> Formations > VMware vSphere: Operate Scale and Secure V8 (VSOSS8)
Course : VMware vSphere: Operate Scale and Secure V8 (VSOSS8)Official course, exam preparation 2V0-21.23
Practical course - 5d
- 35h00 - Ref. EMW
|
![]() | Configuring and managing VMware Tools Repository |
![]() | Configure vSphere Replication and recover replicated virtual machines |
![]() | Manage VM resource usage with resource pools |
![]() | Configure and manage vSphere networking and storage for a large enterprise |
![]() | Configuring vCenter High Availability |
![]() | Use host profiles to manage VMware ESXi 8 host compliance |
![]() | Use vSphere Client and the command line to manage certificates |
![]() | Monitor vCenter, ESXi and virtual machine performance in the vSphere Client |
![]() | Securing vCenter, ESXi and virtual machines in your vSphere environment |
![]() | Use VMware vSphere Trust Authority to secure encrypted virtual machine infrastructure |
![]() | Use identity federation to configure vCenter to use external identity sources |
Intended audience
Experienced system administrators, system engineers and system integrators.
Prerequisites
Completion of Ref. AMW training. Equivalent administration knowledge and experience with ESXi and vCenter. Command-line experience strongly recommended.
Certification
Successful completion of the 2V0-21.23 exam leads to VMware Certified Professional - Data Center Virtualization 2023 (VCP-DCV 2023) certification.
Comment passer votre examen ?
Comment passer votre examen ?
Practical details
Teaching methods
Training in French. Official course material in digital format and in English. Good understanding of written English.
Course schedule
1 VM operations
- Understand the role of VMware Tools Repository.
- Configure VMware Tools Repository.
- Discover the VM backup and restore solution.
- Identify the components of the vSphere Replication architecture.
- Deploy and configure vSphere Replication and VMware Site Recovery instances.
- Recover replicated VMs.
2 vSphere cluster operations
- Create and manage resource pools in a cluster.
- Describe how evolutionary sharing works.
- Describe the function of vCLS (vSphere Cluster Services).
- Identify operations that could disrupt the operation of vCLS virtual machines.
3 Network operations
- Configure and manage vSphere distributed switches.
- Describe how VMware vSphere Network I/O Control improves performance.
- Explain the features of distributed switches, such as port mirroring and NetFlow.
- Define vSphere Distributed Services Engine.
- Describe the use cases and benefits of vSphere Distributed Services Engine.
4 Storage operations
- vSphere support for NVMe and Iser technologies.
- Describe vSAN architecture and configuration requirements.
- Describe rule-based storage management.
- Identify the components of the vSphere Virtual Volumes architecture.
- Configure Storage I/O Control.
5 vCenter and ESXi operations
- Create a vCenter backup schedule.
- Understand the importance of vCenter High Availability.
- Explain how vCenter High Availability works.
- Use host profiles to manage ESXi configuration compliance.
- Use vSphere Client and the command line to manage certificates.
6 vSphere monitoring
- Monitor key factors that can affect VM performance.
- Describe the factors that influence vCenter performance.
- Use vCenter tools to monitor resource usage.
- Create custom alarms in vCenter.
- Describe the benefits and features of VMware Skyline.
- Find out how to use Skyline Advisor Pro.
7 vSphere security and access control
- Know how to secure vSphere components such as vCenter, ESXi hosts and VMs.
- Describe vSphere's support for security standards and protocols.
- Describe identity federation and its use cases.
- Configure identity federation to enable vCenter to use an external identity provider.
8 vSphere Trusted Environments and VM encryption
- Configure ESXi Host Access and Authentication.
- Describe VM security features.
- Describe the components of a VM encryption architecture.
- Create, manage and migrate encrypted VMs.
- List events and alarms related to VM encryption.
- Describe the benefits and use cases of vSphere Trust Authority.
- Configure vSphere Trust Authority.
Publication date : 06/27/2024
PARTICIPANTS
Experienced system administrators, system engineers and system integrators.
PREREQUISITES
Completion of Ref. AMW training. Equivalent administration knowledge and experience with ESXi and vCenter. Command-line experience strongly recommended.
TRAINER QUALIFICATIONS
The experts who lead the training courses are specialists in the subjects covered. They are approved by the publisher and certified for the course. They have also been validated by our teaching teams in terms of both professional knowledge and teaching skills for each course they teach. They have at least three to ten years of experience in their field and hold or have held positions of responsibility in companies.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training course.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you have specific accessibility requirements? Contact Ms FOSSE, disability advisor, at the following address: psh-accueil@orsys.fr so that we can assess your request and its feasibility.
Experienced system administrators, system engineers and system integrators.
PREREQUISITES
Completion of Ref. AMW training. Equivalent administration knowledge and experience with ESXi and vCenter. Command-line experience strongly recommended.
TRAINER QUALIFICATIONS
The experts who lead the training courses are specialists in the subjects covered. They are approved by the publisher and certified for the course. They have also been validated by our teaching teams in terms of both professional knowledge and teaching skills for each course they teach. They have at least three to ten years of experience in their field and hold or have held positions of responsibility in companies.
ASSESSMENT TERMS
Assessment of targeted skills prior to training.
Assessment by the participant, at the end of the training course, of the skills acquired during the training course.
Validation by the trainer of the participant's learning outcomes, specifying the tools used: multiple-choice questions, role-playing exercises, etc.
At the end of each training course, ITTCERT provides participants with a course evaluation questionnaire, which is then analysed by our teaching teams. Participants also complete an official evaluation of the publisher.
An attendance sheet for each half-day of attendance is provided at the end of the training course, along with a certificate of completion if the participant has attended the entire session.
Assessment of targeted skills prior to training.
Assessment by the participant, at the end of the training course, of the skills acquired during the training course.
Validation by the trainer of the participant's learning outcomes, specifying the tools used: multiple-choice questions, role-playing exercises, etc.
At the end of each training course, ITTCERT provides participants with a course evaluation questionnaire, which is then analysed by our teaching teams. Participants also complete an official evaluation of the publisher.
An attendance sheet for each half-day of attendance is provided at the end of the training course, along with a certificate of completion if the participant has attended the entire session.
TEACHING AIDS AND TECHNICAL RESOURCES
The teaching resources used are the publisher's official materials and practical exercises.
The teaching resources used are the publisher's official materials and practical exercises.
TERMS AND DEADLINES
Registration must be completed 24 hours before the start of the training course.
ACCESSIBILITY FOR PEOPLE WITH DISABILITIES
Do you have specific accessibility requirements? Contact Ms FOSSE, disability advisor, at the following address: psh-accueil@orsys.fr so that we can assess your request and its feasibility.
Dates and locations
Last places available
Guaranteed date, in person or remotely
Guaranteed session
Download in PDF format
Share this course by email
