VMware

VMware vSphere: Operate, Scale, and Secure v8 Training

VMware vSphere: Operate, Scale, and Secure v8

This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.

Training at a glance

Level

Intermediate

Duration

5 Days

Experience

3 years: VMware

Average Salary

$82,000

Labs

Yes

Level

Intermediate

Duration

5 Days

Experience

3 years: VMware

Average Salary

$82,000

Labs

Yes

Training Details

By the end of the course, you should be able to meet the following objectives:

  • Configure and manage a VMware Tools Repository
  • Configure vSphere Replication and recover replicated VMs
  • Manage VM resource usage with resource pools
  • Configure and manage vSphere networking and storage for a large and sophisticated enterprise
  • Configure vCenter High Availability
  • Use host profiles to manage VMware ESXi host compliance
  • Use the vSphere Client to manage certificates
  • Monitor the vCenter, ESXi, and VMs performance in the vSphere client
  • Secure vCenter, ESXi, and VMs in your vSphere environment
  • Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs
  • Use Identity Federation to configure the vCenter to use external identity sources
1. Course Introduction
  • Introductions and course logistics
  • Course objectives

2. Virtual Machine Operations
  • Recognize the role of a VMware Tools™ Repository
  • Configure a VMware Tools Repository
  • Recognize the backup and restore solution for VMs
  • Identify the components in the VMware vSphere® Replication™ architecture
  • Deploy and configure vSphere Replication and VMware Site Recovery™ instances
  • Recover replicated VMs

3. vSphere Cluster Operations
  • Create and manage resource pools in a cluster
  • Describe how scalable shares work
  • Describe the function of the vCLS
  • Recognize operations that might disrupt the healthy functioning of vCLS VMs

4. Network Operations
  • Configure and manage vSphere distributed switches
  • Describe how VMware vSphere® Network I/O Control enhances performance
  • Explain distributed switch features such as port mirroring and NetFlow
  • Define vSphere Distributed Services Engine
  • Describe the use cases and benefits of VMware vSphere® Distributed Services Engine™

5. Storage Operations
  • Discuss vSphere support for NVMe and iSER technologies
  • Describe the architecture and requirements of vSAN configuration
  • Describe storage policy-based management
  • Recognize components in the VMware vSphere® Virtual Volumes™ architecture
  • Configure Storage I/O Control

6. vCenter and ESXi Operations
  • Create a vCenter backup schedule
  • Recognize the importance of vCenter High Availability
  • Explain how vCenter Server High Availability works
  • Use host profiles to manage ESXi configuration compliance
  • Recognize the benefits of using configuration profiles
  • Use the vSphere client and the command line to manage certificates

7. vSphere Monitoring
  • Monitor the key factors that can affect a virtual machine’s performance
  • Describe the factors that influence vCenter performance
  • Use vCenter tools to monitor resource use
  • Create custom alarms in vCenter
  • Describe the benefits and capabilities of VMware Skyline™
  • Recognize uses for VMware Skyline Advisor™ Pro

8. vSphere Security and Access Control
  • Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines
  • Describe vSphere support for security standards and protocols
  • Describe identity federation and recognize its use cases
  • Configure identity federation to allow vCenter to use an external identity provider

9. vSphere Trusted Environments and VM Encryption
  • Configure ESXi Host Access and Authentication
  • Describe virtual machine security features
  • Describe the components of a VM encryption architecture
  • Create, manage, and migrate encrypted VMs
  • List VM encryption events and alarms
  • Describe the benefits and use cases of vSphere Trust Authority

Attending this course meets the training requirement to achieve the following certification:

  • Attend VMware vSphere: Install, Configure, Manage [V8]
  • Equivalent knowledge and administration experience with ESXi and vCenter

Experience with working at the command line is highly recommended.

Who should attend?

  • Experienced system administrators
  • System engineers
  • System integrators
This course requires the following:
  • Attend VMware vSphere: Install, Configure, Manage v8
  • Equivalent knowledge and administration experience with ESXi and vCenter
  • Experience with working at the command line is highly recommended

Upcoming Classes

We Offer More Than Just VMware Training

Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.