Detailed Course Outline
1. Course Introduction
- Introductions and course logistics
- Course objectives
2. Horizon Connection Server
- Recognize VMware Horizon reference architecture
- Identify the Horizon Connection Server supported features
- Identify the recommended system requirements for Horizon Connection Server
- Configure Horizon event database
- Outline the steps for the initial configuration of Horizon Connection Server
- Discuss the ADAM database as a critical component of Horizon Connection Server installation
3. VMware Horizon Authentication and Certificates
- Compare the authentication options that Horizon Connection Server supports
- Describe the Smartcard authentication options that Horizon Connection Server supports
- Outline the steps to create a Horizon administrator and custom roles
- Describe the roles available in a Horizon environment
- Explain the role that certificates play for Horizon Connection Server
- Install and configure certificates for Horizon Connection Server
- Install and configure True SSO in a Horizon environment
4. Workspace ONE Access & Virtual Application Management
- Recognize the features and benefits of Workspace ONE Access
- Recognize the Workspace ONE Access console features
- Explain identity management in Workspace ONE Access
- Explain access management in Workspace ONE Access
- Describe the Workspace ONE Access directory integration
- Describe the Workspace ONE Access directory integration
- Deploy virtual applications with Workspace services
5. VMware Horizon Performance and Scalability
- Describe the purpose of a replica connection server
- Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
- Describe the 3D rendering options available in Horizon 8
- List the steps to configure graphics cards for use in a Horizon environment
- Configure a load balancer for use in a Horizon environment
- Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
- Explain Horizon Cloud Pod Architecture scalability options
6. Managing VMware Horizon Security
- Explain concepts relevant to secure Horizon connections
- Describe how to restrict Horizon connections.
- Discuss the benefits of using Unified Access Gateway
- List the two-factor authentication options that are supported by Unified Access Gateway
- List Unified Access Gateway firewall rules
- Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces