IT-kurs
Kurs i programvare og applikasjoner
Telemark
Du har valgt: Skien
Nullstill
Filter
Ferdig

-

Mer enn 100 treff ( i Skien ) i Kurs i programvare og applikasjoner
 

Nettkurs 40 minutter 5 600 kr
MoP®, er et rammeverk og en veiledning for styring av prosjekter og programmer i en portefølje. Sertifiseringen MoP Foundation gir deg en innføring i porteføljestyring me... [+]
Du vil få tilsendt en «Core guidance» bok og sertifiserings-voucher slik at du kan ta sertifiseringstesten for eksempel hjemme eller på jobb. Denne vil være gyldig i ett år. Tid for sertifiseringstest avtales som beskrevet i e-post med voucher. Eksamen overvåkes av en web-basert eksamensvakt.   Eksamen er på engelsk. Eksamensformen er multiple choice - 50 spørsmål skal besvares, og du består ved 50% korrekte svar (dvs 25 av 50 spørsmål). Deltakerne har 40 minutter til rådighet på eksamen.  Ingen hjelpemidler er tillatt.   Nødvendige forkunnskaper: Ingen [-]
Les mer
Webinar + nettkurs 1 dag 5 590 kr
Kurs i hvordan du bruker programmet Focus VARDAK for detaljprosjektering av rør og kummer. [+]
Kurset retter seg til dere som jobber med kummer og rør, enten som prosjekterende, kravstiller, regulerende eller besluttende. Kurset passer nye brukere, eller for deg som bare behøver litt oppfriskning. Hensikten med kurset er å gi deltagerne en god forståelse i bruken av Focus VARDAK som design-, modellering- og kommunikasjonsverktøy. Kurset er nødvendig for å komme raskt i gang med Focus VARDAK, og for å få den nødvendige forståelse for de mulighetene programmet gir. Kursinnhold: Du vil lære grunnleggende teknikk for bruk av programmet, og skal kunne bruke programmet til å lese, endre og produsere 2D og 3D-modeller av kummer og bruke Focus VARDAK-biblioteket. Bli kjent med brukergrensesnittet i Focus VARDAK Bruk av VARDAK-verktøy Behandling av nodepunkter (tilkoblingspunkter) Navigering i VARDAK-katalogen Redigering av innsatte produkter (blokker) Produksjon av 2D-tegninger Opptegning av kum systemer i 2D og 3D Tilegne produkter materialer Rendere ut 3D tegninger Tips og triks for hvordan jobbe smartere i Focus VARDAK For deg som jobber med VA. [-]
Les mer
Nettkurs
Har du brukt Excel en stund og tenkt at du ønsker å komme litt videre. I dette kurset ser vi på en rekke funksjoner, tips og muligheter som vil gjøre deg til en mer effek... [+]
I kurset finner du en rekke videoklipp som viser i programmet hvordan man utfører de ulike oppgavene og presenterer resultatet av dette. Du får innsendingsoppgaver underveis som vil bli fulgt opp av en faglærer, og du har tilgang til faglærer i hele kursperioden. Du kan du stille spørsmål, både til faglærer, men også i et forum som er tilgjengelig for deltakere i kurset.Du får tilgang til vår e-læringsportal som vil gi deg god oversikt over progresjonen i kurset i et brukervennlig og enkelt system.I kurset ser vi blant annet på følgende temaer:Funksjoner: ANTALL og ANTALLA HVIS-funksjonen FINN.RAD og FINN.KOLONNE ANTALL.HVIS og SUMMERHVIS AVRUND Formatering: Dato- og tidfunksjoner Tekstfunksjoner Formatering av datoer Betinget formatering Kopiering av formatering Avansert tallformatering Beskyttelse av celler Formler og navngivning: Låsing av celler Navngivning av celler Målsøking og scenariobehandling Jobbe med lister og database: Sortering og filtrering Fjerne duplikater Pivottabeller: Datagrunnlaget og datakilder Oppsett av felt Delsummer og totalsummer Gruppere på dato Velge beregning i verdifelt Vis verdier som Formatere tall Formatere tabell Diagrammer Kurset består av tekst, bilder og en rekke videoklipp i leksjonene i kurset. Det er ikke behov for noe ytterligere dokumentasjon. Du får tilbakemeldinger fra faglærer på innsendingsoppgaver og du har tilgang til hjelp i hele kursperioden (ett år). Mer informasjon om kurset her. [-]
Les mer
Nettkurs 8 timer 349 kr
I dette kurset lærer du å bruke Adobe Illustrator på et profesjonelt nivå - og det kreves ingen forkunnskaper for å ta kurset. I begynnelsen av kurset lærer du hvordan pr... [+]
Dette kurset, ledet av Espen Faugstad, er din omfattende guide til å mestre Adobe Illustrator på et profesjonelt nivå, uten at det kreves noen forkunnskaper. Kurset starter med grunnleggende, som å forstå programmet, dets verktøy og paneler, og lærer deg raskt å jobbe effektivt med lag, objekter, og grunnleggende geometriske figurer. Etter hvert som kurset utvikler seg, vil du dykke dypere inn i Illustrator og lære å tegne komplekse figurer med pennverktøyet, som er essensielt for å skape avansert grafikk i Illustrator. Kurset dekker også objektmanipulering, fargebruk, maling med pensler, tekst og typografi, effekter, bildehåndtering, og mye mer. Ved slutten av kurset vil du ha opparbeidet deg en solid forståelse og ferdigheter for å jobbe profesjonelt med Illustrator og vektorbasert grafikk.   Innhold: Kapittel 1: Introduksjon Kapittel 2: Dokument Kapittel 3: Verktøy Kapittel 4: Velge og ordne objekter Kapittel 5: Linjer og figurer Kapittel 6: Tegne objekter Kapittel 7: Redigere objekter Kapittel 8: Farger Kapittel 9: Male Kapittel 10: Tekst Kapittel 11: Effekter Kapittel 12: Bilder Kapittel 13: Eksportere Kapittel 14: Avslutning   Varighet: 7 timer og 59 minutter   Om Utdannet.no: Utdannet.no tilbyr noen av landets beste digitale nettkurs. Tjenesten fungerer på samme måte som strømmetjenester for musikk eller TV-serier. Våre kunder betaler en fast månedspris og får tilgang til alle kursene som er produsert så langt. Plattformen har hatt en god vekst de siste årene og kan skilte med 30.000 registrerte brukere og 1,5 millioner videoavspillinger. Vårt mål er å gjøre kompetanseutvikling moro, spennende og tilgjengelig for alle – og med oss har vi Innovasjon Norge og Forskningsrådet. [-]
Les mer
Virtuelt klasserom 4 dager 22 000 kr
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solut... [+]
. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.   TARGET AUDIENCE This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. COURSE OBJECTIVES Implement an identity management solution Implement an authentication and access management solutions Implement access management for apps Plan and implement an identity governancy strategy COURSE CONTENT Module 1: Implement an identity management solution Learn to create and manage your initial Azure Active Directory (Azure AD) implementation and configure the users, groups, and external identities you will use to run your solution. Lessons M1 Implement Initial configuration of Azure AD Create, configure, and manage identities Implement and manage external identities Implement and manage hybrid identity Lab 1a: Manage user roles Lab 1b: Setting tenant-wide properties Lab 1c: Assign licenses to users Lab 1d: Restore or remove deleted users Lab 1e: Add groups in Azure AD Lab 1f: Change group license assignments Lab 1g: Change user license assignments Lab 1h: Configure external collaboration Lab 1i: Add guest users to the directory Lab 1j: Explore dynamic groups After completing module 1, students will be able to: Deploy an initail Azure AD with custom settings Manage both internal and external identities Implement a hybrid identity solution Module 2: Implement an authentication and access management solution Implement and administer your access management using Azure AD. Use MFA, conditional access, and identity protection to manager your identity solution. Lessons M2 Secure Azure AD user with MFA Manage user authentication Plan, implement, and administer conditional access Manage Azure AD identity protection Lab 2a: Enable Azure AD MFA Lab 2b: Configure and deploy self-service password reset (SSPR) Lab 2c: Work with security defaults Lab 2d: Implement conditional access policies, roles, and assignments Lab 2e: Configure authentication session controls Lab 2f: Manage Azure AD smart lockout values Lab 2g: Enable sign-in risk policy Lab 2h: Configure Azure AD MFA authentication registration policy After completing module 2, students will be able to: Configure and manage user authentication including MFA Control access to resources using conditional access Use Azure AD Identity Protection to protect your organization Module 3: Implement access management for Apps Explore how applications can and should be added to your identity and access solution with application registration in Azure AD. Lessons M3 Plan and design the integration of enterprise for SSO Implement and monitor the integration of enterprise apps for SSO Implement app registration Lab 3a: Implement access management for apps Lab 3b: Create a custom role to management app registration Lab 3c: Register an application Lab 3d: Grant tenant-wide admin consent to an application Lab 3e: Add app roles to applications and recieve tokens After completing module 3, students will be able to: Register a new application to your Azure AD Plan and implement SSO for enterprise application Monitor and maintain enterprise applications Module 4: Plan and implement an identity governancy strategy Design and implement identity governance for your identity solution using entitlement, access reviews, privileged access, and monitoring your Azure Active Directory (Azure AD). Lessons M4 Plan and implement entitlement management Plan, implement, and manage access reviews Plan and implement privileged access Monitor and maintain Azure AD Lab 4a: Creat and manage a resource catalog with Azure AD entitlement Lab 4b: Add terms of use acceptance report Lab 4c: Manage the lifecycle of external users with Azure AD identity governance Lab 4d: Create access reviews for groups and apps Lab 4e: Configure PIM for Azure AD roles Lab 4f: Assign Azure AD role in PIM Lab 4g: Assign Azure resource roles in PIM Lab 4h: Connect data from Azure AD to Azure Sentinel After completing module 4, students will be able to: Mange and maintain Azure AD from creation to solution Use access reviews to maintain your Azure AD Grant access to users with entitlement management [-]
Les mer
Oslo Bergen 5 dager 43 500 kr
10 Jun
10 Jun
24 Jun
ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies [+]
ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies [-]
Les mer
2 dager 15 000 kr
This 2-day course is identical to the 1-day M-AZ-900T01 course.  However this course lasts two days because of the hands-on parts. This course will prepare students for t... [+]
  COURSE OVERVIEW This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses. The course will cover general cloud computing concepts as well as general cloud computing models and services such as Public, Private and Hybrid cloud and Infrastructure-as-a-Service (IaaS), Platform-as-a-Service(PaaS) and Software-as-a-Service (SaaS). It will also cover some core Azure services and solutions, as well as key Azure pillar services concerning security, privacy, compliance and trust. It will finally cover pricing and support services available with Azure.   COURSE CONTENT  Module 1: Cloud Concepts -Learning Objectives-Why Cloud Services?-Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)-Public, Private, and Hybrid cloud models Module 2: Core Azure Services -Core Azure architectural components-Core Azure Services and Products-Azure Solutions-Azure management tools Module 3: Security, Privacy, Compliance and Trust -Securing network connectivity in Azure-Core Azure Identity services-Security tools and features-Azure governance methodologies-Monitoring and Reporting in Azure-Privacy, Compliance and Data Protection standards in Azure Module 4: Azure Pricing and Support -Azure subscriptions-Planning and managing costs-Support options available with Azure-Service lifecycle in Azure     This course helps to prepare for exam AZ-900. [-]
Les mer
2 dager 8 500 kr
Etter fullført kurs skal du beherske mulighetene Final Cut Pro. [+]
• Final Cut grensesnitt & funksjoner oversikt som: Fordeler av “magnetic timeline”, “connected clips & secondary storyline”, lyd og “roles”• Final Cut keyboard shortcuts• Import og organisasjon av videofiler i “library” med “keywords”• Klipp av en videoreportasje med innklippsbilder, intervju, voiceover og logo/ grafikk• Sync av ekstern lyd• Flerkameraklipping med “Multicam”• Fargekorrigering• Lydmiks og lydforbedring• Enkle “Film looks” effekter og justering av effekter• 2D og 3D tekst, legge på navn og tittel, enkel keyframeing & animasjon av logo og grafikk• Eksport Dag 2: Fordypning i FCPX og Motion 5 for å bygge et sett av animasjoner og grafikk for lynrask produksjon av et TV-program / YouTube video-serie • Avanserte video- og grafikk-komposisjoner med flere lag• Triks til å overkomme begrensningene i “magnetic timeline”• Anonymisering av ansikter og nummerskilt• Motion: Tilpassning av FCPX “Transitions” og “Titles” i Motion 5 for å skape egne design på en enkel måte• Motion 5: 2D animasjoner og tekst tracking• Motion 5: Enkle 3D animasjoner og kamera• Motion 5: Keyframes og Behaviors• Motion 5: Vi kombinerer alt vi lærer om Motion 5 og skaper grafiske elementer for et TV-program / YouTube video-serie som logo-intro-animasjon, lower-third, custom transitions/logo stinger.• Motion 5: Publisering til FCPX for lynrask produksjon i framtiden [-]
Les mer
Virtuelt klasserom 3 timer 1 750 kr
24 Jun
I dette kurset konsentrerer vi oss om oppslagsfunksjonene FINN.RAD, FINN.KOLONNE OG XOPPSLAG og viser avanserte eksempler. Vi tar også for oss noen eksempler på bruk av f... [+]
Kursinnhold FINN.RAD() FINN.KOLONNE() XOPPSLAG() – den nye oppslagsfunksjonen. Super funksjonalitet INDEKS() / SAMMENLIGNE() [-]
Les mer
5 dager 35 000 kr
12 Aug
CWS-215: Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud [+]
CWS-215: Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud [-]
Les mer
Virtuelt klasserom 3 dager 24 000 kr
The Veeam® Availability Suite™ v11: Configuration and Management training course is a three-day, technical deep dive focused on teaching IT professionals the skills to co... [+]
COURSE OVERVIEW . With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. This course is based on Veeam Availability Suite v11. TARGET AUDIENCE This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. COURSE OBJECTIVES After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization’s evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. COURSE CONTENT Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building Replication Capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary Backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced Repository Capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting Data in the Cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from Backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from Replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE™ Configuration Backup Locate, migrate or restore backup configuration   TEST CERTIFICATION Completion of this course satisfies the prerequisite for taking the Veeam Certified Engineer (VMCE) 2021 exam. [-]
Les mer
Virtuelt klasserom 5 dager 35 000 kr
The Implementing Cisco Application Centric Infrastructure course show you how to deploy and manage the Cisco® Nexus® 9000 Series Switches in Cisco Application Centric Inf... [+]
COURSE OVERVIEW ou will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course is based on ACI Software v5.2 release.   This course helps you prepare to take the exam, Implementing Cisco Application Centric Infrastructure(300-620 DCACI), which leads to CCNP® Data Center and Cisco Certified Specialist – Data Center ACI Implementation certifications. TARGET AUDIENCE Individuals who need to understand how to configure and manage a data center network environment with the Cisco Nexus 9000 Switch operating in ACI Mode.   COURSE OBJECTIVES After completing this course, you should be able to: Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts Describe Cisco ACI policy model logical constructs Describe Cisco ACI basic packet forwarding Describe external network connectivity Describe VMM Integration Describe Layer 4 to Layer 7 integrations Explain Cisco ACI management features COURSE CONTENT Introducing Cisco ACI Fabric Infrastructure and Basic Concepts What Is Cisco ACI? Cisco ACI Topology and Hardware Cisco ACI Object Model Faults, Event Record, and Audit Log Cisco ACI Fabric Discovery Cisco ACI Access Policies Describing Cisco ACI Policy Model Logical Constructs Cisco ACI Logical Constructs Tenant Virtual Routing and Forwarding Bridge Domain Endpoint Group Application Profile Tenant Components Review Adding Bare-Metal Servers to Endpoint Groups Contracts Describing Cisco ACI Basic Packet Forwarding Endpoint Learning Basic Bridge Domain Configuration **** Introducing External Network Connectivity Cisco ACI External Connectivity Options External Layer 2 Network Connectivity External Layer 3 Network Connectivity Introducing VMM Integration VMware vCenter VDS Integration Resolution Immediacy in VMM Alternative VMM Integrations Describing Layer 4 to Layer 7 Integrations Service Appliance Insertion Without ACI L4-L7 Service Graph Service Appliance Insertion via ACI L4-L7 Service Graph Service Graph Configuration Workflow Service Graph PBR Introduction Explaining Cisco ACI Management Out-of-Band Management In-Band Management Syslog Simple Network Management Protocol Configuration Backup Authentication, Authorization, and Accounting Role-Based Access Control Cisco ACI Upgrade Collect Tech Support Labs Validate Fabric Discovery Configure Network Time Protocol (NTP) Create Access Policies and Virtual Port Channel (vPC) Enable Layer 2 Connectivity in the Same Endpoint Group (EPG) Enable Inter-EPG Layer 2 Connectivity Enable Inter-EPG Layer 3 Connectivity Compare Traffic Forwarding Methods in a Bridge Domain Configure External Layer 2 (L2Out) Connection Configure External Layer 3 (L3Out) Connection Integrate Application Policy Infrastructure Controller (APIC) With VMware vCenter Using VMware Distributed Virtual Switch (DVS) TEST CERTIFICATION Recommended as preparation for the following exams: 300-620 DCACI - Implementing Cisco Application Centric Infrastructure [-]
Les mer
Oslo 3 dager 27 900 kr
22 May
22 May
21 Aug
Security Engineering on AWS [+]
Security Engineering on AWS [-]
Les mer
Nettstudie 2 semester 4 980 kr
På forespørsel
Automatisering og sikring ved hjelp av System Center Cooperation Manager 2012 (SCCM 2012) - Applikasjonsutrulling - Operativ System utrulling - Klient tilstands-monitorer... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Windows server 2008/2012 - god kjennskap om Windows server Innleveringer: Øvinger: 8 av må være godkjent. Personlig veileder: ja Vurderingsform: Eksamen blir arrangert som 2 dagers hjemmeeksamen (start kl 09.00 og innlevering kl 15.00 dagen etter). Hver student får tildelt et virtuelt område. Det skal også leveres en skriftelig begrunnelse for de valg som er foretatt. Hjemmeeksamen, individuell, 2 dager, 0 Ansvarlig: Stein Meisingseth Eksamensdato: 10.12.13 / 13.05.14         Læremål: KUNNSKAPER:Kandidaten:- har innsikt i drift av nettverk basert på Windows Server, programvaredistribusjon og kjenner til hvilke verktøy som kan brukes for administrasjon av virtuelle maskiner og nettverk- kan forklare systemer som kan benyttes til overvåkning og vedlikehold FERDIGHETER:Kandidaten kan:- installere og konfigurere System Center Configuration Manager 2012- automatisere manuelle operasjoner- sikre, oppdatere og overvåke IT-systemer GENERELL KOMPETANSE:Kandidaten har:- perspektiv og kompetanse i å velge riktige og tilpassete driftsløsninger- kompetanse i å formidle driftsterminologi, både muntlig og skriftlig Innhold:- Automatisering og sikring ved hjelp av System Center Cooperation Manager 2012 (SCCM 2012) - Applikasjonsutrulling - Operativ System utrulling - Klient tilstands-monitorering - Programvare oppdateringer - Sikkerhetsbeskyttelse vha Endpoint ProtectionLes mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Microsoft System Center i overvåkning og drift 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Virtuelt klasserom 5 dager 33 000 kr
VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Adm... [+]
COURSE OVERVIEW . This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.  Product Alignment: VMware Horizon 8 V2006 TARGET AUDIENCE Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. COURSE OBJECTIVES By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere® to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon® Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment COURSE CONTENT 1  Course Introduction Introductions and course logistics Course objectives 2  Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon 3  Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes 4  vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere® Client™ to access your vCenter Server system and VMware ESXi™ hosts Create, provision, and remove a virtual machine 5  VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs 6  VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops 7  VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon® Connection Server™ inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies 8  VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams 9  Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools 10  Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm 11  Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool 12  Course Introduction Introductions and course logistics Course objectives 13  Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of Horizon Connection Server installation 14  VMware Horizon Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a Horizon administrator and custom roles Describe the roles available in a Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a Horizon environment 15  Workspace ONE Access & Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services 16  VMware Horizon Performance and Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Describe the 3D rendering options available in Horizon 8 List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options 17  Managing VMware Horizon Security Explain concepts relevant to secure Horizon connections Describe how to restrict Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces TEST CERTIFICATION VMware Certified Professional – Desktop and Mobility 2020 (VCP-DTM 2020) [-]
Les mer