Securing Citrix Workspace Solutions

Betribsintern Formatioun

U wie riicht sech d'Formatioun?

Built for IT Professionals familiar with Citrix Virtual Apps and Desktops. Potential students include: administrators, engineers, and architects Training.

  • Citrix Technologies Covered
  • Citrix Virtual Apps
  • Citrix Virtual Desktops
  • Citrix Hypervisor

Erreechten Niveau

Avancéiert

Dauer

2,00 Dag(Deeg)

Sprooch(e) vun der Déngschtleeschtung

EN

Nächst Sessioun

Virkenntnisser

Citrix recommends students have basic understanding, and handson experience with installing and configuring Citrix Virtual Apps and Desktops Recommended courses, or equivalent field experience, include knowledge of
the topics covered in:
CXD-210 Citrix Virtual Apps and Desktops 7.1x
CXD-250 Moving to the Citrix Virtual Apps and Desktops

Ziler

  • Learn how to secure Citrix traffic between components
  • Understand Citrix authentication and authorization workflows with multifactor authentication
  • Identify methods for desktop and application hardening with registry and policy lockdowns
  • Learn to optimize monitoring and operations with Citrix leading security practices

Inhalt

Learn to secure your Citrix Workspace deployments with this two-day course that covers Citrix Virtual Apps and Desktops. You’ll learn how to secure Virtual Apps and Desktops traffic, getting an understanding of when and where to secure traffic between Virtual Apps and Desktops components, and advanced authentication implementations covering multi-factor authentication, Smart Card, SAML, and FAS. Additionally, you’ll explore, how to protect your applications against vulnerabilities, Citrix Cloud security leading practices as well as operating system hardening, hypervisor security, and monitoring and operations Citrix recommended practices.

Module 1: Securing Traffic in a Citrix Virtual Apps and Desktop Environment
  • Secure Network Zones
  • Citrix Gateway
  • StoreFront Security
  • XML and STA Security
  • TLS to VDA Encryption
  • Supporting Infrastructure Security
  • Citrix Cloud Security
Module 2: Implementing Advanced Authentication Methods for Virtual Apps and Desktops
  • Windows Based Authentication
  • Pass-through Authentication
  • Multi-Factor Authentication
  • Smart-card Authentication
  • Federated Identify
  • Citrix Cloud Authentication
Module 3: Improving App and Data Security
  • Introduction to Application Security
  • Prevent Jailbreak Attacks
  • Remove Undesired Windows and Citrix Functionality
  • Application and Web Browser Hardening
  • Restrict Access to Internal Tools
  • Minimize the Impact of Attacks
Module 4: Implementing Virtual Apps and Desktop Operating System Hardening
  • GPOs and Citrix Policies
  • Lockdowns and Citrix ADC SmartControl
  • Registry Edits and Third-Party Tools
  • Workspace Environment Manager
  • Image Management
Module 5: Hypervisor Security
  • Delivery Controller to Hypervisor Connection
  • Hypervisor Security Leading Practices
  • Citrix Hypervisor Security
Module 6: Monitoring and Operations
  • Role Based Access Control
  • Logging and Auditing
  • Service Account Privileges
  • Antivirus

Dës Formatioune kéinten Iech interesséieren