Course Overview:
This hands-on training course builds your skills in the VMware ViewTM suite of products: VMware View Manager, VMware View Composer, and VMware® ThinAppTM. Based on customer specification, this course can be based on View 4.x or 5.x, and ThinApp 4.x or 5.x releases.
Attendees to VM-325: VMware View: Install, Configure and Manage will receive TechNow approved course materials and expert instruction.
At the end of this course, you should understand the features and operations of View and be able to:
- Install and configure View components
- Create and manage dedicated and floating desktop pools
- Deploy and manage linked-clone virtual desktops
- Configure and manage desktops that run in local mode
- Configure secure access to desktops through a public network
- Use ThinApp to package applications
Date/Locations:
No Events
Duration: 5 days
Course Objectives:
- Module 1: Course Introduction
- Module 2: Introduction to VMware View
- Module 3: View Connection Server
- Module 4: View Desktops
- Module 5: View Client Options
- Module 6: View Administratory
- Module 7: Configuring and Managing Linked Clones
- Module 8: Local-Mode Desktops
- Module 9: Command-Line Tools and Backup Options
- Module 10: Managing VMware View Security
- Module 11: View Manager Performance and Scalability
- Module 12: VMware® ThinAppTM
Prerequisites:
- VM-315: VMware Infrastructure: Install, Configure and Manage
- Experience in Microsoft Windows Active Directory Administration
- Experience with VMware vSphereTM
- Before attending the course, students must be able to perform the following tasks:
- Create a template in VMware vCenterTM Server and deploy a virtual machine from it
- Modify a template customization file
- Open a virtual machine console in vCenter Server and access the guest operating system
- Configure Active Directory services
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.
Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Manage Identity
- Plan Desktop and Device Deployment
- Plan and Implement a Microsoft 365 Solution
- Configure Networking
- Configure Storage
- Manage Data Access and Protection
- Manage Remote Access
- Manage Apps
- Manage Updates and Recovery
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.