Course Introduction
-
Introductions and course logistics
-
Course objectives
Horizon Connection Server
-
Recognize VMware Horizon reference architecture
-
Identify the Horizon Connection Server supported features
-
Identify the recommended system requirements for Horizon Connection Server
-
Configure Horizon event database
-
Outline the steps for the initial configuration of Horizon Connection Server
-
Discuss the ADAM database as a critical component of Horizon Connection Server installation
Authentication and Certificates
-
Compare the authentication options that Horizon Connection Server supports
-
Describe the Smartcard authentication options that Horizon Connection Server supports
-
Outline the steps to create a Horizon administrator and custom roles
-
Describe the roles available in a Horizon environment
-
Explain the role that certificates play for Horizon Connection Server
-
Install and configure certificates for Horizon Connection Server
-
Install and configure True SSO in a Horizon environment
Workspace ONE Access & Virtual Application Management
-
Recognize the features and benefits of Workspace ONE Access
-
Recognize the Workspace ONE Access console features
-
Explain identity management in Workspace ONE Access
-
Explain access management in Workspace ONE Access
-
Describe the Workspace ONE Access directory integration
-
Describe the Workspace ONE Access directory integration
-
Deploy virtual applications with Workspace services
Horizon Protocols
-
Compare the remote display protocols that are available in VMware Horizon
-
Describe the BLAST Display Protocol Codecs
-
Describe BLAST and PCoIP ADMX GPO common configurations
Graphic Cards
-
Describe the 3D rendering options available in Horizon 8
-
Compare vSGA and vDGA
-
List the steps to configure graphics cards for use in a VMware Horizon environment
Horizon Scalability
-
Describe the purpose of a replica connection server
-
Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
-
Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
-
Explain Horizon Cloud Pod Architecture scalability options
Horizon Security
-
Explain concepts relevant to secure Horizon connections
-
Describe how to restrict Horizon connections.
-
Discuss the benefits of using Unified Access Gateway
-
List the two-factor authentication options that are supported by Unified Access Gateway
-
List Unified Access Gateway firewall rules
-
Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces