Citrix Enterprise Security Solutions Training Overview

Citrix Enterprise Security Solutions Training Course Outline

Module 1: Introducing XenApp

  • XenApp Editions, Features, and Architecture
  • XenApp Components
  • Single and Multiple Farm Environments
  • XenApp Servers
  • Data Store
  • Data Store Updates and the Local Host Cache
  • Independent Management Architecture
  • Data Collectors
  • Data Collector Election
  • Zones
  • Additional XenApp Components
  • AppCenter

Module 2: Licensing XenApp

  • To License XenApp
  • Licensing Communication
  • License Communication Process
  • License Types
  • Citrix License Server
  • Microsoft Remote Desktop Services
  • Remote Desktop Licensing
  • Additional Licensing Considerations
  • License Administration Console
  • Port Configuration
  • Delegated Administrators in the License Administration Console
  • Installing Licensing
  • Manual Installation and Configuration
  • Removing Licensing
  • License Server Considerations
  • License File Management
  • Obtaining License Files
  • Add License Files
  • Subscription Advantage
  • High Availability Considerations
  • Additional License Server Processes
  • License Server Clustering

Module 3: Installing XenApp

  • XenApp Server Role Manager
  • Hardware Requirements
  • Software Requirements
  • Installation Decisions
  • Server Configuration Tool
  • Dynamic Data Centre Provisioning
  • Role-Based Uninstall
  • XenApp Configuration Options
  • Which Farm or Zones Will be Used in the Environment?
  • Which Server Will Be Used as the License Server?
  • Which Database Engine Will Be Used for the Data Store Database?
  • Will Shadowing Be Enabled?
  • Which Port Will the Citrix XML Service Run?
  • When Will Users Be Added?
  • Local Remote Desktop Users Group
  • Will Pass-through Authentication Be Used in the Environment?
  • Will Information in the Data Store and Configuration Logging Databases be Protected?
  • Web Interface Installation Decisions

Module 4: Configuring XenApp Administration

  • Worker Groups
  • Managing Worker Groups
  • Administrator Privilege Levels
  • Creating Administrator Accounts
  • Configuring Administrator Permissions
  • Configuring Folder Permissions
  • Delegating Administration
  • Configuration Logging
  • Creating the Configuration Logging Database
  • Configuration Logging Database Settings
  • Enabling Configuration Logging

Module 5: Installing and Configuring Web Interface

  • Web Interface Ports
  • Web Interface Communication Process
  • Web Interface Installation
  • Installing the Web Interface
  • Site Creation
  • Creating a Web Interface Site
  • Site Creation Considerations
  • XenApp Web Site Configuration Options
  • XenApp Services Site Configuration
  • Web Interface Site Modification
  • Modifying the Web Interface Configuration File
  • Using the Web Interface Management Console
  • Specifying Citrix Plug-in Backup URLs
  • Site Appearance
  • Site Customization Options
  • Session Preferences
  • Session Options
  • User Options
  • Workspace Control
  • Workspace Control
    • Functionality
    • Configuration Options
    • User Customization
    • User Customization
  • Session Termination
  • Citrix Plug-Ins and Web Interface
  • Plug-In Deployment Options
  • Automatically Detecting Plug-Ins
  • Client Detection
  • Authentication Configuration
  • Authentication Options
  • Generic RADIUS Support
  • Explicit Authentication
  • Pass-through Authentication
  • Smart Card Authentication
  • Citrix XML Service Trust Relationships
  • Secure Access Configuration
  • Access Methods
  • Network Address Translation
  • Network Address Translation Access Types
  • Server Configuration
  • Configuring Multiple Farms
  • Adding Farms
  • Configuring Load Balancing
  • Enabling Fault Tolerance
  • Specifying the XML Communication Port
  • Ticket Expiration Settings
  • Web Interface Site Removal
  • Troubleshooting Web Interface Issues

Module 6: Delivering Applications and Content

  • Published Resources
  • Published Resource Types
  • Resource Publishing Phases
  • Resource Name and Location
  • Server Assignment
  • Configured or Anonymous Accounts
  • Users and Groups
  • Resource Publishing Settings
  • VM Hosted Apps
  • Components of VM Hosted Apps
  • Organizing Published Resources for Users
  • Advanced Published Resource Settings
  • Access Control
  • Content Redirection
  • Implementing Resource Limits and Client Options
  • Configuring Resource Appearance
  • Published Resource Configuration
  • Session Pre-Launch
  • Managing Connections
  • Resources
  • Disabling or Hiding a Published Resource
  • Troubleshooting Application Delivery Issues

Module 7: Streaming Applications

  • Application Streaming
  • Application Streaming Benefits and Components
  • Application Streaming Communication Process
  • Streaming App-V Packages
  • Citrix Offline Plug-In and Plug -In Cache
  • Citrix Offline Plug-In Installation
  • Citrix Streaming Profiler
  • Profiling Process
  • Installing the Citrix Streaming Profiler
  • Creating a Profile
  • Profile Security Setting
  • Targets
  • Inter-Isolation Communication
  • Profile
    • Preference Settings
    • System Requirements
    • Installation Types
    • Properties
  • Known Limits for Profiling Applications
  • Target Properties
  • Upgrading an Application in a Target
  • Application Delivery Methods
  • Use Web Delivery Method
  • Stream to Servers
  • Publishing a Streamed Application
  • Specifying an Alternate Profile for a Published Application
  • Enabling the Least-Privileged User Account
  • Configuring Sites for Streaming Applications
  • Support for Both Remote and Streaming Applications
  • Offline Access Management
  • Indirect Membership to the Offline Access List
  • Providing Offline Access
  • Offline Access Period
  • Renewing Offline Access Period
  • Application Caching
  • Pre-Deployment of Streaming Applications
  • Troubleshooting Streaming Issues

Module 8: Configuring Policies

  • Group Policy Integration
  • IMA-Based Group Policies
  • Group Policy Extensions
  • Group Policy Architecture
  • Policy
    • Evaluation
    • Application Process
    • Processing and Precedence
    • Precedence Exceptions
    • Rules
  • Support for Policy Templates
  • Policy Filtering
  • Policy Modelling

Module 9: Configuring Load Management

  • Load Manager and Balancing
  • Load Balancing Process
  • Load Calculation and Evaluator Configuration
  • Creating Custom Load Evaluators
  • Thresholds for Load Management
  • Assigning Load Evaluators
  • Servers and Applications
  • Load Balancing Policies
  • Creating Load Balancing Policies
  • Force Application Streaming
  • Preferential Load Balancing and Considerations
  • Troubleshooting Load Management Issues

Module 10: Optimizing the User Experience

  • Optimizing Session Performance
  • Enabling Display Settings
  • HDX Broadcast Session Reliability
  • Enabling HDX Broadcast Session Reliability
  • HDX Broadcast Session Reliability Considerations
  • HDX RealTime
  • Enabling HDX RealTime
  • Understanding HDX RealTime Design Considerations
  • HDX Plug-n-Play
  • Enabling HDX Plug-n-Play
  • Understanding HDX Plug-n-Play Design Considerations
  • HDX MediaStream Windows Media Redirection
  • HDX MediaStream Flash Redirection
  • HDX 3D Image Acceleration
  • Enabling HDX 3D Image Acceleration
  • HDX 3D Progressive Display
  • Enabling HDX 3D Progressive Display
  • User Profiles
  • Differentiating User Profile Types
  • Redirecting User Data
  • Managing User Profiles
  • Enabling Profile Management
  • Understanding the Profile Management Logon Process
  • Troubleshooting User Experience Issues

Module 11: Configuring Self-Service Applications

  • Self-Service Applications Technologies
  • Citrix Receiver
  • Citrix Receiver for Windows
  • Citrix Receiver for Macintosh
  • Citrix Merchandising Server
  • Citrix Merchandising Server Architecture
  • Plug-Ins
  • Supported Plug-ins, Clients, and Receivers
  • Plug-in Delivery
  • Client for Java
  • Installation Considerations
  • Troubleshooting Self-Service Application Issues

Module 12: Configuring Printing

  • Printing Concepts
  • Printing Definitions
  • Printer Types
  • Printing Security
  • Default Printing Behavior
  • Altering the Default Printing Behavior
  • Printer Provisioning
  • User Self-Provisioning
  • Printer Auto-Creation
  • Printing Pathways
  • Network Printing Pathway
  • Client Printing Pathway
  • Printing Pathway Demonstration
  • Printer Drivers
  • Printer Driver Types
  • Citrix Universal Printing
  • Enhanced MetaFile Format
  • Print Preview
  • Citrix Universal Printer
  • Configuring Citrix Universal Printing
  • Administrator-Assigned Network Printers
  • Adding a Network Printer
  • Editing Network Printer Settings
  • Specifying the Default Printer
  • Workspace Control and Proximity Printing
  • Configuring Proximity Printing
  • Printing Preferences
  • Printing Properties
  • Printing Preference Hierarchy
  • Configuring Printer Property Retention
  • Printing Bandwidth
  • Troubleshooting Printing Issues

Module 13: Securing XenApp

  • XenApp Security Solutions
  • SecureICA
  • Citrix SSL Relay
  • SSL Relay Communication
  • Configuring SSL Relay
  • Access Gateway
  • Access Gateway Deployment Scenarios
  • Access Gateway Communications
  • Digital Certificates
  • Securing Access
  • Hosted Applications
  • SmartAccess
  • Web Interface Configuration
  • Access Methods
  • Access Gateway Settings
  • Configuring Web Interface for Access Gateway Connections
  • Security Configuration
  • Troubleshooting Access Gateway with XenApp

Module 14: Monitoring XenApp

  • Health Monitoring and Recovery
  • Service Monitoring for XenApp
  • Service Monitoring Components and Communication
  • License Usage Monitoring
  • Configuring License Alerts
  • Viewing License Usage
  • Viewing Historical License Data
  • Workflow Overview
  • Architecture
  • Workflow Automation Use Cases
  • Accessing the Farm Using PowerShell
  • Administering the Farm Using Commands

Module 15: Additional Components

  • SmartAuditor
  • SmartAuditor Components
  • Session Recording Process
  • Single Sign-on
  • Single Sign-on Components
  • Single Sign-on Process
  • Branch Optimization and Repeater Components
  • Branch Optimization Process for the Plug-in
  • Provisioning Services
  • Provisioning Services Components
  • Power and Capacity Management
  • XenServer Components

Show moredowndown

Who should attend this Citrix Enterprise Security Solutions Training Course?

The Citrix Enterprise Security Solutions Course is designed for IT security professionals and system administrators responsible for ensuring the security of Citrix environments. The following individuals can greatly benefit from attending this training:

  • IT Security Managers
  • IT Administrators
  • System Engineers
  • Security Analysts
  • Citrix Administrators
  • Desktop Virtualization Specialists
  • Cloud Architects
  • Network Engineers

Prerequisites of the Citrix Enterprise Security Solutions Training Course

There are no formal prerequisites for this Citrix Enterprise Security Solutions Course. However, familiarity with Citrix technologies and networking concepts can be beneficial for the delegates.

Citrix Enterprise Security Solutions Training Course Overview

Citrix Training encompasses a range of Citrix Courses aimed at enhancing enterprise security through comprehensive Citrix Certification Training. As businesses increasingly rely on Citrix solutions for secure, scalable virtual environments, the relevance of this training continues to grow.

Citrix Certification is essential for IT professionals seeking to master secure virtualization technologies. System administrators, network engineers, and security analysts will benefit significantly from mastering Citrix Training Courses, ensuring robust protection for organizational data and infrastructure.

The Knowledge Academy's Citrix Training and Certification course is designed to equip delegates with critical skills in just one day. Participants will gain practical experience in Citrix Online Training, optimizing security practices through immersive Citrix Online Courses and hands-on sessions.

Course Objectives

  • To understand the core principles of Citrix enterprise security solutions
  • To navigate Citrix Certification Courses to enhance professional skillsets
  • To apply best practices in security with hands-on Citrix Training Online
  • To prepare for Citrix Certification through targeted training modules
  • To leverage Citrix Online Training to secure and manage virtual environments efficiently

Upon completion, delegates will be proficient in implementing and managing Citrix solutions, equipped to enhance enterprise security and contribute to organizational resilience. This mastery also prepares them for further Citrix Certification pathways.

Show moredowndown

What’s included in this Citrix Enterprise Security Solutions Training Course?

  • World-Class Training Sessions from Experienced Instructors
  • Citrix Enterprise Security Solutions Certificate
  • Digital Delegate Pack
Hands-On Labs: Included as part of our online instructor-led delivery, these labs provide real-world exercises in a simulated environment guided by expert instructors to enhance your practical skills.

Show moredowndown

Why choose us

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Citrix Enterprise Security Solutions Training. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

live-classes

Live classes

Join a scheduled class with a live instructor and other delegates.

interactive

Interactive

Engage in activities, and communicate with your trainer and peers.

best-trainers

Global Pool of the Best Trainers

We handpick from a global pool of expert trainers for our Online Instructor-led courses.

enterprise

Expertise

With 10+ years of quality, instructor-led training, we equip professionals with lasting skills for success.

global

Global Reach

With classes running in all timezones, access any of our courses and course material from anywhere, anytime.

Unlock your potential with The Knowledge Academy's Citrix Enterprise Security Solutions Training, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

What our customers are saying

Citrix Enterprise Security Solutions Training FAQs

Citrix Enterprise Security Solutions provide comprehensive security for IT infrastructures, ensuring secure access to applications and data. They offer robust protection against cyber threats, streamline security management, and enhance user experience, making enterprise environments more resilient and secure.
There are no formal prerequisites for this Citrix Enterprise Security Solutions Course. However, familiarity with Citrix technologies and networking concepts can be beneficial for the delegates.
The Citrix Enterprise Security Solutions Course is ideal for IT Professionals, System Administrators, Network Engineers, and Cybersecurity Specialists seeking to enhance their skills in securing Citrix environments and implementing robust security measures within enterprise infrastructure.
Yes, The Knowledge Academy offers support via phone & email before attending, during, and after the course. Our customer support team is available to assist and promptly resolve any issues you may encounter.
In this training course, delegates will have intensive training with our experienced instructors, a digital delegate pack consisting of important notes related to this course, and a certificate after course completion.
This course is a 2-day training course during which delegates participate in intensive learning sessions that cover various course topics.
The Citrix Enterprise Security Solutions certification equips you with advanced skills to design, implement, and manage secure Citrix environments, addressing real-world security challenges through comprehensive training in threat detection, risk management, and robust security protocols.
Yes, the Citrix Enterprise Security Solutions Training often leads to certifications such as the Citrix Certified Professional - Networking (CCP-N) and Citrix Certified Expert - Networking (CCE-N), which are industry-recognised and highly valued by employers.
Our Citrix Enterprise Security Solutions Course stands out with its comprehensive, hands-on approach, real-world scenarios, and expert-led sessions, ensuring delegates gain practical skills and in-depth knowledge to effectively manage and secure Citrix environments.
The Citrix Enterprise Security Solutions Training Course comprehensively addresses the latest security threats and vulnerabilities by offering up-to-date methodologies, tools, and best practices for identifying, mitigating, and managing risks, ensuring robust protection for enterprise environments.
Individuals who complete the course can pursue careers as Citrix security specialists, network security engineers, IT security consultants, enterprise security architects, and system administrators, focusing on securing Citrix environments and enterprise IT infrastructures.
The Knowledge Academy in the United States stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking this course.
The training fees for Citrix Enterprise Security Solutions Trainingin the United States starts from $3195
The Knowledge Academy is the Leading global training provider for Citrix Enterprise Security Solutions Training.
Please see our Citrix Training courses available in the United States
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo
backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +1 7204454674 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
Christmas SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.