Securing Citrix Workspace Solutions

Formation intra-entreprise

À qui s'adresse la formation?

Built for IT Professionals familiar with Citrix Virtual Apps and Desktops. Potential students include: administrators, engineers, and architects Training.

  • Citrix Technologies Covered
  • Citrix Virtual Apps
  • Citrix Virtual Desktops
  • Citrix Hypervisor

Niveau atteint

Avancé

Durée

2,00 jour(s)

Langues(s) de prestation

EN

Prochaine session

Prérequis

Citrix recommends students have basic understanding, and handson experience with installing and configuring Citrix Virtual Apps and Desktops Recommended courses, or equivalent field experience, include knowledge of
the topics covered in:
CXD-210 Citrix Virtual Apps and Desktops 7.1x
CXD-250 Moving to the Citrix Virtual Apps and Desktops

Objectifs

  • Learn how to secure Citrix traffic between components
  • Understand Citrix authentication and authorization workflows with multifactor authentication
  • Identify methods for desktop and application hardening with registry and policy lockdowns
  • Learn to optimize monitoring and operations with Citrix leading security practices

Contenu

Learn to secure your Citrix Workspace deployments with this two-day course that covers Citrix Virtual Apps and Desktops. You’ll learn how to secure Virtual Apps and Desktops traffic, getting an understanding of when and where to secure traffic between Virtual Apps and Desktops components, and advanced authentication implementations covering multi-factor authentication, Smart Card, SAML, and FAS. Additionally, you’ll explore, how to protect your applications against vulnerabilities, Citrix Cloud security leading practices as well as operating system hardening, hypervisor security, and monitoring and operations Citrix recommended practices.

Module 1: Securing Traffic in a Citrix Virtual Apps and Desktop Environment
  • Secure Network Zones
  • Citrix Gateway
  • StoreFront Security
  • XML and STA Security
  • TLS to VDA Encryption
  • Supporting Infrastructure Security
  • Citrix Cloud Security
Module 2: Implementing Advanced Authentication Methods for Virtual Apps and Desktops
  • Windows Based Authentication
  • Pass-through Authentication
  • Multi-Factor Authentication
  • Smart-card Authentication
  • Federated Identify
  • Citrix Cloud Authentication
Module 3: Improving App and Data Security
  • Introduction to Application Security
  • Prevent Jailbreak Attacks
  • Remove Undesired Windows and Citrix Functionality
  • Application and Web Browser Hardening
  • Restrict Access to Internal Tools
  • Minimize the Impact of Attacks
Module 4: Implementing Virtual Apps and Desktop Operating System Hardening
  • GPOs and Citrix Policies
  • Lockdowns and Citrix ADC SmartControl
  • Registry Edits and Third-Party Tools
  • Workspace Environment Manager
  • Image Management
Module 5: Hypervisor Security
  • Delivery Controller to Hypervisor Connection
  • Hypervisor Security Leading Practices
  • Citrix Hypervisor Security
Module 6: Monitoring and Operations
  • Role Based Access Control
  • Logging and Auditing
  • Service Account Privileges
  • Antivirus

Ces formations pourraient vous intéresser

FR
Journée
Informatique et systèmes d'information - Informatique décisionnelle - Business Intelligence