Implementing Virtualization using Windows 2008 Hyper-V

​This course ​description ​is indicative, and only for reference ​purposes. The course is not scheduled unless advertised in our calendar. If you are interested in this course​,​ or require a customized course​ that is similar to this​, please note that ​fees start from USD ​25,000 for a two-week course. This fee is for a customized course for ten or fewer participants. For additional participants, the fee is USD 2500 ​per participant.

​For these fees, the client may customize the course to the precise needs ​of the client's organization. Scheduling will be in consultation with the client.

Participants: Those in IT support or management roles that using Windows 2008 Server as their server.

Course Description

Virtual machines technologies allow a single computer to run multiple operating systems simultaneously, letting you run applications separately, to utilize the hardware resources to it's optimum capabilities. In this 10 days course participants will gain the skills needed to install, configure and manage virtual servers and workstations using Windows 2008 Hyper-V.

Objectives

With the successful completion of this course participants will be able to:

  • Understanding, planning and installing Hyper-V
  • Building efficient virtual machines
  • Constructing the virtual network topology
  • Migrating from the existing machine to VMs
  • Remotely administer the Virtual Machines 
  • Securing and hardening the VMs

Pre-requisites

  • Experience with system administration of Windows Server 2008 networking knowledge is an advantages. 

Course Modules

Concepts

Basic understanding of virtual machines

  • Defining virtual machines
  • Advantages and disadvantages of deploying VMs

Deploying Microsoft Hyper-V

Overview of virtualization

  • Analyzing the layered architecture
  • The advantages of implementing VMs
  • VM Technologies Comparison: Hyper-V, Vmware, Xen and others

Planning and Installing the virtual infrastructure

  • Identify the VM software prerequisites
  • Estimating capacity requirements
  • Adding the Windows Server role
  • Hyper-V Manager
  • WMI
  • PowerShell

Creating Virtual Machines

Hardware Review

  • Local and Network Storage managements
  • Optimizing CPU and memory for performance

Installing guest operating systems

  • Virtualization vs paravirtualization
  • Identifying supported guest operating systems
  • Migrating to VMs

Configuring the settings

  • Enhancing functionality with Integration Services
  • Reverting to previous configurations with snapshots
  • Expanding hard drives for increased storage

Backup and recovery

  • Comparing host-based and VM-based strategies
  • Restoring guest documents and folders
  • Performing disaster recovery from system failures

Implementing Virtual Networks

  • Setting up the host for remote management
  • Accessing shared storage
  • Constructing private, internal and bridged networks
  • Interconnecting multiple network types
  • Isolating network traffic with VLANs
  • Increasing availability through NIC teaming
  • Building fault-tolerant hosts
  • Connecting to iSCSI targets for data storage

Administration with SCVMM

Enhancing management capabilities

  • Assembling the required components
  • Navigating SCVMM with the Administrator Console
  • Standard configuration with guest OS and hardware profiles
  • Rapidly deploying VMs from templates

Seamlessly migrating to Hyper-V

  • Capturing live servers into virtual machines
  • Migrate from VMware VMs to Hyper-V
  • Restricting interaction with self-service roles and policies

Troubleshooting and Optimizing VMs

Monitoring system health

  • Utilizing and checking event logs to locate potential problems
  • using the Performance Monitor

Alleviating performance issues

  • Load balance processor usage with reservations and CPU shares
  • Performance and Resource Optimization

Securing the Virtual Environment

Delegating administration

  • Applying user-level permissions with SCVMM and Hyper-V
  • Assigning roles and tasks with the Authorization Manager

Hardening the parent partition

  • Secure and controll network access with the Windows Firewall
  • Minimizing the footprint
  • Reducing the attack surface with Server Core

Stay In Touch

Please fill out all information below and you will receive an email within a 24 hour period for any further questions please fillup the form and our scheduling department and they will assist you.