VMware vSphere: Operate Scale and Secure [V8]

Master the advanced configurations of VMware vSphere V8 with our expert-led course, designed for experienced administrators aiming to optimize and secure scalable virtual infrastructures.

Course Thumbnail

Essential Skills Gained

Checkmark

Configure and manage advanced vSphere networking and storage.

Checkmark

Utilize vSphere security features to protect virtual environments.

Checkmark

Implement vCenter High Availability for maximum uptime.

Checkmark

Monitor and optimize the performance of vSphere components.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • System Administrators
  • System Engineers
  • System Integrators

Description

This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.

Calendar icon

Upcoming Course Dates

July 28, 2025 - August 01, 2025

7:00 AM - 3:00 PM

Virtual: Online - America/Los_Angeles

Enroll

$4625

August 25-29, 2025

7:00 AM - 3:00 PM

Virtual: Online - America/Los_Angeles

Enroll

$4625

September 8-12, 2025

9:00 AM - 5:00 PM

Virtual: Online - US/Eastern

Enroll

$4625

Course Outline

Download PDF

Course Introduction

  1. Introductions and course logistics

  2. Course objectives

Virtual Machine Operations

  1. Recognize the role of a VMware Tools Repository

  2. Configure a VMware Tools Repository

  3. Recognize the backup and restore solution for VMs

  4. Identify the components in the vSphere Replication architecture

  5. Deploy and configure vSphere Replication

  6. Recover replicated VMs

vSphere Cluster Operations

  1. Create and manage resource pools in a cluster

  2. Describe how scalable shares work

  3. Describe the function of the vCLS

  4. Recognize operations that might disrupt the healthy functioning of vCLS VMs

Network Operations

  1. Configure and manage vSphere distributed switches

  2. Describe how VMware vSphere Network I/O Control enhances performance

  3. Explain distributed switch features such as port mirroring and NetFlow

  4. Define vSphere Distributed Services Engine

  5. Describe the use cases and benefits of vSphere Distributed Services Engine

Storage Operations

  1. Discuss vSphere support for NVMe and iSER technologies

  2. Describe the architecture and requirements of vSAN configuration

  3. Describe storage policy-based management

  4. Recognize components in the vSphere Virtual Volumes architecture

  5. Configure Storage I/O Control

vCenter and ESXi Operations

  1. Create a vCenter backup schedule

  2. Recognize the importance of vCenter High Availability

  3. Explain how vCenter High Availability works

  4. Use host profiles to manage ESXi configuration compliance

  5. Use the vSphere client to manage vSphere certificates

vSphere Monitoring

  1. Monitor the key factors that can affect a virtual machine's performance

  2. Describe the factors that influence vCenter performance

  3. Use vCenter tools to monitor resource use

  4. Create custom alarms in vCenter

  5. Describe the benefits and capabilities of VMware Skyline

  6. Recognize uses for Skyline Advisor Pro

vSphere Security and Access Control

  1. Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines

  2. Describe vSphere support for security standards and protocols

  3. Describe identity federation and recognize its use cases

  4. Configure identity federation to allow vCenter to use an external identity provider

vSphere Trusted Environments and VM Encryption

  1. Configure ESXi Host Access and Authentication

  2. Describe virtual machine security features

  3. Describe the components of a VM encryption architecture

  4. Create, manage, and migrate encrypted VMs

  5. List VM encryption events and alarms

  6. Describe the benefits and use cases of vSphere Trust Authority

  7. Configure vSphere Trust Authority

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.