Implementation and maintenance. This course is intended for professionals who typically pursue careers as database administrators, database developers, or business intelligence developers. Additionally, they can be people who do not work with Microsoft SQL Server as a part of their primary job functions but who want to show their breadth of technology experience, such as developers, systems administrators, and others.
Class goals :
This course measures your ability to accomplish the technical tasks listed below.
-Installing and Configuring SQL Server
-Implementing High Availability and Disaster Recovery
-Supporting Data Consumers
-Maintaining Databases
-Monitoring and Troubleshooting SQL Server Performance
-Creating and Implementing Database Objects
Content of Microsoft SQL Server
Student will learn how to install and configure SQL Server 2005, create databases and database objects, SQL server security, creating views, partitions, and linked servers, transact-SQL programming, working with constraints, triggers, and stored procedures, backup and restore of SQL server with SQL agent jobs, data redundancy and availability, using the service broker, XML data support, SQL server performance monitoring and tuning, troubleshooting server and database errors.
Training Microsoft SQL Server
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Implementation and maintenance. This course is intended for professionals who typically pursue careers as database administrators, database developers, or business intelligence developers. Additionally, they can be people who do not work with Microsoft SQL Server as a part of their primary job functions but who want to show their breadth of technology experience, such as developers, systems administrators, and others.
The primary objective of this course is to consider advanced subjects and techniques pertaining to the SQL database language. Even professionals experienced in other implementations of the industry-standard SQL language will benefit from the advanced and Oracle-specific features of SQL discussed in this course.
Class goals :
Learn to use the SQL99 join syntax. Also, performing advanced SQL queries using techniques such as grouping and cube operations.
• Moving beyond basic table definitions, consideration of defining the full range of database objects, such as advanced table definitions, indexes, sequences, views and others.
• Understanding basic database security and object privileges.
• Using the powerful set of built-in SQL functions.
• Protecting the database and extending the basic data model using declarative constraints.
• Developing complex SQL*Plus reports and using SQL*Plus scripts.
Content of Oracle SQL 2 users
The target audience for this course is all Oracle professionals. Further, this course is well suited for non-Oracle professionals already experienced in the SQL but who wish to become acquainted with the unique and advanced features of Oracle SQL. Among the specific groups for whom this course will be helpful are application developers and database administrators.
Training Oracle SQL 2 users
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
The primary objective of this course is to consider advanced subjects and techniques pertaining to the SQL database language. Even professionals experienced in other implementations of the industry-standard SQL language will benefit from the advanced and Oracle-specific features of SQL discussed in this course.
Cybersecurity is a serious challenge today as attackers specifically target Web application vulnerabilities. These vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity.
Class goals :
Implement and test secure Web applications in your organization
Identify, diagnose and correct the most serious Web application vulnerabilities
Configure a Web server to encrypt Web traffic with HTTPS
Protect Ajax-powered Web 2.0 applications
Secure XML Web services with WS-Security
Audit Web application security with manual and automated scanning
Content of Securing Web Applications, Services and Servers
Setting the Stage
Defining threats to your Web assets
Surveying the legal landscape and privacy issues
Exploring common vulnerabilities
Establishing Security Fundamentals
Modeling Web security
Achieving Confidentiality, Integrity and Availability (CIA)
Performing authentication and authorization
Encrypting and hashing
Distinguishing public- and private-key cryptography
Verifying message integrity with message digests, digital signatures and digital certificates
Augmenting Web Server Security
Configuring security for HTTP services
Managing software updates
Restricting HTTP methods
Securing communication with SSL/TLS
Obtaining and installing server certificates
Enabling HTTPS on the Web server
Protecting the exchange of credentials
Detecting unauthorized modification of content
Configuring permissions correctly
Scanning for file-system changes
Implementing Web Application Security
Employing OWASP resources
The Open Web Application Security Project (OWASP) Top Ten
Recognizing cybersecurity risks
Remediating identified vulnerabilities
Securing database and application interaction
Uncovering and preventing SQL injection
Defending against an insecure direct object reference
Limitations of encrypting database content
Managing session authentication
Protecting against session ID hijacking
Enforcing URL access control
Blocking cross-site request forgery
Controlling information leakage
Displaying sanitized error messages to the user
Handling request and page faults
Performing input validation
Establishing trust boundaries
Revealing and removing the threat of cross-site scripting (XSS)
Exposing the dangers of client-side validation
Preventing E-shoplifting
Enhancing Ajax Security
Ajax features
Identifying core Ajax components
Exchanging information asynchronously
Assessing risks and evaluating threats
Managing unpredictable interactions
Exposing JSON vulnerabilities
Securing XML Web Services
Diagnosing XML vulnerabilities
Identifying nonterminated tags and field overflows
Uncovering Web service weaknesses
Protecting the SOAP message exchange
Validating input with an XML schema
Encrypting exchanges with HTTPS
Implementing WS-Security with a framework
Authenticating access to Web services
Scanning Applications for Weaknesses
Operating and configuring scanners
Matching patterns to identify faults
« Fuzzing » to discover new or unknown vulnerabilities
Detecting application flaws
Scanning applications remotely
Strategies for testing and scanning
Testing Web applications with Netcat, Cryptcat and Wget
Intercepting traffic with OWASP WebScarab
Best Practices for Web Security
Adopting standards
Reducing risk by implementing proven architectures
Handling personal and financial data
Developing guidelines for logging
Managing network security
Modeling threats to reduce risk
Integrating applications with your network architecture
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides hands on experience installing and configuring Windows Server 2008. Students will perform full and core CD-based standard installation, deploy an image, configure and tune the server and assign roles and services.
Class goals :
Attendees will practice local and remote administration of security, network, data and hardware in hands on labs. After installing an Active Directory domain controller, students will create and assign users, groups, permissions, rights, policies and profiles.
Attendees will configure and troubleshoot the TCP/IP network, create custom consoles and Powershell scripts, and implement a backup strategy. Also covered are many aspects of local security, such as group policy objects (GPO), Encrypting File System (EFS), rights and permissions, Firewall, and Network Level Authentication. Students will learn to use enterprise tools such as Distributed File System (DFS) and File System Resource Manager (FSRM) to facilitate clustering and virtualization. Comprehensive labs and exercises give the students real experience deploying, managing and troubleshooting the Windows 2008 infrastructure.
Content of Windows 2008 System Administration
Training Windows 2008 System Administration
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides hands on experience installing and configuring Windows Server 2008. Students will perform full and core CD-based standard installation, deploy an image, configure and tune the server and assign roles and services.
Active Directory provides a single administration point for sign-on, policies and authentication control. This hands on course provides experience configuring Active Directory and essential network security components such as AD Certificate Services, IPSec and virtual private networking (VPN).
Class goals :
Students will install Active Directory Domain Services (ADDS), integrate DNS for Active Directory and Internet name resolution, implement AD security for DNS, and configure logical AD components, such as forests, trees, domains and organizational units (OUs). Upgrading and migrating the ADDS structure within or between forests, troubleshooting, backup and restore methods and additional maintenance tools will be explored. Attendees will investigate additional Active Directory roles and services. With ADDS installed, we will monitor and maintain sites and replication to assure up-to-date information.
An administrator needs to control the user environment, so students will look at the architecture, scope, inheritance, replication and troubleshooting in group policy before learning to restrict and enable users with login scripts, rights, desktop policies and software deployment and control. We’ll also look at further controlling computers through security policies, loopback processing, and templates. Attendees will delegate administration of the configuration policies, control application and inheritance and explore tools to refine the user experience. Comprehensive labs and exercises give the students real experience installing and configuring Active Directory while securing the network.
Content of Windows Server 2008 Active Directory, Group Policy and Security Design
Introduction to Name Resolution Services
Installing and Configuring DNS
Managing a Zone
Installing and Configuring Active Directory
Active Directory Sites and Replication
Flexible Single Master Operation (FSMO) Roles
Backing Up and Restoring Active Directory
Active Directory Support Tools
Defining the Active Directory Schema
AD Lightweight Directory Services (AD LDS)
Implementing Group Policy
Group Policy Management Console (GPMC)
Understanding User Profiles
Implementing Basic Folder Redirection
Creating a Starter GPO
Public Key Infrastructure (PKI)
Granting and Revoking Certificates
Security Configuration Wizard (SCW) Basics
Configuring NAP Policy Services
Configuring NAP Clients
Installing and Configuring a Remote Access Server
Virtual Private Network (VPN) Configuration
Network Policy Server (NPS) Introduction
Implementing IPSec
Installing and Configuring Internet Information Server (IIS) 7.5
Installing ASP.NET
Training Windows Server 2008 Active Directory, Group Policy and Security Design
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Active Directory provides a single administration point for sign-on, policies and authentication control. This hands on course provides experience configuring Active Directory and essential network security components such as AD Certificate Services, IPSec and virtual private networking (VPN).
This course provides hands on experience installing and configuring Exchange Server 2010 and a variety of Microsoft messaging clients. Students will also install and configure Windows Server 2008, Active Directory Domain Services and IIS web services.
Class goals :
Attendees will practice local and remote administration of server roles, network connectivity and user messaging data. After installing Exchange, students will create users and groups, and assign permissions, rights and policies. They will then configure and troubleshoot the Exchange environment using various consoles and management shells. We’ll investigate backup and fault tolerance strategies, as well as security and user access issues. Comprehensive labs and exercises give students real experience deploying, managing and troubleshooting an Exchange Server 2010 infrastructure.
Content of Exchange Server 2010 System Administration
Windows Server Installation and Configuration
Exchange Server Installation and Configuration
Active Directory, DNS and IIS Integration
Management Consoles and Shells
Exchange Server Roles and Security Management
Administrative Management Roles
Message and Recipient Management
Rights Based Access Control
Exchange Backup and Recovery
Exchange Database Availability Groups
Exchange Server Maintenance, Monitoring and Troubleshooting
Outlook, OWA and ActiveSync Installation and Configuration
Managing User Email and Calendar Data
Managing Global and Personalized Address Lists
Training Exchange Server 2010 System Administration
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
This course provides hands on experience installing and configuring Exchange Server 2010 and a variety of Microsoft messaging clients. Students will also install and configure Windows Server 2008, Active Directory Domain Services and IIS web services.
Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.
Class goals :
The Java 2 Enterprise Architecture
Essential Concepts
Java Database Connectivity (JDBC)
Using JDBC
The Essentials of Java Server Pages (JSP)
Java Server Page Objects
The Architecture of Java Server Pages (JSP)
Java Servlet Essentials
Java Servlets—Construction Time
Enterprise Java Bean (EJB) Essentials
The Session Bean
Content of Java 2: Enterprise Connectivity
Upon successful completion of this course, students will be able to:
Understand the basic architectures for the Java 2 Enterprise Edition and its
implementation architectures.
Understand the flow of documents and control on the World Wide Web
(WWW).
Describe the structure of Java Database Connectivity (JDBC).
Utilize JDBC to connect to a database, retrieve meta data, and execute
SQL queries.
Understand how Java Server Pages (JSP) can be used, and how it
compares to Common Gateway Interface (CGI) and Active Server Pages
(ASP).
Use JSP objects to manipulate data on the World Wide Web.
Understand the elements of the JSP language set, and utilize JSP Action elements and Directives.
Describe the Java Servlet lifecycle and utilize Servlet packages.
Understand and use the Servlet development process.
Understand and implement Enterprise Java Beans (EJB).
Understand and implement Session beans.
Training Java 2: Enterprise Connectivity
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …
Java 2: Enterprise Connectivity builds on the fundamentals of the Java Enterprise Edition (J2EE) technology including database connectivity, Java Server Pages, Servlets, and Enterprise Java Beans.
In this Comprehensive ColdFusion 9 Training course, students will spend the first part of the week learning the basics of ColdFusion and the second part of the week learning advanced ColdFusion techniques.
Class goals :
– Learn to get data from a database and display it on the page
– Learn to insert, Edit and Delete records from a database
– Learn to pass data from one page and receive it on another using HTML Forms
– Learn to create Dynamic Form Fields including Dynamic Select Lists
– Learn to build a Search Interface
– Learn to use Session Variables to provide Password Protection
– Learn to call ColdFusion Components (CFCs) and Custom Tags
– Learn to send email with ColdFusion
– Learn to send email with ColdFusion
– Learn sophisticated data management techniques
– Learn to build and use Custom Tags
– Learn to build and use ColdFusion Components (CFCs)
– Learn to handle errors properly
– Learn to work with ColdFusion and XML
This five-day, instructor-led course will provide you with the knowledge and skills to deploy and manage a server virtualization environment using Microsoft technologies. The course provides details on how to deploy and manage Hyper-V and Remote Desktop Services on Windows Server 2008 R2.
Class goals :
On completion of this training course, delegates will be able to:
Describe server, desktop, and application virtualization.
Describe how you use Microsoft System Center is to manage the virtual infrastructure.
Evaluate a network environment for server virtualization.
Plan for the implementation of the Hyper-V server role.
Install the Hyper-V Server Role.
Manage Hyper-V settings and virtual networks.
Create and configure virtual machines.
Manage virtual machine snapshots.
Managing and maintaining the Virtual Machine Connection Tool.
Create a new virtual machine using SCVMM 2008 R2.
Convert a physical server to a virtual machine.
Convert and migrate virtual machines.
Clone virtual machines.
Describe common management tasks and property configuration settings for virtual machines managed by VMM 2008.
Describe when and how to use virtual machine checkpoints.
Overview of the VMM Library.
Manage profiles and templates.
Design fault tolerance for the VMM library.
Configure VMM user roles.
Install and configure the VMM Self-Service Portal.
Describe the Windows Server 2008 R2 Failover Cluster feature.
Implement failover clustering with Hyper-V and VMM 2008 R2.
Describe how to use the Offline Virtual Machine Servicing Tool to maintain updates for virtual machines.
Configure Windows Server Update Services (WSUS) and the Offline Virtual Machine Servicing Tool.
Monitor and manage jobs in VMM 2008 R2s.
Configure System Center Operations Manager integration.
Configure Performance and Resource Optimization (PRO).
Describe backup and restore options for virtual machines and the VMM database.
Implementing Data Protection Manager for backing up the VMM infrastructure.
Understand the use and role of Remote Desktop Services (RDS).
Implement the Remote Desktop Session Host.
Implement the Remote Desktop Connection Broker.
Implement the Remote Desktop Virtualization Host.
Configure the Remote Desktop Gateway.
Configure Remote Desktop Web Access.
Configure Remote Desktop Licensing.
Content of Implementing and Managing Microsoft Server Virtualization
Module 1: Evaluating and Planning for Virtualization
Describe virtualization as it relates to server, desktop, and application environments. Students also will learn how to plan for critical decision points related to hardware requirements, storage, availability, and security.
Overview of Microsoft Virtualization
Lab : Evaluating the Network Environment for Virtualization
Planning for the Hyper-V Server Role
Assessing the Computing Environment by Using the MAP Toolkit
After completing this module, students will be able to:
Describe the challenges that traditional network environments face, which organizations can address byusing virtualization technologies.
Describe virtualization technology.
Identify options available for server virtualization.
Identify options available for desktop and presentation virtualization.
Identify options available for application virtualization.
Determine the most appropriate virtualization solution based upon organizational requirements.
Describe management tasks for a virtual environment.
Describe the components that make up the Microsoft System Center solution.
Describe how you can use System Center Virtual Machine Manager to manage virtual environments.
Describe how you can use System Center Data Protection Manager to backup and recover a virtual environment.
Describe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
Describe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
Describe the Hyper-V Server Role.
Describe requirements and limits for the Hyper-V Server Role.
Describe planning considerations for Hyper-V disks and storage.
Describe options for storage configuration in Hyper-V.
Describe options for providing high availability for Hyper-V.
Module 2: Installing and Configuring the Hyper-V Server Role
After completing this module, you will be able to install the Hyper-V server role, and configure host and virtual network settings.
Installing the Hyper-V Server Role
Configuring Hyper-V Settings and Virtual Networks
Lab : Installing and Configuring the Hyper-V Server Role
Installing the Hyper-V Role
Determining Virtual Network Configuration Settings Based On Organizational Requirements
Configuring Virtual Network Settings Using Virtual Network Manager
Installing Remote Management Tools
After completing this module, students will be able to:
Describe the prerequisites for installing Hyper-V.
Describe the process for installing Hyper-V on a Windows Server 2008 R2 host.
Identify the management tools that you can use to manage the Hyper-V server role.
Install and configure Hyper-V management for remote administration.
Installing the Hyper-V Server Role on a Server Core Installation of Windows Server 2008 R2.
Modify the default folders for virtual machines and virtual hard disks.
Configure Hyper-V user settings.
Determine when to use external, internal, or private virtual machine networks.
Use Virtual Network Manager to configure virtual networks.
Configure Hyper-V to support VLANs.
Module 3: Creating and Configuring Virtual Hard Disks and Virtual Machines
After completing this module, you will be able to determine and configure the most appropriate virtual hard disk(s) to use in a virtual machine. Students also will be able to create and configure virtual machines.
Creating and Configuring Virtual Hard Disks
Creating and Configuring Virtual Machines
Managing Virtual Machine Snapshots
Working with the Virtual Machine Connection Application
Lab : Creating Virtual Hard Disks and Virtual Machines
Creating Appropriate Virtual Hard Disks, Based On Organizational Requirements
Creating New Virtual Machines Using the Virtual Machine Wizard
Modifying Virtual Machine Settings
Creating and Modifying Virtual Machine Snapshots
After completing this module, students will be able to:
Describe storage options for virtual machines.
Prepare the host computer to attach physical disks to a virtual machine.
Configure storage based on Internet Small Computer System Interface (iSCSI).
Describe the types of virtual hard disks.
Describe the use and benefits of pass-through disks.
Create a new virtual hard disk using the new Virtual Hard Disk Wizard.
Edit and inspect virtual hard disks.
Describe considerations for creating new virtual machines.
Create a new virtual machine using the new Virtual Machine Wizard.
Configure virtual machine settings.
Describe the Hyper-V integration services.
Import and export virtual machines.
Describe the file formats that you use for virtual machines.
Migrate legacy virtual machines to Hyper-V.
Describe what a virtual machine snapshot is and how you use it.
Describe considerations for using snapshots, including storage sizing and requirements.
Creating and managing virtual machine snapshots.
Describe the Virtual Machine Connection Tool.
List the considerations for using the virtual machine connection tool.
Discuss connecting to remote virtual machines from a domain and to a virtual machine in a remote domain.
Module 4: Integrating System Center Virtual Machine Manager with Microsoft Hyper-V Server 2008 R2
After completing this module, students will be able to plan for, and deploy, System Center Virtual Machine Manager with their Hyper-V solution.
Planning for Integration of System Center Virtual Machine Manager
Installing the VMM Server and Administrator Console
Managing Hosts and Host Groups
Lab : Planning and Deploying VMM 2008 R2
Planning for the Implementation of SCVMM 2008 R2, Based Upon Organizational Requirements
Installing and Configuring SCVMM Server and Administration Console Components
After completing this module, students will be able to:
Create and Manage Host Groups.
Describe the VMM.
Describe VMM 2008 R2 components.
Describe system requirements for installing VMM 2008 R2 components.
Plan for the management of hosts and host groups.
Plan for the implementation of the VMM database.
Plan for the implementation of the VMM Library.
Describe considerations for installing the VMM Server and Administrator console, including domain requirements, account requirements, and other requirements.
Describe the process for installing the VMM Server.
Use the VMM Configuration Analyzer to identify configuration issues.
Describe the installation and features of the VMM administrator console.
Describe common post-installation tasks.
Describe the Windows PowerShell – VMM command shell.
Describe reasons for using host groups.
Create and modify the properties of host groups.
Describe the types of hosts that you can add to VMM 2008.
Configure default virtual machine paths.
Describe the process for adding hosts in an Active Directory directory service domain.
Describe the process for adding hosts located in a perimeter network.
Describe the management options for a host.
Module 5: Creating and Deploying Virtual Machines Using System Center Virtual Machine Manager 2008 R2
After completing this module, students will be able to use VMM 2008 R2 to create and deploy virtual machines.
Creating a New Virtual Machine Using VMM 2008 R2
Converting a Physical Server to a Virtual Machine
Converting and Migrating Virtual Machines
Lab : Creating and Deploying Virtual Machines
Creating a New Virtual Machine
Deploying a New Virtual Machine from the VMM Library
Converting a VMware-Based Virtual Machine to a Hyper-V Based Virtual Machine
After completing this module, students will be able to:
Describe supported operating systems and hardware capabilities for virtual machines.
Identify sources that you can use for new virtual machines.
Describe placement options when creating a new virtual machine.
Describe how you use ratings to determine appropriate placement.
Describe how to customize placement ratings for a specific virtual machine.
Deploy stored virtual machines from a VMM Library.
Describe considerations and methods for determining physical-to-virtual (P2V) machine conversion candidates.
Describe requirements for physical source computers.
Perform a P2V conversion.
Identify the difference between converting and migrating a virtual machine.
Describe requirements for performing a V2V conversion.
Describe the options you have when performing a V2V conversion.
Describe the considerations and the process for migrating a virtual machine.
Describe scenarios for cloning an existing virtual machine.
Describe considerations for cloning a virtual machine.
Describe the process and decision points for cloning a virtual machine.
Module 6: Managing Virtual Machines Using Virtual Machine Manager 2008
This module explains how to perform various management tasks on virtual machines stored within the VMM infrastructure.
Overview of VMM Management Tasks
Creating and Managing Checkpoints
Lab : Managing Virtual Machines Using VMM 2008 R2
Modifying Virtual Machine Properties
Managing Virtual Machine Checkpoints
After completing this module, students will be able to:
Describe common actions for operating and managing virtual machines.
Perform actions used to operate a virtual machine.
Perform actions used to deploy, migrate, and store virtual machines.
Perform actions used to manage configurations, disks, and checkpoints.
Describe virtual machine property options.
Perform actions to configure virtual machine property options.
Describe considerations for using checkpoints.
Create and modify a VMM checkpoint.
Manage VMM checkpoints.
Module 7: Configuring and Managing the VMM Library
This module explains how to configure and manage resources in the VMM Library.
Overview of the VMM Library
Managing Profiles and Templates
Designing Fault Tolerance for the VMM Library
Lab : Configuring and Managing the VMM Library
Adding a Library Server and Library Resources
Creating a Hardware Profile
Creating a Guest Operating-System Profile
Creating a Virtual Machine Template
Configuring highly available file servers for Virtual Machine Library Using DFS
After completing this module, students will be able to:
Describe what the VMM Library is and the types of resources that are stored within the library.
Add a Library Server and assign library groups.
Add library shares to a library server.
Add file-based resources to the library.
Describe hardware profiles and benefits of their usage.
Describe guest operating system profiles and benefits of their usage.
Show how to create a hardware and guest operating-system profile.
Describe the benefits for creating and using virtual machine templates.
Describe the components that make up a virtual machine template.
Create a virtual machine template.
Describe options for providing fault tolerance for the VMM Library.
Compare and evaluate the differences between the options.
List the considerations for supporting highly available Library Servers.
Module 8: Configuring User Roles and the Virtual Machine Manager Self-Service Portal
This module explains how to configure and manage user roles and the Virtual Machine Manager Self-Service Portal.
Configuring User Roles
Installing and Configuring the VMM Self-Service Portal
Lab : Configuring the VMM Self-Service Portal
Preparing the Host Group and User Role Requirements
Implementing the Self-Service Portal
After completing this module, students will be able to:
Describe the concept of role-based security in VMM 2008 R2.
Describe the role types that are available in VMM 2008 R2.
Describe the objects that you can delegate by using Role-based security.
Describe the process for creating a user role in VMM 2008.
Create user roles in VMM 2008 R2.
Determine the most appropriate role-based security configuration based upon organizational requirements.
Describe considerations for implementing the VMM Self-Service Portal.
Describe the overall process for implementing the Self-Service Portal.
Describe system requirements for the VMM Self-Service Portal.
Install the SCVMM Self-Service Portal.
Configure user access to the SCVMM Self-Service Portal.
Describe security best practices for the SCVMM Self-Service Portal.
Module 9: Implementing High Availability for Server Virtualization
This module explains how to configure high availability for server virtualization.
Overview of Failover Clustering
Implementing Failover Clustering with Hyper-V
Implementing High Availability with VMM 2008 R2
Lab : Implementing High Availability for Server Virtualization
Installing and Configuring the Failover Clustering Feature
Configuring Live Migration
Integrating Failover Clustering with VMM 2008 R2
After completing this module, students will be able to:
Describe options for providing high availability for virtualization.
Describe what a Failover Cluster is and how it provides high availability for virtual machines.
Describe new Failover Cluster functionality available in Windows Server 2008 R2.
Describe considerations for a Failover Cluster design.
Determine appropriate Quorum configurations for Failover Clusters.
Describe how Failover Clusters work with Hyper-V.
Describe best practices for implementing Failover clustering with Hyper-V.
Describe requirements for using Hyper-V with failover clustering.
Describe the overall process for implementing Hyper-V and failover clustering.
Implement failover clustering with Hyper-V.
Describe Live Migration.
Describe the overall process for implementing Live Migration.
Perform Live Migration using Hyper-V.
Describe planning considerations for implementing high availability with SCVMM 2008 R2.
Describe the overall process for configuring host clusters to support high availability.
Describe how to manage host clusters.
Implement clustering using VMM 2008.
Module 10: Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool
This module explains how to maintain software updates using the Offline Virtual Machine Servicing Tool.
Overview of the Offline Virtual Machine Servicing Tool
Configuring WSUS and the Offline Virtual Machine Servicing Tool
Lab : Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool
Configuring Infrastructure Prerequisites to Support the Offline Virtual Machine Servicing Tool
Installing and Configuring the Offline Virtual Machine Servicing Tool
After completing this module, students will be able to:
Describe methods for maintaining software updates.
Describe how the Offline Virtual Machine Servicing Tool works.
Describe infrastructure requirements for the Offline Virtual Machine Servicing Tool.
Describe tasks required to prepare the virtual machines for offline software-update management.
Describe the process for configuration WSUS to support virtual machine servicing.
Configure WSUS to support virtual machine servicing.
Describe the process for installing and configuring the Offline Virtual Machine Servicing Tool.
Install and configure the Offline Virtual Machine Servicing Tool.
Module 11: Monitoring and Reporting Virtualization
This module explains how to use the monitoring tools included with VMM 2008 and integrate System Center Operations Manager to provide extended monitoring, reporting, and troubleshooting capabilities.
Monitoring Jobs in VMM 2008 R2
Integrating System Center Operations Manager with VMM 2008 R2
Configuring Performance and Resource Optimization
Lab : Integrating System Center Operations Manager with VMM 2008
Configuring System Center Operations Manager for VMM 2008 Integration
Configuring PRO
After completing this module, students will be able to:
Describe the VMM jobs feature.
Describe the methods used to view job status.
Cancel and restart jobs.
Filter job status.
Track changes using Jobs view.
Perform management tasks related to job status in VMM.
Identify reporting needs for specific virtual environment scenarios.
Describe features provided by integrating System Center Operations Manger.
Describe prerequisites for integrating Operations Manager.
Describe the process for integrating Operations Manager with VMM 2008 R2.
Enable reporting in VMM 2008 R2.
Describe Performance and Resource Optimization (PRO).
Plan for the implementation of PRO.
Enable PRO integration.
View and implement PRO Tips.
Module 12: Backup and Restore Strategies for Virtual Machines
This module explains how to configure and manage resources in the VMM Library.
Overview of Backup and Restore Options for Virtual Machines and the VMM Database
Implementing Data Protection Manager for Backing Up the VMM Infrastructure
Lab : Using Data Protection Manager to Back Up the VMM 2008 Infrastructure
After completing this module, students will be able to:
Describe options for backing up virtual machines.
Use the SCVMM Administrator console to back up the VMM database.
Describe the process and tools used to restore the VMM database.
Describe the features of Data Protection Manager 2007 SP1.
Describe the prerequisites for installing and implementing Data Protection Manager 2007 SP1.
Describe the process for installing and configuring Data Protection Manager 2007 SP1.
Describe the process for configuring backup processes for SCVMM 2008 and Data Protection Manager 2007 SP1.
Module 13: Desktop Virtualization Using Remote Desktop Services
This module explains how to describe and implement the core role services included in the Remote Desktop Services server Role.
Overview of Remote Desktop Services
Implementing the Remote Desktop Session Host
Implementing Remote Desktop Connection Broker
Implementing the Remote Desktop Connection Virtualization Host
Lab : Implementing Remote Desktop Services
Installing the Remote Desktop Session Host
Installing and configuring the Remote Desktop Session Host
Installing the Remote Desktop Connection Broker
Configuring the Remote Desktop Connection Broker
Installing and Configuring the Remote Desktop Virtualization Host
Deploying an Application Using RemoteApp
After completing this module, students will be able to:
Describe the benefits of Remote Desktop Services.
Describe the Role Services included with the Remote Desktop Services sever role.
Describe updates to the client experience with Remote Desktop Services.
Describe RD Licensing.
Describe the prerequisites for installing and implementing the RD Session Host.
Describe common configuration and management tasks for the RD Session Host.
Describe how to secure an RD Session Host.
What is the RDS Broker Role?
Describe the prerequisites for installing and implementing the RDS Connection Broker.
Describe common configuration and management tasks for the RDS Connection Broker.
Deploying RemoteApp to a Windows 7 Client Start menu.
Describe the virtual desktop infrastructure concept and how the Remote Desktop Virtualization host works.
Describe the prerequisites for installing and implementing the RD Virtualization Host.
Module 14: Extending Remote Desktop Services Outside the Organization
This module explains how to implement and configure the Remote Desktop Gateway and Remote Desktop Web Access.
Configuring the Remote Desktop Gateway
Configuring Remote Desktop Web Access
Lab : Integrating Remote Desktop Web Access into the Desktop Virtualization Infrastructure
Installing Remote Desktop Gateway
Installing Remote Desktop Web Access
Configuring Remote Desktop Web Access
Integrating RemoteApp and Desktop Connection with Remote Desktop Web Access
After completing this module, students will be able to:
Describe how the Remote Desktop Gateway works.
Describe how to secure the Remote Desktop Gateway.
Use Authorization Policies with Remote Desktop gateway.
Describe how to configure the Remote Desktop Gateway.
Describe how to use network access protocol (NAP) remediation with Remote Desktop Gateway.Use certificates for Remote Desktop Gateway.
Describe the prerequisites for installing and implementing Remote Desktop Web Access.
Describe how to implement RemoteApp and Desktop connection with RD Web Access.
Describe how to secure Remote Desktop Web Access.
Configure Single Sign-on for Remote Desktop Web Access.
Integrate RemoteApp and Remote Desktop Web Access.
Training Implementing and Managing Microsoft Server Virtualization
Onze voordelen :
Type of training: Inter-company, intra-company and individual
100% flexible & personalised training : You choose the place, the dates and the training program
Offer request : Response within 24 hours
50% discount for SME’s from Brussels-Capital Region
Free parking, lunch & drinks
Free use of our Digital Competence Centre: Manuals, courses, exercises, …