Hello
Your cart is empty. View / Checkout
United States Pricing
813-421-2951
Other Solutions

M10215 Wokingham

Implementing and Managing Microsoft Server Virtualization

  • Course Availability
Price :
Course Overview :
M10215: Implementing and Managing Microsoft Server Virtualization

Version: A
Length: 5 Days 
Published: August 10, 2010 
Language(s): English 
Audience(s): IT Professionals 
Level: 300 
Technology: Windows Server 2008 
Type: Course 
Delivery Method: Instructor-led (classroom)

Before attending this course, students must:


oPerform server administrator tasks responsible for building and maintaining a virtualization infrastructure. 
oWork or consult for a midsize to enterprise-size organization. 
oHave a basic understanding of server virtualization concepts related to Microsoft or other third-party virtualization technologies. 
oSupport production, development, testing, high availability, business continuity, staging, classroom, or hosting environments based upon Windows Server 2008 technology. 
oUnderstand a Windows-based network, including Active Directory directory service. 
oUnderstand storage technologies, such as Storage Area Network (SAN) including Internet small computer system interface (iSCSI), Fiber Channel, and Direct Attached Storage (DAS). 
oUnderstand Windows Server 2008 failover clustering.

Course Outline
Module 1: Evaluating and Planning for Virtualization
Describe virtualization as it relates to server, desktop, and application environments. Students also will learn how to plan for critical decision points related to hardware requirements, storage, availability, and security.
Lessons 
oOverview of Microsoft Virtualization
oOverview of Microsoft Virtualization
oEvaluating the Current Environment for Virtualization
oEvaluating the Current Environment for Virtualization
Lab : Evaluating the Network Environment for Virtualization
oPlanning for the Hyper-V Server Role
oAssessing the Computing Environment by Using the MAP Toolkit
After completing this module, students will be able to:


oDescribe the challenges that traditional network environments face, which organizations can address by using virtualization technologies.
oDescribe virtualization technology.
oIdentify options available for server virtualization.
oIdentify options available for desktop and presentation virtualization.
oIdentify options available for application virtualization.
oDetermine the most appropriate virtualization solution based upon organizational requirements.
oDescribe management tasks for a virtual environment.
oDescribe the components that make up the Microsoft System Center solution.
oDescribe how you can use System Center Virtual Machine Manager  to manage virtual environments.
oDescribe how you can use  System Center Data Protection Manager  to backup and recover a virtual environment.
oDescribe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
oDescribe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
oDescribe management tasks for a virtual environment.
oDescribe the components that make up the Microsoft System Center solution.
oDescribe how you can use System Center Virtual Machine Manager  to manage virtual environments.
oDescribe how you can use  System Center Data Protection Manager  to backup and recover a virtual environment.
oDescribe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
oDescribe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
oDescribe the Hyper-V Server Role.
oDescribe requirements and limits for the Hyper-V Server Role.
oDescribe planning considerations for Hyper-V disks and storage. 
oDescribe options for storage configuration in Hyper-V.
oDescribe options for providing high availability for Hyper-V.
Module 2: Installing and Configuring the Hyper-V Server Role
After completing this module, you will be able to install the Hyper-V server role, and configure host and virtual network settings.
Lessons 
oInstalling the Hyper-V Server Role
oConfiguring Hyper-V Settings and Virtual Networks
Lab : Installing and Configuring the Hyper-V Server Role
oInstalling the Hyper-V Role
oDetermining Virtual Network Configuration Settings Based On Organizational Requirements
oConfiguring Virtual Network  Settings Using Virtual Network ManagerIn this exercise, you will: Configure virtual networks based on the design in Exercise 2
oInstalling Remote Management Tools
After completing this module, students will be able to:
oDescribe the prerequisites for installing Hyper-V.
oDescribe the process for installing Hyper-V on a Windows Server 2008 R2 host.
oIdentify the management tools that you can use to manage the Hyper-V server role.
oInstall and configure Hyper-V management for remote administration.
oInstalling the Hyper-V Server Role on a Server Core Installation of Windows Server 2008 R2.
oModify the default folders for virtual machines and virtual hard disks.
oConfigure Hyper-V user settings.
oDetermine when to use external, internal, or private virtual machine networks.
oUse Virtual Network Manager to configure virtual networks.
oConfigure Hyper-V to support VLANs.
Module 3: Creating and Configuring Virtual Hard Disks and Virtual Machines
After completing this module, you will be able to determine and configure the most appropriate virtual hard disk(s) to use in a virtual machine. Students also will be able to create and configure virtual machines.
Lessons 
oCreating and Configuring Virtual Hard Disks
oCreating and Configuring Virtual Machines
oManaging Virtual Machine Snapshots
oWorking with the Virtual Machine Connection Application
Lab : Creating Virtual Hard Disks and Virtual Machines
oCreating Appropriate Virtual Hard Disks, Based On Organizational Requirements
oCreating New Virtual Machines Using the Virtual Machine Wizard
oModifying Virtual Machine Settings
oCreating and Modifying Virtual Machine Snapshots
After completing this module, students will be able to:
oDescribe storage options for virtual machines.
oPrepare the host computer to attach physical disks to a virtual machine.
oConfigure storage based on Internet Small Computer System Interface (iSCSI).
oDescribe the types of virtual hard disks.
oDescribe the use and benefits of pass-through disks.
oCreate a new virtual hard disk using the new Virtual Hard Disk Wizard.
oEdit and inspect virtual hard disks.
oDescribe considerations for creating new virtual machines.
oCreate a new virtual machine using the new Virtual Machine Wizard.
oConfigure virtual machine settings.
oDescribe the Hyper-V integration services.
oImport and export virtual machines.
oDescribe the file formats that you use for virtual machines.
oMigrate legacy virtual machines to Hyper-V.
oDescribe what a virtual machine snapshot is and how you use it. Be sure to include information on the file format.
oDescribe considerations for using snapshots, including storage sizing and requirements.
oCreating and managing virtual machine snapshots.
oThis lesson will begin by describing a snapshot and the scenarios in which you use snapshots in the enterprise environment.
oThis lesson also describes the concept of a virtual machine snapshot. -This lesson focuses on the management aspects of applying, and deleting, and reverting snapshots. This lesson will also discuss how to configure the snapshot storage. location.
oDescribe the Virtual Machine Connection Tool.
oList the considerations for using the virtual machine connection tool.
oDiscuss connecting to remote virtual machines from a domain and to a virtual machine in a remote domain.
Module 4: Integrating System Center Virtual Machine Manager with Microsoft Hyper-V Server 2008 R2
After completing this module, students will be able to plan for, and deploy, System Center Virtual Machine Manager with their Hyper-V solution.
Lessons 
oPlanning for Integration of System Center Virtual Machine Manager
oInstalling the VMM Server and Administrator Console
oManaging Hosts and Host Groups
Lab : Planning and Deploying VMM 2008 R2
oPlanning for the Implementation of SCVMM 2008 R2, Based Upon Organizational Requirements
oInstalling and Configuring SCVMM Server and Administration Console Components
After completing this module, students will be able to:


oCreating and Managing Host Groups
oDescribe the VMM.
oDescribe VMM 2008 R2 components.
oDescribe system requirements for installing VMM 2008 R2 components.
oPlan for the management of hosts and host groups.
oPlan for the implementation of the VMM database.
oPlan for the implementation of the VMM Library.
oDescribe considerations for installing the VMM Server and Administrator console, including domain requirements, account requirements, and other requirements.
oDescribe the process for installing the VMM Server.
oUse the VMM Configuration Analyzer to identify configuration issues.
oDescribe the installation and features of the VMM administrator console.
oDescribe common post-installation tasks.
oDescribe the Windows PowerShell - VMM command shell.
oDescribe reasons for using host groups.
oCreate and modify the properties of host groups.
oDescribe the types of hosts that you can add to VMM 2008.
oConfigure default virtual machine paths.
oDescribe the process for adding hosts in an Active Directory directory service domain.
oDescribe the process for adding hosts located in a perimeter network.
oDescribe the management options for a host.


Module 5: Creating and Deploying Virtual Machines Using System Center Virtual Machine Manager 2008 R2
After completing this module, students will be able to use VMM 2008 R2 to create and deploy virtual machines.
Lessons 
oCreating a New Virtual Machine Using VMM 2008 R2
oConverting a Physical Server to a Virtual Machine
oConverting and Migrating Virtual Machines
Lab : Creating and Deploying Virtual Machines
oCreating a New Virtual Machine
oDeploying a New Virtual Machine from the VMM Library
oConverting a VMware-Based Virtual Machine to a Hyper-V Based Virtual Machine
After completing this module, students will be able to:


oDescribe supported operating systems and hardware capabilities for virtual machines.
oIdentify sources that you can use for new virtual machines.
oDescribe placement options when creating a new virtual machine. 
oDescribe how you use ratings to determine appropriate placement.
oDescribe how to customize placement ratings for a specific virtual machine.
oDeploy stored virtual machines from a VMM Library.
oDescribe considerations and methods for determining physical-to-virtual (P2V) machine conversion candidates.
oDescribe requirements for physical source computers.
oPerform a P2V conversion.
oIdentify the difference between converting and migrating a virtual machine.
oDescribe requirements for performing a V2V conversion.
oDescribe the options you have when performing a V2V conversion.
oDescribe the considerations and the process for migrating a virtual machine.
oDescribe scenarios for cloning an existing virtual machine.
oDescribe considerations for cloning a virtual machine.
oDescribe the process and decision points for cloning a virtual machine.
Module 6: Managing Virtual Machines Using Virtual Machine Manager 2008
This module explains how to perform various management tasks on virtual machines stored within the VMM infrastructure.
Lessons 
oOverview of VMM Management Tasks
oCreating and Managing Checkpoints
Lab : Managing Virtual Machines Using VMM 2008 R2
oModifying Virtual Machine Properties
oManaging Virtual Machine Checkpoints
After completing this module, students will be able to:


oDescribe common actions for operating and managing virtual machines.
oPerform actions used to operate a virtual machine.
oPerform actions used to deploy, migrate, and store virtual machines.
oPerform actions used to manage configurations, disks, and checkpoints.
oDescribe virtual machine property options.
oPerform actions to configure virtual machine property options.
oDescribe considerations for using checkpoints.
oCreate and modify a VMM checkpoint.
oManage VMM checkpoints.
Module 7: Configuring and Managing the VMM Library
This module explains how to configure and manage resources in the VMM Library.
Lessons 
oOverview of the VMM Library
oManaging Profiles and Templates
oDesigning Fault Tolerance for the VMM Library
Lab : Configuring and Managing the VMM Library
oAdding a Library Server and Library Resources
oCreating a Hardware Profile
oCreating a Guest Operating-System Profile
oCreating a Virtual Machine Template
oConfiguring highly available file servers for Virtual Machine Library Using DFS
After completing this module, students will be able to:
oDescribe what the VMM Library is and the types of resources that are stored within the library.
oAdd a Library Server and assign library groups.
oAdd library shares to a library server.
oAdd file-based resources to the library.
oDescribe hardware profiles and benefits of their usage.
oDescribe guest operating system profiles and benefits of their usage. 
oShow how to create a hardware and guest operating-system profile.
oDescribe the benefits for creating and using virtual machine templates.
oDescribe the components that make up a virtual machine template.
oCreate a virtual machine template.
oDescribe options for providing fault tolerance for the VMM Library.
oCompare and evaluate the differences between the options. 
oList the considerations for supporting highly available Library Servers.
Module 8: Configuring User Roles and the Virtual Machine Manager Self-Service Portal
This module explains how to configure and manage user roles and the Virtual Machine Manager Self-Service Portal.
Lessons 
oConfiguring User Roles
oInstalling and Configuring the VMM Self-Service Portal
Lab : Configuring the VMM Self-Service Portal
oPreparing the Host Group and User Role Requirements
oImplementing the Self-Service Portal
After completing this module, students will be able to:
oDescribe the concept of role-based security in VMM 2008 R2.
oDescribe the role types that are available in VMM 2008 R2.
oDescribe the objects that you can delegate by using Role-based security.
oDescribe the process for creating a user role in VMM 2008.
oCreate user roles in VMM 2008 R2.
oDetermine the most appropriate role-based security configuration based upon organizational requirements.
oDescribe considerations for implementing the VMM Self-Service Portal.
oDescribe the overall process for implementing the Self-Service Portal.
oDescribe system requirements for the VMM Self-Service Portal.
oInstall the SCVMM Self-Service Portal.
oConfigure user access to the SCVMM Self-Service Portal.
oDescribe security best practices for the SCVMM Self-Service Portal.
Module 9: Implementing High Availability for Server Virtualization
This module explains how to configure high availability for server virtualization.
Lessons 
oOverview of Failover Clustering
oImplementing Failover Clustering with Hyper-V
oImplementing High Availability with VMM 2008 R2
Lab : Implementing High Availability for Server Virtualization
oInstalling and Configuring the Failover Clustering Feature
oConfiguring Live Migration
oIntegrating Failover Clustering with VMM 2008 R2
After completing this module, students will be able to:
oDescribe options for providing high availability for virtualization.
oDescribe what a Failover Cluster is and how it provides high availability for virtual machines.
oDescribe new Failover Cluster functionality available in Windows Server 2008 R2.
oDescribe considerations for a Failover Cluster design.
oDetermine appropriate Quorum configurations for Failover Clusters.
oDescribe how Failover Clusters work with Hyper-V.
oDescribe best practices for implementing Failover clustering with Hyper-V.
oDescribe requirements for using Hyper-V with failover clustering.
oDescribe the overall process for implementing Hyper-V and failover clustering.
oImplement failover clustering with Hyper-V.
oDescribe Live Migration.
oDescribe the overall process for implementing Live Migration.
oPerform Live Migration using Hyper-V.
oDescribe planning considerations for implementing high availability with SCVMM 2008 R2.
oDescribe the overall process for configuring host clusters to support high availability.
oDescribe how to manage host clusters.
oImplement clustering using VMM 2008.
Module 10: Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool
This module explains how to maintain software updates using the Offline Virtual Machine Servicing Tool.
Lessons 
oOverview of the Offline Virtual Machine Servicing Tool
oConfiguring WSUS and the Offline Virtual Machine Servicing Tool
Lab : Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool
oConfiguring Infrastructure Prerequisites to Support the Offline Virtual Machine Servicing Tool
oInstalling and Configuring the Offline Virtual Machine Servicing Tool
After completing this module, students will be able to:
oDescribe methods for maintaining software updates.
oDescribe how the Offline Virtual Machine Servicing Tool works.
oDescribe infrastructure requirements for the Offline Virtual Machine Servicing Tool.
oDescribe tasks required to prepare the virtual machines for offline software-update management.
oDescribe the process for configuration WSUS to support virtual machine servicing.
oConfigure WSUS to support virtual machine servicing.
oDescribe the process for installing and configuring the Offline Virtual Machine Servicing Tool.
oInstall and configure the Offline Virtual Machine Servicing Tool.
Module 11: Monitoring and Reporting Virtualization
This module explains how to use the monitoring tools included with VMM 2008 and integrate System Center Operations Manager to provide extended monitoring, reporting, and troubleshooting capabilities.
Lessons 
oMonitoring Jobs in VMM 2008 R2
oIntegrating System Center Operations Manager with VMM 2008 R2
oConfiguring Performance and Resource Optimization
Lab : Integrating System Center Operations Manager with VMM 2008
oConfiguring System Center Operations Manager for VMM 2008 Integration
oConfiguring PRO
After completing this module, students will be able to:
oDescribe the VMM jobs feature.
oDescribe the methods used to view job status.
oCancel and restart jobs.
oFilter job status.
oTrack changes using Jobs view.
oPerform management tasks related to job status in VMM.
oIdentify reporting needs for specific virtual environment scenarios.
oDescribe features provided by integrating System Center Operations Manger.
oDescribe prerequisites for integrating Operations Manager.
oDescribe the process for integrating Operations Manager with VMM 2008 R2.
oEnable reporting in VMM 2008 R2.
oDescribe Performance and Resource Optimization (PRO).
oPlan for the implementation of PRO.
oEnable PRO integration.
oView and implement PRO Tips.


Module 12: Backup and Restore Strategies for Virtual Machines
This module explains how to configure and manage resources in the VMM Library.
Lessons 
oOverview of Backup and Restore Options for Virtual Machines and the VMM Database
oImplementing Data Protection Manager for Backing Up the VMM Infrastructure
Lab : Using Data Protection Manager to Back Up the VMM 2008 Infrastructure
After completing this module, students will be able to:
oDescribe options for backing up virtual machines.
oUse the SCVMM Administrator console to back up the VMM database. 
oDescribe the process and tools used to restore the VMM database.
oDescribe the features of Data Protection Manager 2007 SP1.
oDescribe the prerequisites for installing and implementing Data Protection Manager 2007 SP1.
oDescribe the process for installing and configuring Data Protection Manager 2007 SP1.
oDescribe the process for configuring backup processes for SCVMM 2008 and Data Protection Manager 2007 SP1.
Module 13: Desktop Virtualization Using Remote Desktop Services
This module explains how to describe and implement the core role services included in the Remote Desktop Services server Role.
Lessons 
oOverview of Remote Desktop Services
oImplementing the Remote Desktop Session Host
oImplementing Remote Desktop Connection Broker
oImplementing the Remote Desktop Connection Virtualization Host
Lab : Implementing Remote Desktop Services
oInstalling the Remote Desktop Session Host
oInstalling and configuring the Remote Desktop Session Host
oInstalling the Remote Desktop Connection Broker
oConfiguring the Remote Desktop Connection Broker
oInstalling and Configuring the Remote Desktop Virtualization Host  
oDeploying an Application Using RemoteApp
After completing this module, students will be able to:
oDescribe the benefits of Remote Desktop Services.
oDescribe the Role Services included with the Remote Desktop Services sever role. 
oDescribe updates to the client experience with Remote Desktop Services.
oDescribe RD Licensing.
oDescribe the prerequisites for installing and implementing the RD Session Host.
oDescribe common configuration and management tasks for the RD Session Host.
oDescribe how to secure an RD Session Host.
oWhat is the RDS Broker Role?
oDescribe the prerequisites for installing and implementing the RDS Connection Broker.
oDescribe common configuration and management tasks for the RDS Connection Broker.
oDeploying RemoteApp to a Windows 7 Client Start menu.
oDescribe the virtual desktop infrastructure concept and how the Remote Desktop Virtualization host works.
oDescribe the prerequisites for installing and implementing the RD Virtualization Host.


Module 14: Extending Remote Desktop Services Outside the Organization
This module explains how to implement and configure the Remote Desktop Gateway and Remote Desktop Web Access.
Lessons 
oConfiguring the Remote Desktop Gateway
oConfiguring Remote Desktop Web Access
Lab : Integrating Remote Desktop Web Access into the Desktop Virtualization Infrastructure
oInstalling Remote Desktop Gateway
oInstalling Remote Desktop Web Access
oConfiguring Remote Desktop Web Access
oIntegrating RemoteApp and Desktop Connection with Remote Desktop Web Access
After completing this module, students will be able to:


oDescribe how the Remote Desktop Gateway works.
oDescribe how to secure the Remote Desktop Gateway.
oUse Authorization Policies with Remote Desktop gateway.
oDescribe how to configure the Remote Desktop Gateway.
oDescribe how to use network access protocol (NAP) remediation with Remote Desktop Gateway.
oUse certificates for Remote Desktop Gateway.
oDescribe the prerequisites for installing and implementing Remote Desktop Web Access.
oDescribe how to implement RemoteApp and Desktop connection with RD Web Access.
oDescribe how to secure Remote Desktop Web Access.
oConfigure Single Sign-on for Remote Desktop Web Access.
oIntegrate RemoteApp and Remote Desktop Web Access.
PLEASE NOTE: Every effort has been made to ensure the accuracy of all information contained herein. IT Help and Support Centre Ltd makes no warranty expressed or implied with respect to accuracy of this information, including price, product editorials or product specifications. IT Help and Support Centre Ltd or its suppliers shall not be liable for incidental, consequential or special damages arising from, or as a result of, any electronic transmission or the accuracy of the information contained herin, even if IT Help and Support Centre Ltd has been advised of the possibility of such damages. Product and manufacturer names are used only for the purpose of identification.

This Website is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc. CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, Cisco IOS, Cisco Systems, the Cisco Systems logo, and Networking Academy are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this web site are the property of their respective owners.
Privacy Statement Terms & Conditions