Skip to main content

Virtual Desktop Infrastructure in Virtual Desktop Infrastructure

$249.00
Who trusts this:
Trusted by professionals in 160+ countries
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-workshop technical engagement with an infrastructure consulting team, covering the full lifecycle of VDI deployment from initial architecture through ongoing operations, comparable to what is delivered in enterprise-scale virtual desktop rollouts.

Module 1: Architecture Design and Sizing

  • Selecting between persistent and non-persistent desktop pools based on user workload profiles and data retention requirements.
  • Determining host-to-VM density ratios while balancing CPU overcommitment, memory ballooning, and storage IOPS constraints.
  • Designing network segmentation for management, vMotion, storage, and user traffic to prevent congestion and enforce security boundaries.
  • Choosing between full clone, linked clone, and instant clone provisioning based on storage efficiency and recompose frequency needs.
  • Integrating VDI with existing identity providers and directory services to ensure consistent user-to-desktop mapping.
  • Planning for high availability by configuring host redundancy, VM restart priorities, and datastore heartbeat thresholds.

Module 2: Hypervisor and Infrastructure Integration

  • Configuring CPU and memory reservations for VDI hosts to prevent resource starvation during peak login storms.
  • Implementing storage tiering policies to place frequently accessed golden images on high-performance media.
  • Deploying and tuning distributed virtual switches with port-level QoS for consistent user experience across clusters.
  • Validating compatibility between VDI platform versions and hypervisor updates before patching cycles.
  • Enabling and monitoring NUMA alignment for large desktop VMs to avoid cross-socket memory access penalties.
  • Integrating backup and replication workflows with VDI-specific quiescing tools to ensure application consistency.

Module 3: Desktop Image Management

  • Establishing a golden image build pipeline with automated patching, application installation, and configuration validation.
  • Managing driver injection strategies for diverse endpoint devices without bloating image size.
  • Scheduling recompose operations during maintenance windows to minimize disruption to non-persistent desktop users.
  • Implementing layered image architectures using application and platform layers to reduce image sprawl.
  • Enforcing change control for image updates by requiring sign-off and testing in a staging environment.
  • Monitoring image drift in persistent desktops and triggering remediation via scheduled refresh policies.

Module 4: User Environment and Profile Management

  • Choosing between roaming profiles, UE-V, FSLogix, and profile containers based on application compatibility and login performance.
  • Configuring profile exclusion lists to prevent bloating from cache and temp files in redirected profiles.
  • Setting up profile archival and cleanup policies to manage storage growth in profile repositories.
  • Resolving profile corruption incidents by implementing automated backup and rollback procedures.
  • Integrating user settings migration tools during transitions from physical to virtual desktop environments.
  • Monitoring profile load times and identifying bottlenecks in network or storage paths during logon.

Module 5: Connectivity and Access Infrastructure

  • Deploying and load-balancing connection brokers to support failover and scale across multiple data centers.
  • Configuring secure gateway services with TLS 1.2+ and certificate rotation policies for external access.
  • Optimizing display protocol settings (e.g., PCoIP, Blast, RDP) based on network bandwidth and user task type.
  • Implementing client-side proxy settings to route traffic efficiently for hybrid and branch office users.
  • Enforcing endpoint compliance checks before granting access to virtual desktops via pre-launch scripts.
  • Integrating multi-factor authentication with the access layer without degrading user login experience.

Module 6: Security and Compliance Enforcement

  • Applying least-privilege access controls to VDI management consoles and restricting administrative delegation.
  • Encrypting desktop VMs at rest using hypervisor-level encryption or guest-based full-disk encryption.
  • Configuring anti-affinity rules to prevent co-location of sensitive desktops on shared hosts.
  • Implementing data loss prevention policies by restricting clipboard, file transfer, and printing capabilities.
  • Auditing user session activity and exporting logs to SIEM systems for compliance reporting.
  • Isolating desktop pools by regulatory domain (e.g., HIPAA, GDPR) using separate resource clusters and networks.

Module 7: Monitoring, Support, and Lifecycle Operations

  • Deploying synthetic transaction monitors to simulate logon and application launch performance.
  • Establishing baseline metrics for login duration, display latency, and storage response times.
  • Configuring alerts for host resource saturation, broker service failures, and image update timeouts.
  • Creating standardized troubleshooting runbooks for common issues like black screens, printer mapping failures, and audio glitches.
  • Scheduling routine health checks for connection server services, database connectivity, and certificate expiration.
  • Planning for VDI component lifecycle by tracking vendor support timelines and coordinating upgrade windows.

Module 8: Scalability and Multi-Site Deployment

  • Designing stretched clusters versus active-passive site pairs based on RPO/RTO requirements and network latency.
  • Replicating golden images across regions using WAN optimization and delta sync tools.
  • Implementing global entitlements with location-aware assignment to direct users to the nearest data center.
  • Managing DNS and GSLB configurations to route external connections to the optimal gateway endpoint.
  • Coordinating patching and maintenance across sites to avoid service disruption during business hours.
  • Validating cross-site storage replication performance to ensure consistency for shared profile and image stores.