Processing your application. Please be patient while we make sure we receive every piece of it.
Windows Server 2008
10215A: Implementing and Managing Microsoft Server Virtualization
5 Days
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
This five-day course will provide you with the knowledge and skills to deploy and manage a server virtualization environment using Microsoft technologies. The course provides details on how to deploy and manage Hyper-V and Remote Desktop Services on Windows Server 2008 R2. The course also provides details on how to manage a server virtualization environment by using System Center products such as System Center Virtual Machine Manager (VMM) 2008, SCVMM 2008 R2, System Center Operations Manager 2007 R2, System Center Data Protection Manager 2007 R2, and System Center Configuration Manager 2007 R2. This course does not require previous server virtualization experience, but does require that students have significant experience in managing Windows Server 2008 or Windows Server 2008 R2.
Price: $2,895
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
10215A

Module 1: Evaluating and Planning for Virtualization
Describe virtualization as it relates to server, desktop,and application environments. Students also will learn how to plan for criticaldecision points related to hardware requirements, storage, availability, andsecurity.
Lessons
· Overview of Microsoft Virtualization
· Overview of Microsoft Virtualization
· Evaluating the Current Environment for Virtualization
· Evaluating the Current Environment forVirtualization
Lab : Evaluating the Network Environment for Virtualization
· Planning for the Hyper-V Server Role
· Assessing the Computing Environment byUsing the MAP Toolkit
After completing this module, students willbe able to:



· Describe the challenges thattraditional network environments face, which organizations can address by usingvirtualization technologies.
· Describe virtualization technology.
· Identify options available for servervirtualization.
· Identify options available for desktopand presentation virtualization.
· Identify options available forapplication virtualization.
· Determine the most appropriatevirtualization solution based upon organizational requirements.
· Describe management tasks for a virtualenvironment.
· Describe the components that make upthe Microsoft System Center solution.
· Describe how you can use System CenterVirtual Machine Manager to manage virtual environments.
· Describe how you can use SystemCenter Data Protection Manager to backup and recover a virtualenvironment.
· Describe how you can use System CenterOperations Manager to monitor and respond to performance issues that relate tothe virtual environment.
· Describe how you can use System CenterOperations Manager to manage and maintain both physical and virtual systems.
· Describe management tasks for a virtualenvironment.
· Describe the components that make upthe Microsoft System Center solution.
· Describe how you can use System Center VirtualMachine Manager to manage virtual environments.
· Describe how you can use SystemCenter Data Protection Manager to backup and recover a virtualenvironment.
· Describe how you can use System CenterOperations Manager to monitor and respond to performance issues that relate tothe virtual environment.
· Describe how you can use System CenterOperations Manager to manage and maintain both physical and virtual systems.
· Describe the Hyper-V Server Role.
· Describe requirements and limits forthe Hyper-V Server Role.
· Describe planning considerations forHyper-V disks and storage.
· Describe options for storageconfiguration in Hyper-V.
· Describe options for providing highavailability for Hyper-V.
Module 2: Installing and Configuring the Hyper-V Server Role
After completing this module, you will be able to installthe Hyper-V server role, and configure host and virtual network settings.
Lessons
· Installing the Hyper-V Server Role
· Configuring Hyper-V Settings andVirtual Networks
Lab : Installing and Configuring the Hyper-V Server Role
· Installing the Hyper-V Role
· Determining Virtual NetworkConfiguration Settings Based On Organizational Requirements
· Configuring Virtual Network Settings Using Virtual Network ManagerIn this exercise, you will:Configure virtual networks based on the design in Exercise 2
· Installing Remote Management Tools
After completing this module, students willbe able to:
· Describe the prerequisites forinstalling Hyper-V.
· Describe the process for installing Hyper-Von a Windows Server 2008 R2 host.
· Identify the management tools that youcan use to manage the Hyper-V server role.
· Install and configure Hyper-Vmanagement for remote administration.
· Installing the Hyper-V Server Role on aServer Core Installation of Windows Server 2008 R2.
· Modify the default folders for virtualmachines and virtual hard disks.
· Configure Hyper-V user settings.
· Determine when to use external,internal, or private virtual machine networks.
· Use Virtual Network Manager to configurevirtual networks.
· Configure Hyper-V to support VLANs.
Module 3: Creating and Configuring Virtual Hard Disks andVirtual Machines
After completing this module, you will be able to determineand configure the most appropriate virtual hard disk(s) to use in a virtualmachine. Students also will be able to create and configure virtual machines.
Lessons
· Creating and Configuring Virtual HardDisks
· Creating and Configuring Virtual Machines
· Managing Virtual Machine Snapshots
· Working with the Virtual MachineConnection Application
Lab : Creating Virtual Hard Disks and Virtual Machines
· Creating Appropriate Virtual HardDisks, Based On Organizational Requirements
· Creating New Virtual Machines Using theVirtual Machine Wizard
· Modifying Virtual Machine Settings
· Creating and Modifying Virtual MachineSnapshots
After completing this module, students willbe able to:
· Describe storage options for virtualmachines.
· Prepare the host computer to attachphysical disks to a virtual machine.
· Configure storage based on InternetSmall Computer System Interface (iSCSI).
· Describe the types of virtual harddisks.
· Describe the use and benefits ofpass-through disks.
· Create a new virtual hard disk usingthe new Virtual Hard Disk Wizard.
· Edit and inspect virtual hard disks.
· Describe considerations for creatingnew virtual machines.
· Create a new virtual machine using thenew Virtual Machine Wizard.
· Configure virtual machine settings.
· Describe the Hyper-V integrationservices.
· Import and export virtual machines.
· Describe the file formats that you usefor virtual machines.
· Migrate legacy virtual machines toHyper-V.
· Describe what a virtual machinesnapshot is and how you use it. Be sure to include information on the fileformat.
· Describe considerations for usingsnapshots, including storage sizing and requirements.
· Creating and managing virtual machinesnapshots.
· This lesson will begin by describing asnapshot and the scenarios in which you use snapshots in the enterpriseenvironment.
· This lesson also describes the conceptof a virtual machine snapshot. -This lesson focuses on the management aspectsof applying, and deleting, and reverting snapshots. This lesson will alsodiscuss how to configure the snapshot storage. location.
· Describe the Virtual Machine ConnectionTool.
· List the considerations for using thevirtual machine connection tool.
· Discuss connecting to remote virtualmachines from a domain and to a virtual machine in a remote domain.
Module 4: Integrating System Center Virtual Machine Managerwith Microsoft Hyper-V Server 2008 R2
After completing this module, students will be able to planfor, and deploy, System Center Virtual Machine Manager with their Hyper-Vsolution.
Lessons
· Planning for Integration of SystemCenter Virtual Machine Manager
· Installing the VMM Server andAdministrator Console
· Managing Hosts and Host Groups
Lab : Planning and Deploying VMM 2008 R2
· Planning for the Implementation of SCVMM2008 R2, Based Upon Organizational Requirements
· Installing and Configuring SCVMM Serverand Administration Console Components
After completing this module, students willbe able to:



· Creating and Managing Host Groups
· Describe the VMM.
· Describe VMM 2008 R2 components.
· Describe system requirements forinstalling VMM 2008 R2 components.
· Plan for the management of hosts andhost groups.
· Plan for the implementation of the VMMdatabase.
· Plan for the implementation of the VMMLibrary.
· Describe considerations for installingthe VMM Server and Administrator console, including domain requirements,account requirements, and other requirements.
· Describe the process for installing theVMM Server.
· Use the VMM Configuration Analyzer toidentify configuration issues.
· Describe the installation and featuresof the VMM administrator console.
· Describe common post-installationtasks.
· Describe the Windows PowerShell – VMMcommand shell.
· Describe reasons for using host groups.
· Create and modify the properties ofhost groups.
· Describe the types of hosts that youcan add to VMM 2008.
· Configure default virtual machinepaths.
· Describe the process for adding hostsin an Active Directory directory service domain.
· Describe the process for adding hostslocated in a perimeter network.
· Describe the management options for ahost.

Module 5: Creating and Deploying Virtual Machines UsingSystem Center Virtual Machine Manager 2008 R2
After completing this module, students will be able to useVMM 2008 R2 to create and deploy virtual machines.
Lessons
· Creating a New Virtual Machine UsingVMM 2008 R2
· Converting a Physical Server to aVirtual Machine
· Converting and Migrating VirtualMachines
Lab : Creating and Deploying Virtual Machines
· Creating a New Virtual Machine
· Deploying a New Virtual Machine fromthe VMM Library
· Converting a VMware-Based VirtualMachine to a Hyper-V Based Virtual Machine
After completing this module, students willbe able to:



· Describe supported operating systemsand hardware capabilities for virtual machines.
· Identify sources that you can use fornew virtual machines.
· Describe placement options whencreating a new virtual machine.
· Describe how you use ratings todetermine appropriate placement.
· Describe how to customize placementratings for a specific virtual machine.
· Deploy stored virtual machines from aVMM Library.
· Describe considerations and methods fordetermining physical-to-virtual (P2V) machine conversion candidates.
· Describe requirements for physicalsource computers.
· Perform a P2V conversion.
· Identify the difference betweenconverting and migrating a virtual machine.
· Describe requirements for performing aV2V conversion.
· Describe the options you have when performinga V2V conversion.
· Describe the considerations and theprocess for migrating a virtual machine.
· Describe scenarios for cloning anexisting virtual machine.
· Describe considerations for cloning avirtual machine.
· Describe the process and decisionpoints for cloning a virtual machine.
Module 6: Managing Virtual Machines Using Virtual MachineManager 2008
This module explains how to perform various managementtasks on virtual machines stored within the VMM infrastructure.
Lessons
· Overview of VMM Management Tasks
· Creating and Managing Checkpoints
Lab : Managing Virtual Machines Using VMM 2008 R2
· Modifying Virtual Machine Properties
· Managing Virtual Machine Checkpoints
After completing this module, students willbe able to:



· Describe common actions for operatingand managing virtual machines.
· Perform actions used to operate avirtual machine.
· Perform actions used to deploy,migrate, and store virtual machines.
· Perform actions used to manageconfigurations, disks, and checkpoints.
· Describe virtual machine propertyoptions.
· Perform actions to configure virtualmachine property options.
· Describe considerations for usingcheckpoints.
· Create and modify a VMM checkpoint.
· Manage VMM checkpoints.
Module 7: Configuring and Managing the VMM Library
This module explains how to configure and manage resourcesin the VMM Library.
Lessons
· Overview of the VMM Library
· Managing Profiles and Templates
· Designing Fault Tolerance for the VMMLibrary
Lab : Configuring and Managing the VMM Library
· Adding a Library Server and LibraryResources
· Creating a Hardware Profile
· Creating a Guest Operating-SystemProfile
· Creating a Virtual Machine Template
· Configuring highly available fileservers for Virtual Machine Library Using DFS
After completing this module, students willbe able to:
· Describe what the VMM Library is andthe types of resources that are stored within the library.
· Add a Library Server and assign librarygroups.
· Add library shares to a library server.
· Add file-based resources to thelibrary.
· Describe hardware profiles and benefitsof their usage.
· Describe guest operating systemprofiles and benefits of their usage.
· Show how to create a hardware and guestoperating-system profile.
· Describe the benefits for creating andusing virtual machine templates.
· Describe the components that make up avirtual machine template.
· Create a virtual machine template.
· Describe options for providing faulttolerance for the VMM Library.
· Compare and evaluate the differencesbetween the options.
· List the considerations for supportinghighly available Library Servers.
Module 8: Configuring User Roles and the Virtual MachineManager Self-Service Portal
This module explains how to configure and manage user rolesand the Virtual Machine Manager Self-Service Portal.
Lessons
· Configuring User Roles
· Installing and Configuring the VMMSelf-Service Portal
Lab : Configuring the VMM Self-Service Portal
· Preparing the Host Group and User RoleRequirements
· Implementing the Self-Service Portal
After completing this module, students willbe able to:
· Describe the concept of role-basedsecurity in VMM 2008 R2.
· Describe the role types that areavailable in VMM 2008 R2.
· Describe the objects that you candelegate by using Role-based security.
· Describe the process for creating auser role in VMM 2008.
· Create user roles in VMM 2008 R2.
· Determine the most appropriaterole-based security configuration based upon organizational requirements.
· Describe considerations forimplementing the VMM Self-Service Portal.
· Describe the overall process forimplementing the Self-Service Portal.
·
SITE MAP