Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Comparison of Citrix Hypervisor, Red Hat Virtualization, and Hyper-V
- Overview of Citrix Hypervisor features and architecture
- Best practices for virtualization techniques
Getting Started
- Understanding system requirements for government use
- Installing and configuring Citrix Hypervisor in a government environment
- Managing Citrix Hypervisor using XenCenter for government operations
- Creating resource pools for enhanced management
- Joining servers into a resource pool to optimize resources
Managing Users and Networking
- Setting up users and groups for secure access
- Configuring roles, permissions, and access controls for government compliance
- Modifying role-based access control using CLI commands for granular control
- Setting up networks in a standalone server to ensure connectivity
- Configuring networks in resource pools for efficient management
- Creating VLANs and NIC bonds to enhance network performance
Managing Storage
- Supported storage types for government data centers
- Implementing thin provisioning for GSF2 SR to optimize storage usage
- Creating and managing storage repositories for reliable data management
- Increasing LUN and relocating VDIs without downtime to ensure continuous operation
- Multipathing storage for Fibre Channel and iSCSI to enhance reliability
- Deploying IntelliCache for virtual desktops to improve performance
- Using in-memory read caching to reduce latency
Managing Virtual Machines
- Installing GPUs (NVIDIA, AMD, and Intel) for enhanced computing capabilities
- Creating Windows and Linux VMs for diverse workloads
- Using VM templates and cloning images to streamline deployment
- Migrating VMs and virtual disks for flexible resource allocation
- Monitoring performance metrics to ensure optimal operation
- Enabling high availability features to maintain service continuity
- Setting up disaster recovery and backup strategies for data protection
Implementing Workload Balancing
- Understanding requirements and basic tasks for workload balancing in government environments
- Configuring and administering Workload Balancing to optimize resource utilization
- Configuring self-signed and CA certificates for secure communication
Troubleshooting
Summary and Next Steps
Requirements
- Knowledge of virtualization technologies
- Experience in system administration
Audience for Government
- System administrators
- IT administrators
21 Hours
Testimonials (2)
All good, nothing to improve
Ievgen Vinchyk - GE Medical Systems Polska Sp. Z O.O.
Course - AWS Lambda for Developers
IOT applications