Course subjects
1. Course Introduction
2. Virtual Machine Operations
Recognise the role of a VMware Tools™ Repository
Configure a VMware Tools Repository
Recognise the backup and restore solution for VMs
Identify the components in the VMware vSphere Replication™ architecture
Deploy and configure vSphere Replication and VMware Site Recovery™ instances
Recover replicated VMs
3. vSphere Cluster Operations
Create and manage resource pools in a cluster
Describe how scalable shares work
Describe the function of the vCLS
Recognise operations that might disrupt the healthy functioning of vCLS VMs
4. Network Operations
Configure and manage vSphere distributed switches
Describe how VMware vSphere Network I/O Control enhances performance
Explain distributed switch features such as port mirroring and NetFlow
Define vSphere Distributed Services Engine
Describe the use cases and benefits of VMware vSphere Distributed Services Engine™
5. Storage Operations
Discuss vSphere support for NVMe and iSER technologies
Describe the architecture and requirements of vSAN configuration
Describe storage policy-based management
Recognise components in the VMware vSphere Virtual Volumes™ architecture
Configure Storage I/O Control
6. vCenter and ESXi Operations
Create a vCenter backup schedule
Recognise the importance of vCenter High Availability
Explain how vCenter Server High Availability works
Use host profiles to manage ESXi configuration compliance
Recognise the benefits of using configuration profiles
Use the vSphere client and the command line to manage certificates
7. vSphere Monitoring
Monitor the key factors that can affect a virtual machine's performance
Describe the factors that influence vCenter performance
Use vCenter tools to monitor resource use
Create custom alarms in vCenter
Describe the benefits and capabilities of VMware Skyline™
Recognise uses for VMware Skyline Advisor™ Pro
8. vSphere Security and Access Control
Recognise strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines
Describe vSphere support for security standards and protocols
Describe identity federation and recognise its use cases
Configure identity federation to allow vCenter to use an external identity provider
9. vSphere Trusted Environments and VM Encryption
Configure ESXi Host Access and Authentication
Describe virtual machine security features
Describe the components of a VM encryption architecture
Create, manage, and migrate encrypted VMs
List VM encryption events and alarms
Describe the benefits and use cases of vSphere Trust Authority