Securing Citrix Workspace Solutions Training [CTX-272]
|Commitment||2 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Securing Citrix Workspace Solutions Training [CTX-272] Course – Hands-on
Securing Citrix Workspace Solutions Training [CTX-272] Course – Customize it
- We can adapt this training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the training course in manner understandable to lay audiences.
Securing Citrix Workspace Solutions Training [CTX-272] Course – Audience/Target Group
The target audience for this training course:
- Developed for IT Professionals familiar with Citrix Virtual Apps and Desktops. Potential students include: administrators, engineers, and architects
Securing Citrix Workspace Solutions Training [CTX-272] Course – Objectives:
Upon completing this training course, learners will be able to meet these objectives:
- Learn how to secure Citrix traffic between components
- Understand Citrix authentication and authorization workflows with multifactor authentication
- Identify methods for desktop and application hardening with registry and policy lockdowns
- Learn to optimize monitoring and operations with Citrix leading security practices
Securing Citrix Workspace Solutions Training [CTX-272] – Course Content
1 – Securing Traffic in a Citrix Virtual Apps and Desktop Environment
Secure Network Zones Citrix Gateway StoreFront Security XML and STA Security TLS to VDA Encryption Supporting Infrastructure Security Citrix Cloud Security
2 – Implementing Advanced Authentication Methods for Virtual Apps and Desktops
Windows Based Authentication Pass-through Authentication Multi-Factor Authentication Smart-card Authentication Federated Identify Citrix Cloud Authentication
3 – Improving App and Data Security
Introduction to Application Security Prevent Jailbreak Attacks Remove Undesired Windows and Citrix Functionality Application and Web Browser Hardening Restrict Access to Internal Tools Minimize the Impact of Attacks
4 – Implementing Virtual Apps and Desktop Operating System Hardening
GPOs and Citrix Policies Lockdowns and Citrix ADC SmartControl Registry Edits and Third-Party Tools Workspace Environment Manager Image Management
5 – Hypervisor Security
Delivery Controller to Hypervisor Connection Hypervisor Security Leading Practices Citrix Hypervisor Security
6 – Monitoring and Operations
Role Based Access Control Logging and Auditing Service Account Privileges Antivirus