Citrix Enterprise Security Solutions Training Overview

Citrix Enterprise Security Solutions Training​ Course Outline

Module 1: Introducing XenApp

  • XenApp Editions, Features, and Architecture
  • XenApp Components
  • Single and Multiple Farm Environments
  • XenApp Servers
  • Data Store
  • Data Store Updates and the Local Host Cache
  • Independent Management Architecture
  • Data Collectors
  • Data Collector Election
  • Zones
  • Additional XenApp Components
  • AppCenter

Module 2: Licensing XenApp

  • To License XenApp
  • Licensing Communication
  • License Communication Process
  • License Types
  • Citrix License Server
  • Microsoft Remote Desktop Services
  • Remote Desktop Licensing
  • Additional Licensing Considerations
  • License Administration Console
  • Port Configuration
  • Delegated Administrators in the License Administration Console
  • Installing Licensing
  • Manual Installation and Configuration
  • Removing Licensing
  • License Server Considerations
  • License File Management
  • Obtaining License Files
  • Add License Files
  • Subscription Advantage
  • High Availability Considerations
  • Additional License Server Processes
  • License Server Clustering

Module 3: Installing XenApp

  • XenApp Server Role Manager
  • Hardware Requirements
  • Software Requirements
  • Installation Decisions
  • Server Configuration Tool
  • Dynamic Data Centre Provisioning
  • Role-Based Uninstall
  • XenApp Configuration Options
  • Which Farm or Zones Will be Used in the Environment?
  • Which Server Will Be Used as the License Server?
  • Which Database Engine Will Be Used for the Data Store Database?
  • Will Shadowing Be Enabled?
  • Which Port Will the Citrix XML Service Run?
  • When Will Users Be Added?
  • Local Remote Desktop Users Group
  • Will Pass-through Authentication Be Used in the Environment?
  • Will Information in the Data Store and Configuration Logging Databases be Protected?
  • Web Interface Installation Decisions

Module 4: Configuring XenApp Administration

  • Worker Groups
  • Managing Worker Groups
  • Administrator Privilege Levels
  • Creating Administrator Accounts
  • Configuring Administrator Permissions
  • Configuring Folder Permissions
  • Delegating Administration
  • Configuration Logging
  • Creating the Configuration Logging Database
  • Configuration Logging Database Settings
  • Enabling Configuration Logging

Module 5: Installing and Configuring Web Interface

  • Web Interface Ports
  • Web Interface Communication Process
  • Web Interface Installation
  • Installing the Web Interface
  • Site Creation
  • Creating a Web Interface Site
  • Site Creation Considerations
  • XenApp Web Site Configuration Options
  • XenApp Services Site Configuration
  • Web Interface Site Modification
  • Modifying the Web Interface Configuration File
  • Using the Web Interface Management Console
  • Specifying Citrix Plug-in Backup URLs
  • Site Appearance
  • Site Customisation Options
  • Session Preferences
  • Session Options
  • User Options
  • Workspace Control
  • Workspace Control
    • Functionality
    • Configuration Options
    • User Customisation
    • User Customisation
  • Session Termination
  • Citrix Plug-Ins and Web Interface
  • Plug-In Deployment Options
  • Automatically Detecting Plug-Ins
  • Client Detection
  • Authentication Configuration
  • Authentication Options
  • Generic RADIUS Support
  • Explicit Authentication
  • Pass-through Authentication
  • Smart Card Authentication
  • Citrix XML Service Trust Relationships
  • Secure Access Configuration
  • Access Methods
  • Network Address Translation
  • Network Address Translation Access Types
  • Server Configuration
  • Configuring Multiple Farms
  • Adding Farms
  • Configuring Load Balancing
  • Enabling Fault Tolerance
  • Specifying the XML Communication Port
  • Ticket Expiration Settings
  • Web Interface Site Removal
  • Troubleshooting Web Interface Issues

Module 6: Delivering Applications and Content

  • Published Resources
  • Published Resource Types
  • Resource Publishing Phases
  • Resource Name and Location
  • Server Assignment
  • Configured or Anonymous Accounts
  • Users and Groups
  • Resource Publishing Settings
  • VM Hosted Apps
  • Components of VM Hosted Apps
  • Organising Published Resources for Users
  • Advanced Published Resource Settings
  • Access Control
  • Content Redirection
  • Implementing Resource Limits and Client Options
  • Configuring Resource Appearance
  • Published Resource Configuration
  • Session Pre-Launch
  • Managing Connections
  • Resources
  • Disabling or Hiding a Published Resource
  • Troubleshooting Application Delivery Issues

Module 7: Streaming Applications

  • Application Streaming
  • Application Streaming Benefits and Components
  • Application Streaming Communication Process
  • Streaming App-V Packages
  • Citrix Offline Plug-In and Plug -In Cache
  • Citrix Offline Plug-In Installation
  • Citrix Streaming Profiler
  • Profiling Process
  • Installing the Citrix Streaming Profiler
  • Creating a Profile
  • Profile Security Setting
  • Targets
  • Inter-Isolation Communication
  • Profile
    • Preference Settings
    • System Requirements
    • Installation Types
    • Properties
  • Known Limits for Profiling Applications
  • Target Properties
  • Upgrading an Application in a Target
  • Application Delivery Methods
  • Use Web Delivery Method
  • Stream to Servers
  • Publishing a Streamed Application
  • Specifying an Alternate Profile for a Published Application
  • Enabling the Least-Privileged User Account
  • Configuring Sites for Streaming Applications
  • Support for Both Remote and Streaming Applications
  • Offline Access Management
  • Indirect Membership to the Offline Access List
  • Providing Offline Access
  • Offline Access Period
  • Renewing Offline Access Period
  • Application Caching
  • Pre-Deployment of Streaming Applications
  • Troubleshooting Streaming Issues

Module 8: Configuring Policies

  • Group Policy Integration
  • IMA-Based Group Policies
  • Group Policy Extensions
  • Group Policy Architecture
  • Policy
    • Evaluation
    • Application Process
    • Processing and Precedence
    • Precedence Exceptions
    • Rules
  • Support for Policy Templates
  • Policy Filtering
  • Policy Modelling

Module 9: Configuring Load Management

  • Load Manager and Balancing
  • Load Balancing Process
  • Load Calculation and Evaluator Configuration
  • Creating Custom Load Evaluators
  • Thresholds for Load Management
  • Assigning Load Evaluators
  • Servers and Applications
  • Load Balancing Policies
  • Creating Load Balancing Policies
  • Force Application Streaming
  • Preferential Load Balancing and Considerations
  • Troubleshooting Load Management Issues

Module 10: Optimising the User Experience

  • Optimising Session Performance
  • Enabling Display Settings
  • HDX Broadcast Session Reliability
  • Enabling HDX Broadcast Session Reliability
  • HDX Broadcast Session Reliability Considerations
  • HDX RealTime
  • Enabling HDX RealTime
  • Understanding HDX RealTime Design Considerations
  • HDX Plug-n-Play
  • Enabling HDX Plug-n-Play
  • Understanding HDX Plug-n-Play Design Considerations
  • HDX MediaStream Windows Media Redirection
  • HDX MediaStream Flash Redirection
  • HDX 3D Image Acceleration
  • Enabling HDX 3D Image Acceleration
  • HDX 3D Progressive Display
  • Enabling HDX 3D Progressive Display
  • User Profiles
  • Differentiating User Profile Types
  • Redirecting User Data
  • Managing User Profiles
  • Enabling Profile Management
  • Understanding the Profile Management Logon Process
  • Troubleshooting User Experience Issues

Module 11: Configuring Self-Service Applications

  • Self-Service Applications Technologies
  • Citrix Receiver
  • Citrix Receiver for Windows
  • Citrix Receiver for Macintosh
  • Citrix Merchandising Server
  • Citrix Merchandising Server Architecture
  • Plug-Ins
  • Supported Plug-ins, Clients, and Receivers
  • Plug-in Delivery
  • Client for Java
  • Installation Considerations
  • Troubleshooting Self-Service Application Issues

Module 12: Configuring Printing

  • Printing Concepts
  • Printing Definitions
  • Printer Types
  • Printing Security
  • Default Printing Behaviour
  • Altering the Default Printing Behaviour
  • Printer Provisioning
  • User Self-Provisioning
  • Printer Auto-Creation
  • Printing Pathways
  • Network Printing Pathway
  • Client Printing Pathway
  • Printing Pathway Demonstration
  • Printer Drivers
  • Printer Driver Types
  • Citrix Universal Printing
  • Enhanced MetaFile Format
  • Print Preview
  • Citrix Universal Printer
  • Configuring Citrix Universal Printing
  • Administrator-Assigned Network Printers
  • Adding a Network Printer
  • Editing Network Printer Settings
  • Specifying the Default Printer
  • Workspace Control and Proximity Printing
  • Configuring Proximity Printing
  • Printing Preferences
  • Printing Properties
  • Printing Preference Hierarchy
  • Configuring Printer Property Retention
  • Printing Bandwidth
  • Troubleshooting Printing Issues

Module 13: Securing XenApp

  • XenApp Security Solutions
  • SecureICA
  • Citrix SSL Relay
  • SSL Relay Communication
  • Configuring SSL Relay
  • Access Gateway
  • Access Gateway Deployment Scenarios
  • Access Gateway Communications
  • Digital Certificates
  • Securing Access
  • Hosted Applications
  • SmartAccess
  • Web Interface Configuration
  • Access Methods
  • Access Gateway Settings
  • Configuring Web Interface for Access Gateway Connections
  • Security Configuration
  • Troubleshooting Access Gateway with XenApp

Module 14: Monitoring XenApp

  • Health Monitoring and Recovery
  • Service Monitoring for XenApp
  • Service Monitoring Components and Communication
  • License Usage Monitoring
  • Configuring License Alerts
  • Viewing License Usage
  • Viewing Historical License Data
  • Workflow Overview
  • Architecture
  • Workflow Automation Use Cases
  • Accessing the Farm Using PowerShell
  • Administering the Farm Using Commands

Module 15: Additional Components

  • SmartAuditor
  • SmartAuditor Components
  • Session Recording Process
  • Single Sign-on
  • Single Sign-on Components
  • Single Sign-on Process
  • Branch Optimisation and Repeater Components
  • Branch Optimisation Process for the Plug-in
  • Provisioning Services
  • Provisioning Services Components
  • Power and Capacity Management
  • XenServer Components

Show moredowndown

Who should attend this Citrix Enterprise Security Solutions Training Course?

The Citrix Enterprise Security Solutions Course is designed for IT security professionals and System Administrators responsible for ensuring the security of Citrix environments. The following individuals can greatly benefit from attending this training:

  • IT Security Managers
  • IT Administrators
  • System Engineers
  • Security Analysts
  • Citrix Administrators
  • Desktop Virtualisation Specialists
  • Cloud Architects
  • Network Engineers

Prerequisites of the Citrix Enterprise Security Solutions Training Course

There are no formal prerequisites for this Citrix Enterprise Security Solutions Course. However, familiarity with Citrix technologies and networking concepts can be beneficial for the delegates.

Citrix Enterprise Security Solutions Training Course Overview

The Citrix Enterprise Security Solutions Course is designed to equip IT professionals with the necessary skills to safeguard their organisation's digital assets. This course delves into the critical aspects of enterprise security within the Citrix environment, addressing current threats and vulnerabilities. 

Proficiency in this Citrix Training is crucial for maintaining secure IT infrastructures. As cyber threats evolve, IT Professionals, Network Administrators, Security Analysts, and System Engineers must stay ahead by mastering these security solutions. This course is particularly beneficial for those responsible for the security and integrity of enterprise systems. 

This 2-day Citrix Training course offers a practical and in-depth approach to Citrix security. Delegates will learn to implement effective security measures, identify and mitigate potential threats, and manage security policies efficiently. Through hands-on exercises and expert guidance, delegates will develop the skills needed to secure Citrix environments. 

Course Objectives

  • To understand the fundamentals of Citrix security architecture
  • To identify potential security threats and vulnerabilities
  • To implement robust security measures in Citrix environments
  • To manage and configure security policies effectively
  • To conduct regular security assessments and audits
  • To develop strategies for incident response and management

After completing this course, delegates will possess the expertise to secure Citrix environments effectively. They will be able to implement advanced security protocols, protect against cyber threats, and ensure the integrity and confidentiality of their organisation's data.

Show moredowndown

What’s included in this Citrix Enterprise Security Solutions Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Citrix Enterprise Security Solutions Certificate
  • Digital Delegate Pack
Hands-On Labs: Included as part of our online instructor-led delivery, these labs provide real-world exercises in a simulated environment guided by expert instructors to enhance your practical skills.

Show moredowndown

Why choose us

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Citrix Enterprise Security Solutions Training. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

live-classes

Live classes

Join a scheduled class with a live instructor and other delegates.

interactive

Interactive

Engage in activities, and communicate with your trainer and peers.

best-trainers

Global Pool of the Best Trainers

We handpick from a global pool of expert trainers for our Online Instructor-led courses.

enterprise

Expertise

With 10+ years of quality, instructor-led training, we equip professionals with lasting skills for success.

global

Global Reach

With classes running in all timezones, access any of our courses and course material from anywhere, anytime.

Unlock your potential with The Knowledge Academy's Citrix Enterprise Security Solutions Training, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Experience the most sought-after learning style with The Knowledge Academy's Citrix Enterprise Security Solutions Training. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Citrix Enterprise Security Solutions Training sessions.

best_trainers

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

value_for_money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy’s In-house/Onsite Citrix Enterprise Security Solutions Training at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our Citrix Enterprise Security Solutions Training offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Citrix Enterprise Security Solutions Training FAQs

Citrix Enterprise Security Solutions provide comprehensive security for IT infrastructures, ensuring secure access to applications and data. They offer robust protection against cyber threats, streamline security management, and enhance user experience, making enterprise environments more resilient and secure.
There are no formal prerequisites for this Citrix Enterprise Security Solutions Course. However, familiarity with Citrix technologies and networking concepts can be beneficial for the delegates.
The Citrix Enterprise Security Solutions Course is ideal for IT Professionals, System Administrators, Network Engineers, and Cybersecurity Specialists seeking to enhance their skills in securing Citrix environments and implementing robust security measures within enterprise infrastructure.
Yes, The Knowledge Academy offers support via phone & email before attending, during, and after the course. Our customer support team is available to assist and promptly resolve any issues you may encounter.
In this training course, delegates will have intensive training with our experienced instructors, a digital delegate pack consisting of important notes related to this course, and a certificate after course completion.
This course is a 2-day training course during which delegates participate in intensive learning sessions that cover various course topics.
The Citrix Enterprise Security Solutions certification equips you with advanced skills to design, implement, and manage secure Citrix environments, addressing real-world security challenges through comprehensive training in threat detection, risk management, and robust security protocols.
Yes, the Citrix Enterprise Security Solutions Training often leads to certifications such as the Citrix Certified Professional - Networking (CCP-N) and Citrix Certified Expert - Networking (CCE-N), which are industry-recognised and highly valued by employers.
Our Citrix Enterprise Security Solutions Course stands out with its comprehensive, hands-on approach, real-world scenarios, and expert-led sessions, ensuring delegates gain practical skills and in-depth knowledge to effectively manage and secure Citrix environments.
The Citrix Enterprise Security Solutions Training Course comprehensively addresses the latest security threats and vulnerabilities by offering up-to-date methodologies, tools, and best practices for identifying, mitigating, and managing risks, ensuring robust protection for enterprise environments.
Individuals who complete the course can pursue careers as Citrix security specialists, network security engineers, IT security consultants, enterprise security architects, and system administrators, focusing on securing Citrix environments and enterprise IT infrastructures.
The Knowledge Academy in Chile stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking this course.
The training fees for Citrix Enterprise Security Solutions Trainingin Chile starts from $3195
The Knowledge Academy is the Leading global training provider for Citrix Enterprise Security Solutions Training.
Please see our Citrix Training courses available in Chile
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Citrix Enterprise Security Solutions Training in Chile

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on + 1-866 272 8822 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
Christmas SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.