructure.
  • Evaluate a network environment for server virtualization.
  • Plan for the implementation of the Hyper-V server role.
  • Install the Hyper-V Server Role.
  • Manage Hyper-V settings and virtual networks.
  • Create and configure virtual machines.
  • Manage virtual machine snapshots.
  • Managing and maintaining the Virtual Machine Connection Tool.
  • Create a new virtual machine using SCVMM 2008 R2.
  • Convert a physical server to a virtual machine.
  • Convert and migrate virtual machines.
  • Clone virtual machines.
  • Describe common management tasks and property configuration settings for virtual machines managed by VMM 2008.
  • Describe when and how to use virtual machine checkpoints.
  • Overview of the VMM Library.
  • Manage profiles and templates.
  • Design fault tolerance for the VMM library.
  • Configure VMM user roles.
  • Install and configure the VMM Self-Service Portal.
  • Describe the Windows Server 2008 R2 Failover Cluster feature.
  • Implement failover clustering with Hyper-V and VMM 2008 R2.
  • Describe how to use the Offline Virtual Machine Servicing Tool to maintain updates for virtual machines.
  • Configure Windows Server Update Services (WSUS) and the Offline Virtual Machine Servicing Tool.
  • Monitor and manage jobs in VMM 2008 R2s.
  • Configure System Center Operations Manager integration.
  • Configure Performance and Resource Optimization (PRO).
  • Describe backup and restore options for virtual machines and the VMM database.
  • Implementing Data Protection Manager for backing up the VMM infrastructure.
  • Understand the use and role of Remote Desktop Services (RDS).
  • Implement the Remote Desktop Session Host.
  • Implement the Remote Desktop Connection Broker.
  • Implement the Remote Desktop Virtualization Host.
  • Configure the Remote Desktop Gateway.
  • Configure Remote Desktop Web Access.
  • Configure Remote Desktop Licensing.

Content of Implementing and Managing Microsoft Server Virtualization

Module 1: Evaluating and Planning for Virtualization

Describe virtualization as it relates to server, desktop, and application environments. Students also will learn how to plan for critical decision points related to hardware requirements, storage, availability, and security.

  • Overview of Microsoft Virtualization
  • Lab : Evaluating the Network Environment for Virtualization
    • Planning for the Hyper-V Server Role
    • Assessing the Computing Environment by Using the MAP Toolkit

After completing this module, students will be able to:

  • Describe the challenges that traditional network environments face, which organizations can address byusing virtualization technologies.
  • Describe virtualization technology.
  • Identify options available for server virtualization.
  • Identify options available for desktop and presentation virtualization.
  • Identify options available for application virtualization.
  • Determine the most appropriate virtualization solution based upon organizational requirements.
  • Describe management tasks for a virtual environment.
  • Describe the components that make up the Microsoft System Center solution.
  • Describe how you can use System Center Virtual Machine Manager to manage virtual environments.
  • Describe how you can use System Center Data Protection Manager to backup and recover a virtual environment.
  • Describe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
  • Describe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
  • Describe the Hyper-V Server Role.
  • Describe requirements and limits for the Hyper-V Server Role.
  • Describe planning considerations for Hyper-V disks and storage.
  • Describe options for storage configuration in Hyper-V.
  • Describe options for providing high availability for Hyper-V.

Module 2: Installing and Configuring the Hyper-V Server Role

After completing this module, you will be able to install the Hyper-V server role, and configure host and virtual network settings.

  • Installing the Hyper-V Server Role
  • Configuring Hyper-V Settings and Virtual Networks
  • Lab : Installing and Configuring the Hyper-V Server Role
    • Installing the Hyper-V Role
    • Determining Virtual Network Configuration Settings Based On Organizational Requirements
    • Configuring Virtual Network Settings Using Virtual Network Manager
    • Installing Remote Management Tools

After completing this module, students will be able to:

  • Describe the prerequisites for installing Hyper-V.
  • Describe the process for installing Hyper-V on a Windows Server 2008 R2 host.
  • Identify the management tools that you can use to manage the Hyper-V server role.
  • Install and configure Hyper-V management for remote administration.
  • Installing the Hyper-V Server Role on a Server Core Installation of Windows Server 2008 R2.
  • Modify the default folders for virtual machines and virtual hard disks.
  • Configure Hyper-V user settings.
  • Determine when to use external, internal, or private virtual machine networks.
  • Use Virtual Network Manager to configure virtual networks.
  • Configure Hyper-V to support VLANs.

Module 3: Creating and Configuring Virtual Hard Disks and Virtual Machines

After completing this module, you will be able to determine and configure the most appropriate virtual hard disk(s) to use in a virtual machine. Students also will be able to create and configure virtual machines.

  • Creating and Configuring Virtual Hard Disks
  • Creating and Configuring Virtual Machines
  • Managing Virtual Machine Snapshots
  • Working with the Virtual Machine Connection Application
  • Lab : Creating Virtual Hard Disks and Virtual Machines
    • Creating Appropriate Virtual Hard Disks, Based On Organizational Requirements
    • Creating New Virtual Machines Using the Virtual Machine Wizard
    • Modifying Virtual Machine Settings
    • Creating and Modifying Virtual Machine Snapshots

After completing this module, students will be able to:

  • Describe storage options for virtual machines.
  • Prepare the host computer to attach physical disks to a virtual machine.
  • Configure storage based on Internet Small Computer System Interface (iSCSI).
  • Describe the types of virtual hard disks.
  • Describe the use and benefits of pass-through disks.
  • Create a new virtual hard disk using the new Virtual Hard Disk Wizard.
  • Edit and inspect virtual hard disks.
  • Describe considerations for creating new virtual machines.
  • Create a new virtual machine using the new Virtual Machine Wizard.
  • Configure virtual machine settings.
  • Describe the Hyper-V integration services.
  • Import and export virtual machines.
  • Describe the file formats that you use for virtual machines.
  • Migrate legacy virtual machines to Hyper-V.
  • Describe what a virtual machine snapshot is and how you use it.
  • Describe considerations for using snapshots, including storage sizing and requirements.
  • Creating and managing virtual machine snapshots.
  • Describe the Virtual Machine Connection Tool.
  • List the considerations for using the virtual machine connection tool.
  • Discuss connecting to remote virtual machines from a domain and to a virtual machine in a remote domain.

Module 4: Integrating System Center Virtual Machine Manager with Microsoft Hyper-V Server 2008 R2

After completing this module, students will be able to plan for, and deploy, System Center Virtual Machine Manager with their Hyper-V solution.

  • Planning for Integration of System Center Virtual Machine Manager
  • Installing the VMM Server and Administrator Console
  • Managing Hosts and Host Groups
  • Lab : Planning and Deploying VMM 2008 R2
    • Planning for the Implementation of SCVMM 2008 R2, Based Upon Organizational Requirements
    • Installing and Configuring SCVMM Server and Administration Console Components

After completing this module, students will be able to:

  • Create and Manage Host Groups.
  • Describe the VMM.
  • Describe VMM 2008 R2 components.
  • Describe system requirements for installing VMM 2008 R2 components.
  • Plan for the management of hosts and host groups.
  • Plan for the implementation of the VMM database.
  • Plan for the implementation of the VMM Library.
  • Describe considerations for installing the VMM Server and Administrator console, including domain requirements, account requirements, and other requirements.
  • Describe the process for installing the VMM Server.
  • Use the VMM Configuration Analyzer to identify configuration issues.
  • Describe the installation and features of the VMM administrator console.
  • Describe common post-installation tasks.
  • Describe the Windows PowerShell – VMM command shell.
  • Describe reasons for using host groups.
  • Create and modify the properties of host groups.
  • Describe the types of hosts that you can add to VMM 2008.
  • Configure default virtual machine paths.
  • Describe the process for adding hosts in an Active Directory directory service domain.
  • Describe the process for adding hosts located in a perimeter network.
  • Describe the management options for a host.

Module 5: Creating and Deploying Virtual Machines Using System Center Virtual Machine Manager 2008 R2

After completing this module, students will be able to use VMM 2008 R2 to create and deploy virtual machines.

  • Creating a New Virtual Machine Using VMM 2008 R2
  • Converting a Physical Server to a Virtual Machine
  • Converting and Migrating Virtual Machines
  • Lab : Creating and Deploying Virtual Machines
    • Creating a New Virtual Machine
    • Deploying a New Virtual Machine from the VMM Library
    • Converting a VMware-Based Virtual Machine to a Hyper-V Based Virtual Machine

After completing this module, students will be able to:

  • Describe supported operating systems and hardware capabilities for virtual machines.
  • Identify sources that you can use for new virtual machines.
  • Describe placement options when creating a new virtual machine.
  • Describe how you use ratings to determine appropriate placement.
  • Describe how to customize placement ratings for a specific virtual machine.
  • Deploy stored virtual machines from a VMM Library.
  • Describe considerations and methods for determining physical-to-virtual (P2V) machine conversion candidates.
  • Describe requirements for physical source computers.
  • Perform a P2V conversion.
  • Identify the difference between converting and migrating a virtual machine.
  • Describe requirements for performing a V2V conversion.
  • Describe the options you have when performing a V2V conversion.
  • Describe the considerations and the process for migrating a virtual machine.
  • Describe scenarios for cloning an existing virtual machine.
  • Describe considerations for cloning a virtual machine.
  • Describe the process and decision points for cloning a virtual machine.

Module 6: Managing Virtual Machines Using Virtual Machine Manager 2008

This module explains how to perform various management tasks on virtual machines stored within the VMM infrastructure.

  • Overview of VMM Management Tasks
  • Creating and Managing Checkpoints
  • Lab : Managing Virtual Machines Using VMM 2008 R2
    • Modifying Virtual Machine Properties
    • Managing Virtual Machine Checkpoints

After completing this module, students will be able to:

  • Describe common actions for operating and managing virtual machines.
  • Perform actions used to operate a virtual machine.
  • Perform actions used to deploy, migrate, and store virtual machines.
  • Perform actions used to manage configurations, disks, and checkpoints.
  • Describe virtual machine property options.
  • Perform actions to configure virtual machine property options.
  • Describe considerations for using checkpoints.
  • Create and modify a VMM checkpoint.
  • Manage VMM checkpoints.

Module 7: Configuring and Managing the VMM Library

This module explains how to configure and manage resources in the VMM Library.

  • Overview of the VMM Library
  • Managing Profiles and Templates
  • Designing Fault Tolerance for the VMM Library
  • Lab : Configuring and Managing the VMM Library
    • Adding a Library Server and Library Resources
    • Creating a Hardware Profile
    • Creating a Guest Operating-System Profile
    • Creating a Virtual Machine Template
    • Configuring highly available file servers for Virtual Machine Library Using DFS

After completing this module, students will be able to:

  • Describe what the VMM Library is and the types of resources that are stored within the library.
  • Add a Library Server and assign library groups.
  • Add library shares to a library server.
  • Add file-based resources to the library.
  • Describe hardware profiles and benefits of their usage.
  • Describe guest operating system profiles and benefits of their usage.
  • Show how to create a hardware and guest operating-system profile.
  • Describe the benefits for creating and using virtual machine templates.
  • Describe the components that make up a virtual machine template.
  • Create a virtual machine template.
  • Describe options for providing fault tolerance for the VMM Library.
  • Compare and evaluate the differences between the options.
  • List the considerations for supporting highly available Library Servers.

Module 8: Configuring User Roles and the Virtual Machine Manager Self-Service Portal

This module explains how to configure and manage user roles and the Virtual Machine Manager Self-Service Portal.

  • Configuring User Roles
  • Installing and Configuring the VMM Self-Service Portal
  • Lab : Configuring the VMM Self-Service Portal
    • Preparing the Host Group and User Role Requirements
    • Implementing the Self-Service Portal

After completing this module, students will be able to:

  • Describe the concept of role-based security in VMM 2008 R2.
  • Describe the role types that are available in VMM 2008 R2.
  • Describe the objects that you can delegate by using Role-based security.
  • Describe the process for creating a user role in VMM 2008.
  • Create user roles in VMM 2008 R2.
  • Determine the most appropriate role-based security configuration based upon organizational requirements.
  • Describe considerations for implementing the VMM Self-Service Portal.
  • Describe the overall process for implementing the Self-Service Portal.
  • Describe system requirements for the VMM Self-Service Portal.
  • Install the SCVMM Self-Service Portal.
  • Configure user access to the SCVMM Self-Service Portal.
  • Describe security best practices for the SCVMM Self-Service Portal.

Module 9: Implementing High Availability for Server Virtualization

This module explains how to configure high availability for server virtualization.

  • Overview of Failover Clustering
  • Implementing Failover Clustering with Hyper-V
  • Implementing High Availability with VMM 2008 R2
  • Lab : Implementing High Availability for Server Virtualization
    • Installing and Configuring the Failover Clustering Feature
    • Configuring Live Migration
    • Integrating Failover Clustering with VMM 2008 R2

After completing this module, students will be able to:

  • Describe options for providing high availability for virtualization.
  • Describe what a Failover Cluster is and how it provides high availability for virtual machines.
  • Describe new Failover Cluster functionality available in Windows Server 2008 R2.
  • Describe considerations for a Failover Cluster design.
  • Determine appropriate Quorum configurations for Failover Clusters.
  • Describe how Failover Clusters work with Hyper-V.
  • Describe best practices for implementing Failover clustering with Hyper-V.
  • Describe requirements for using Hyper-V with failover clustering.
  • Describe the overall process for implementing Hyper-V and failover clustering.
  • Implement failover clustering with Hyper-V.
  • Describe Live Migration.
  • Describe the overall process for implementing Live Migration.
  • Perform Live Migration using Hyper-V.
  • Describe planning considerations for implementing high availability with SCVMM 2008 R2.
  • Describe the overall process for configuring host clusters to support high availability.
  • Describe how to manage host clusters.
  • Implement clustering using VMM 2008.

Module 10: Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool

This module explains how to maintain software updates using the Offline Virtual Machine Servicing Tool.

  • Overview of the Offline Virtual Machine Servicing Tool
  • Configuring WSUS and the Offline Virtual Machine Servicing Tool
  • Lab : Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool
    • Configuring Infrastructure Prerequisites to Support the Offline Virtual Machine Servicing Tool
    • Installing and Configuring the Offline Virtual Machine Servicing Tool

After completing this module, students will be able to:

  • Describe methods for maintaining software updates.
  • Describe how the Offline Virtual Machine Servicing Tool works.
  • Describe infrastructure requirements for the Offline Virtual Machine Servicing Tool.
  • Describe tasks required to prepare the virtual machines for offline software-update management.
  • Describe the process for configuration WSUS to support virtual machine servicing.
  • Configure WSUS to support virtual machine servicing.
  • Describe the process for installing and configuring the Offline Virtual Machine Servicing Tool.
  • Install and configure the Offline Virtual Machine Servicing Tool.

Module 11: Monitoring and Reporting Virtualization

This module explains how to use the monitoring tools included with VMM 2008 and integrate System Center Operations Manager to provide extended monitoring, reporting, and troubleshooting capabilities.

  • Monitoring Jobs in VMM 2008 R2
  • Integrating System Center Operations Manager with VMM 2008 R2
  • Configuring Performance and Resource Optimization
  • Lab : Integrating System Center Operations Manager with VMM 2008
    • Configuring System Center Operations Manager for VMM 2008 Integration
    • Configuring PRO

After completing this module, students will be able to:

  • Describe the VMM jobs feature.
  • Describe the methods used to view job status.
  • Cancel and restart jobs.
  • Filter job status.
  • Track changes using Jobs view.
  • Perform management tasks related to job status in VMM.
  • Identify reporting needs for specific virtual environment scenarios.
  • Describe features provided by integrating System Center Operations Manger.
  • Describe prerequisites for integrating Operations Manager.
  • Describe the process for integrating Operations Manager with VMM 2008 R2.
  • Enable reporting in VMM 2008 R2.
  • Describe Performance and Resource Optimization (PRO).
  • Plan for the implementation of PRO.
  • Enable PRO integration.
  • View and implement PRO Tips.

Module 12: Backup and Restore Strategies for Virtual Machines

This module explains how to configure and manage resources in the VMM Library.

  • Overview of Backup and Restore Options for Virtual Machines and the VMM Database
  • Implementing Data Protection Manager for Backing Up the VMM Infrastructure
  • Lab : Using Data Protection Manager to Back Up the VMM 2008 Infrastructure

After completing this module, students will be able to:

  • Describe options for backing up virtual machines.
  • Use the SCVMM Administrator console to back up the VMM database.
  • Describe the process and tools used to restore the VMM database.
  • Describe the features of Data Protection Manager 2007 SP1.
  • Describe the prerequisites for installing and implementing Data Protection Manager 2007 SP1.
  • Describe the process for installing and configuring Data Protection Manager 2007 SP1.
  • Describe the process for configuring backup processes for SCVMM 2008 and Data Protection Manager 2007 SP1.

Module 13: Desktop Virtualization Using Remote Desktop Services

This module explains how to describe and implement the core role services included in the Remote Desktop Services server Role.

  • Overview of Remote Desktop Services
  • Implementing the Remote Desktop Session Host
  • Implementing Remote Desktop Connection Broker
  • Implementing the Remote Desktop Connection Virtualization Host
  • Lab : Implementing Remote Desktop Services
    • Installing the Remote Desktop Session Host
    • Installing and configuring the Remote Desktop Session Host
    • Installing the Remote Desktop Connection Broker
    • Configuring the Remote Desktop Connection Broker
    • Installing and Configuring the Remote Desktop Virtualization Host
    • Deploying an Application Using RemoteApp

After completing this module, students will be able to:

  • Describe the benefits of Remote Desktop Services.
  • Describe the Role Services included with the Remote Desktop Services sever role.
  • Describe updates to the client experience with Remote Desktop Services.
  • Describe RD Licensing.
  • Describe the prerequisites for installing and implementing the RD Session Host.
  • Describe common configuration and management tasks for the RD Session Host.
  • Describe how to secure an RD Session Host.
  • What is the RDS Broker Role?
  • Describe the prerequisites for installing and implementing the RDS Connection Broker.
  • Describe common configuration and management tasks for the RDS Connection Broker.
  • Deploying RemoteApp to a Windows 7 Client Start menu.
  • Describe the virtual desktop infrastructure concept and how the Remote Desktop Virtualization host works.
  • Describe the prerequisites for installing and implementing the RD Virtualization Host.

Module 14: Extending Remote Desktop Services Outside the Organization

This module explains how to implement and configure the Remote Desktop Gateway and Remote Desktop Web Access.

  • Configuring the Remote Desktop Gateway
  • Configuring Remote Desktop Web Access
  • Lab : Integrating Remote Desktop Web Access into the Desktop Virtualization Infrastructure
    • Installing Remote Desktop Gateway
    • Installing Remote Desktop Web Access
    • Configuring Remote Desktop Web Access
    • Integrating RemoteApp and Desktop Connection with Remote Desktop Web Access

After completing this module, students will be able to:

  • Describe how the Remote Desktop Gateway works.
  • Describe how to secure the Remote Desktop Gateway.
  • Use Authorization Policies with Remote Desktop gateway.
  • Describe how to configure the Remote Desktop Gateway.
  • Describe how to use network access protocol (NAP) remediation with Remote Desktop Gateway.Use certificates for Remote Desktop Gateway.
  • Describe the prerequisites for installing and implementing Remote Desktop Web Access.
  • Describe how to implement RemoteApp and Desktop connection with RD Web Access.
  • Describe how to secure Remote Desktop Web Access.
  • Configure Single Sign-on for Remote Desktop Web Access.
  • Integrate RemoteApp and Remote Desktop Web Access.
Implementing and Managing Microsoft Server Virtualization
Training Implementing and Managing Microsoft Server Virtualization

Onze voordelen :

  • Type of training: Inter-company, intra-company and individual
  • 100% flexible & personalised training : You choose the place, the dates and the training program
  • Offer request : Response within 24 hours
  • 50% discount for SME’s from Brussels-Capital Region
  • Free parking, lunch & drinks
  • Free use of our Digital Competence Centre: Manuals, courses, exercises, …