VMware vSphere: Operate, Scale, and Secure [V8]

Course Overview

Advanced skills for establishing and managing a highly available and scalable virtual infrastructure are taught during this five-day course. You configure and optimise the VMware vSphere 8 capabilities that lay the groundwork for a truly scalable infrastructure through a mix of lectures and hands-on experiments. You also go over the situations and areas where these characteristics have the biggest impact. Attend this session to gain a deeper understanding of vSphere and see how its sophisticated controls and capabilities may help your business.

 

Prerequisites

The following is necessary for this course:

  • Participate in the VMware vSphere: Install, Configure, Manage [V8] course.
  • Equivalent ESXi and vCenter administrative skills and expertise.
  • Working knowledge of the command line is strongly advised.

Audience Profile

Experienced system administrators, system integrators, and system engineers

 

Course Objectives

You should be able to complete the following goals by the end of the course:

  • Create and maintain a repository for VMware tools.
  • Set up vSphere Replication and restore duplicated virtual machines.
  • Use resource pools to control VM resource utilisation.
  • Set up and manage the networking and storage for a large, complex company using vSphere.
  • Configure High Availability for VMware vCenter Server®.
  • To manage VMware ESXiTM 8 host compliance, use host profiles.
  • To handle certificates, use the command line and the vSphere Client.
  • Use the vSphere client to track the performance of vCenter, ESXi, and VMs.
  • Protect your vSphere environment's VMware vCenter® 8, ESXi, and virtual machines.
  • To set up the vCenter to leverage external identity sources, use Identity Federation.
  • To secure the infrastructure for encrypted VMs, use VMware vSphere® Trust AuthorityTM.

Content Outline

  • Course logistics and introductions 
  • Course goals
  • Be aware of a VMware ToolsTM Repository's function.
  • Set up a repository for VMware tools.
  • Identify the VM backup and restore solution.
  • Recognize the elements that make up the VMware vSphere® ReplicationTM architecture.
  • Install and set up instances of VMware Site RecoveryTM and vSphere Replication.
  • Restore duplicated VMs.
  • In a cluster, create and control resource pools.
  • Describe the operation of scalable shares.
  • Describe the vCLS's purpose.
  • Identify actions that could prevent vCLS VMs from operating normally.
  • Manage and configure distributed switches in vSphere.
  • Describe the performance improvements made by VMware vSphere® Network I/O Control.
  • Describe distributed switch features like NetFlow and port mirroring.
  • Describe the distributed services engine for vSphere.
  • Describe the advantages of VMware vSphere® Distributed Services EngineTM and use cases for it.
  • Talk about iSER and NVMe support in vSphere.
  • Describe the vSAN configuration's architecture and requirements.
  • Describe policy-based storage management.
  • Identify the elements that make up the VMware vSphere® Virtual VolumesTM architecture.
  • Control Configuration Storage I/O.
  • Create a vCenter backup schedule
  • Recognize the importance of vCenter's High Availability
  • Describe the operation of vCenter Server High Availability.
  • To manage ESXi configuration compliance, use host profiles.
  • Be aware of the advantages of utilising configuration profiles.
  • To handle certificates, use the command line and the vSphere client.
  • Keep track of the critical elements that influence a virtual machine's performance.
  • Specify the variables affecting vCenter performance.
  • Use the vCenter tools to keep an eye on resource usage.
  • Design unique alerts in vCenter.
  • Describe VMware Skyline'sTM features and advantages.
  • Identify VMware Skyline AdvisorTM Pro's applications.
  • Be familiar with methods for protecting vSphere elements such vCenter, ESXi hosts, and virtual machines.
  • Describe the security procedures and standards that vSphere supports.
  • Identify use cases for identity federation and describe it.
  • Set up identity federation so that vCenter can utilise a third-party identity provider.
  • Set up the host access and authentication for ESXi.
  • Describe the security characteristics of virtual machines.
  • Specify the elements that make up a VM encryption architecture.
  • Build, control, and move encrypted virtual machines.
  • List alarms and events related to VM encryption.
  • Describe the vSphere Trust Authority's advantages and use cases.

FAQs

A: Generally, VMware provides three different types of server software

  • VMware ESX Server
  • VMware ESXi Server
  • VMware Server

A: Different components which are used in VMware are listed below:-

  • It generally consists of the lowest layer, which acts as an ESX server host.
  • It also uses the virtual center server, which keeps track of all the VM-associated images and manages them from one point.
  • VMware infrastructure client enables the client to communicate with the user's applications running on VMware.
  • Web-browser is are generally used to access virtual machines.
  • The license server is used to prepare a server that licenses the applications.
  • Database servers are availed to maintain a database.

A: VMware High Availability has a mechanism to find a host isolated from the rest of the hosts in the cluster. In other words, it generally uses a heartbeat to communicate with another host in the group. When the host loses its ability to connect with others in a cluster through heartbeat, the host will be considered a Host Isolation.

 

A: The communication between two ESXi hosts is known as Fault logging when FT is configured between them.

 

A:In-house certified trainers and consultants with strong educational credentials and practical experience in the technology make up a sizable portion of Radiant Techlearning's staff.More than 800 courses are available through Radiant Techlearning, and the greatest instructors in the industry have been selected to teach each course.

The Technology Trainers & Consultants that provide training programmes are chosen by Radiant based on very stringent criteria. Before joining the organisation, our trainers and consultants go through a demanding technical and behavioural interview and assessment process.

Our technology trainers, consultants, and experts have a thorough understanding of the technical field and are approved by the OEM. You can feel free to ask any questions you have at any moment of your respective faculty, and our faculty will easily explain each course's abilities to you starting at the fundamental level.

Our trainers have the patience and ability to explain complex concepts simplistically with depth and width of knowledge.

 

A: Radiant will provide the most updated, highly valued, and relevant real-time projects and case studies in each training program.

We included projects in each training program from the fundamental to the advanced level so that you don't have to face any difficulties in the future. You will work on fascinating projects that will upgrade your skill, knowledge, and industry experience.

 

A: Yes, you can easily choose an EMI option through your credit card or Debit card.

 

A: Radiant team of experts would be available via the email Support@radianttechlearning.com to answer your technical queries, even after the training program.

We also conduct a 3 – 4 hour online session after two weeks of the training program to respond to your queries & project assigned to you.

 

Send a Message.


  • Enroll