VMware vSphere: Operate, Scale, and Secure

Course Overview

This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lectures and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. Also, you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how vSphere advanced features and controls can benefit your organization.

By the end of the course, you should be able to meet the following objectives:

  • Configure and manage a VMware Tools Repository
  • Configure vSphere Replication and recover replicated VMs
  • Manage VM resource usage with resource pools
  • Configure and manage vSphere networking and storage for a large and sophisticated enterprise
  • Configure VMware vCenter Server® High Availability
  • Use host profiles to manage VMware ESXi 8 host compliance
  • Use the vSphere Client and the command line to manage certificates
  • Monitor the vCenter, ESXi, and VMs performance in the vSphere client
  • Secure VMware vCenter 8, ESXi, and VMs in your vSphere environment
  • Use Identity Federation to configure the vCenter to use external identity sources
  • Use VMware vSphere® Trust AuthorityTM secure the infrastructure for encrypted VMs

Who Should Attend?

None

Pre-requisite

This course requires completion of one of the following courses: 

  • Attend VMware vSphere: Install, Configure, Manage [V8]
  • Equivalent knowledge and administration experience with ESXi and vCenter
  • Experience with working at the command line is highly recommended

Course Outlines

Module 1: Course Introduction
  • Introductions and course logistics
  • Course objectives
Module 2: Virtual Machine Operations
  • Recognize the role of a VMware ToolsTM Repository
  • Configure a VMware Tools Repository
  • Recognize the backup and restore solution for VMs
  • Identify the components in the VMware vSphere®
    ReplicationTM architecture
  • Deploy and configure vSphere Replication and
    VMware Site RecoveryTM instances
  • Recover replicated VMs
Module 3: vSphere Cluster Operations
  • Create and manage resource pools in a cluster
  • Describe how scalable shares work
  • Describe the function of the vCLS
  • Recognize operations that might disrupt the healthy
    functioning of vCLS VMs
Module 4: Network Operations
  • Configure and manage vSphere distributed
    switches
  • Describe how VMware vSphere® Network I/O
    Control enhances performance
  • Explain distributed switch features such as port
    mirroring and NetFlow
  • Define vSphere Distributed Services Engine
  • Describe the use cases and benefits of VMware
    vSphere® Distributed Services EngineT
Module 5: Storage Operations
  • Discuss vSphere support for NVMe and iSER
    technologies
  • Describe the architecture and requirements of
    vSAN configuration
  • Describe storage policy-based management
  • Recognize components in the VMware vSphere®
    Virtual VolumesTM architecture
  • Configure Storage I/O Control
Module 6: vCenter and ESXi Operations
  • Create a vCenter backup schedule
  • Recognize the importance of vCenter High
    Availability
  • Explain how vCenter Server High Availability works
  • Use host profiles to manage ESXi configuration
    compliance
  • Recognize the benefits of using configuration
    profiles
  • Use the vSphere client and the command line to
    manage certificates
Module 7: vSphere Monitoring
  • Monitor the key factors that can affect a virtual
    machine’s performance
  • Describe the factors that influence vCenter
    performance
  • Use vCenter tools to monitor resource use
  • Create custom alarms in vCenter
  • Describe the benefits and capabilities of VMware
    SkylineTM
  • Recognize uses for VMware Skyline AdvisorTM Pro
Module 8: vSphere Security and Access Control
  • Recognize strategies for securing vSphere
    components, such as vCenter, ESXi hosts, and
    virtual machines
  • Describe vSphere support for security standards
    and protocols
  • Describe identity federation and recognize its use
    cases
  • Configure identity federation to allow vCenter to
    use an external identity provider
Module 9: vSphere Trusted Environments and VM Encryption
  • Configure ESXi Host Access and Authentication
  • Describe virtual machine security features
  • Describe the components of a VM encryption
    architecture
  • Create, manage, and migrate encrypted VMs
  • List VM encryption events and alarms
  • Describe the benefits and use cases of vSphere
    Trust Authority

Join this course

Other Related Course

Beginner, Intermediate