На первую страницу Курсы для IT специалистов Курсы ИБ Психология - Управление - Маркетинг Курсы для пользователей  

Телефон: +7(495)933-00-06 / О компании / Наши координаты / Карта сайта /  

Курсы по виртуализации на основе продуктов VMware

 

 VS8.0-OSS VMware vSphere: Operate, Scale and Secure [V8]
VMwarevSphere: Эксплуатация, масштабирование и безопасность (версия 8)

Ориентирован: на системных администраторов, системных инженеров и системных интеграторов.
Предварительный уровень подготовки:

  • Прохождение курса VMware vSphere: Install, Configure, Manage [V8]
  • Эквивалентные знания и опыт администрирования ESXi и vCenter.
Продолжительность: 5 дней, 40 часов.
Методические материалы: электронный учебник на английском языке.
Документ об окончании курса: свидетельство о повышении квалификации.

После прохождения курса вы будете способны:

  • Configure and manage a VMware Tools Repository
  • Configure vSphere Replication and recover replicated VMs
  • Manage VM resource usage with resource pools
  • Configure and manage vSphere networking and storage for a large and sophisticated enterprise
  • Configure vCenter High Availability
  • Use host profiles to manage VMware ESXi host compliance
  • Use the vSphere Client to manage certificates
  • Monitor the vCenter, ESXi, and VMs performance in the vSphere client
  • Secure vCenter, ESXi, and VMs in your vSphere environment
  • Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs
  • Use Identity Federation to configure the vCenter to use external identity sources

Программа курса

  1. Course Introduction
  • Introductions and course logistics
  • Course objectives
  1. Virtual Machine Operations
  • Recognize the role of a VMware Tools Repository
  • Configure a VMware Tools Repository
  • Recognize the backup and restore solution for VMs
  • Identify the components in the vSphere Replication architecture
  • Deploy and configure vSphere Replication
  • Recover replicated VMs
  1. vSphere Cluster Operations
  • Create and manage resource pools in a cluster
  • Describe how scalable shares work
  • Describe the function of the vCLS
  • Recognize operations that might disrupt the healthy functioning of vCLS VMs
  1. Network Operations
  • Configure and manage vSphere distributed switches
  • Describe how VMware vSphere Network I/O Control enhances performance
  • Explain distributed switch features such as port mirroring and NetFlow
  • Define vSphere Distributed Services Engine
  • Describe the use cases and benefits of vSphere Distributed Services Engine
  1. 5 Storage Operations
  • Discuss vSphere support for NVMe and iSER technologies
  • Describe the architecture and requirements of vSAN configuration
  • Describe storage policy-based management
  • Recognize components in the vSphere Virtual Volumes architecture
  • Configure Storage I/O Control
  1. vCenter and ESXi Operations
  • Create a vCenter backup schedule
  • Recognize the importance of vCenter High Availability
  • Explain how vCenter High Availability works
  • Use host profiles to manage ESXi configuration compliance
  • Use the vSphere client to manage vSphere certificates
  1. vSphere Monitoring
  • Monitor the key factors that can affect a virtual machine's performance
  • Describe the factors that influence vCenter performance
  • Use vCenter tools to monitor resource use
  • Create custom alarms in vCenter
  • Describe the benefits and capabilities of VMware Skyline
  • Recognize uses for Skyline Advisor Pro
  1. vSphere Security and Access Control
  • Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines
  • Describe vSphere support for security standards and protocols
  • Describe identity federation and recognize its use cases
  • Configure identity federation to allow vCenter to use an external identity provider
  1. vSphere Trusted Environments and VM Encryption
  • Configure ESXi Host Access and Authentication
  • Describe virtual machine security features
  • Describe the components of a VM encryption architecture
  • Create, manage, and migrate encrypted VMs
  • List VM encryption events and alarms
  • Describe the benefits and use cases of vSphere Trust Authority
  • Configure vSphere Trust Authority