Course Offering
- Fast Lane
- Guaranteed to Run Schedule
- Digital Learning Solutions
- Fast Lane IT Workshops
- Fast Lane LIVE E-Learning
- Fast Lane Academy»
-
Professional Services»
- Home
- Content Development
- Expert 4 Hire
- Selected Technologies
- Artificial Intelligence (AI)
- Cloud
- Optical
- Security
- Wireless & Mobility
- Selected Vendors
- AWS
- Cisco
- Gigamon
- NetApp
- Microsoft
- Red Hat
- SUSE
- VMware
- Hack Academy»
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Cisco Systems»
- Citrix»
- Cydrill Software Security»
- EC-Council»
- Google Cloud»
- Juniper Networks»
-
Microsoft»
- What's New
- Microsoft Training
- Microsoft Certifications
- Microsoft E-Learning
- Upcoming Microsoft Courses
- Microsoft Professional Services
- Cloud Professional Services
- Redeem Microsoft SATVs
- Featured Topics
- AI Business School
- Microsoft Azure
- Microsoft Power Platform
- Microsoft Security, Compliance & Identity
- NetApp»
- Red Hat»
- Splunk»
- SUSE»
- VMware»
- Additional Vendors»
- Featured Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»
- IT & Project Management»
- ITIL»
- PRINCE2»
- Scaled Agile»
- Scrum

Citrix Virtual Apps and Desktops 7 Advanced Administration (CWS-315) - Outline
Detailed Course Outline
Backup, recovery and security considerations and configurations
Module 1: Implementing Redundancy and Scalability
- StoreFront and Citrix Gateway
- Site Infrastructure
- Machines Running the Virtual Delivery Agent
Module 2: Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones
- VDA Registration in a Multi-Zone Environment
- Zone Preference
- Optimal Gateway Routing and Zones
- Managing StoreFront Store Subscriptions in a MultiLocation Environment
- StoreFront and Citrix ADC Branding
Module 3: Implementing Backups and Disaster Recovery
- Backups
- Disaster Recovery Considerations
- Disaster Recovery Process
Module 4: Implementing Advanced Authentication Methods
- Multi-factor Authentication - RADIUS & OTP
- Multi-factor Authentication - Smart Card Authentication
- Federated Authentication - ADFS, SAML, and FAS
Module 5: Improving App and Data Security
- Introduction to Application Security
- Preventing Jailbreak Attacks
- Minimizing the Impact of Attacks
Module 6: Securing Machines Running the Virtual Delivery Agent
- TLS to VDA Encryption
- GPOs and Citrix Policies
- Image Management
Troubleshooting techniques and tools
Module 7: Introduction to Troubleshooting
- Troubleshooting Methodology Process (Standard Slide)
- Resource Tools and Utilities
- Introduction to PowerShell
Module 8: Troubleshooting Access Issues
- Troubleshooting StoreFront
- Troubleshooting Citrix Gateway
Module 9: Troubleshooting Delivery Controller Issues
- Validating FMA Services
Module 10: Troubleshooting VDA Registration Issues
- Troubleshooting VDA Registration
Module 11: Troubleshooting HDX Connection Issues
- Troubleshooting HDX Connections
Citrix App Layering Considerations and Configuration
Module 12: Introduction to App Layering
- App Layering Introduction
- Architecture and How it Works
Module 13: Creating an OS Layer
- The OS Layer
Module 14: Creating a Platform Layer
- The Platform Layer
Module 15: Creating App Layers
- The App Layers
Module 16: Creating Elastic App and User Layers
- Elastic App Layering
- User Layers
Module 17: Deploying a Layered Image using Citrix Virtual Apps and Desktops
- Using Templates in App Layering
- Using Layered Images in a Citrix Virtual Apps and Desktops Site
Module 18: Exploring Layer Priority
- Layer Priority
Module 19: Maintaining an App Layering Environment
- Updating Layers
- Maintaining and Updating the App Layering Environment
- Common App Layering Considerations and Additional Resources
Workspace Environment Management (WEM) considerations and configuration
Module 20: Introduction to Workspace Environment Management (WEM)
- Workspace Environment Management (WEM) Introduction
- WEM Administration
Module 21: Using WEM to Centralize Environment Management
- Managing User Resources with WEM
- Managing Profiles with WEM
- Managing Endpoints with the WEM Transformer Feature
Module 22: Using WEM for Performance Optimization
- Optimizing Machine Performance with WEM
- Optimizing User Experience with WEM
Module 23: Using WEM to Secure Environments
- WEM Security Features
Module 24: Migrating and Upgrading WEM
- Migrating to WEM
- Upgrading a WEM Deployment
- WEM Multi-Location Considerations