This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
3V06122 EUC Design (3V0-61.22)
The course teaches advanced EUC architecture, desktop, application, identity, and security design, guiding professionals to analyze, strategize, and implement VMware solutions for complex enterprise environments.
Who Should Take This
It is intended for senior IT architects, system engineers, and solution designers with several years of experience in virtual desktop infrastructure who aim to deepen expertise in end‑user computing design. These learners seek to validate their ability to create secure, scalable, and high‑performance EUC solutions across large organizations.
What's Covered
1
Domain 1: EUC Architecture
2
Domain 2: Desktop Design
3
Domain 3: Application Design
4
Domain 4: Identity Design
5
Domain 5: Security Design
6
Domain 6: Operations Design
7
Domain 7: DR and Multi-Site
What's Included in AccelaStudy® AI
Course Outline
70 learning goals
1
Domain 1: EUC Architecture
2 topics
Desktop Strategy
- Apply desktop delivery strategy design selecting VDI, DaaS, published apps, and physical endpoints configuration and operational procedures for enterprise VMware environments.
- Apply desktop delivery strategy design selecting VDI, DaaS, published apps, and physical endpoints best practices including deployment standards and integration with related components.
- Analyze desktop delivery strategy design selecting VDI, DaaS, published apps, and physical endpoints configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze desktop delivery strategy design selecting VDI, DaaS, published apps, and physical endpoints tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a desktop delivery strategy design selecting VDI, DaaS, published apps, and physical endpoints strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Infrastructure Design
- Apply Horizon infrastructure architecture design including Connection Server, UAG, and vSphere integration techniques for complex scenarios requiring multi-component coordination and integration.
- Apply Horizon infrastructure architecture design including Connection Server, UAG, and vSphere integration integration with monitoring, automation, and third-party systems for unified management.
- Analyze Horizon infrastructure architecture design including Connection Server, UAG, and vSphere integration failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of Horizon infrastructure architecture design including Connection Server, UAG, and vSphere integration changes on dependent services and infrastructure stability.
- Design comprehensive Horizon infrastructure architecture design including Connection Server, UAG, and vSphere integration procedures including automation, monitoring, escalation, and documentation.
2
Domain 2: Desktop Design
2 topics
Pool Architecture
- Apply desktop pool architecture design including clone types, assignment models, and capacity sizing configuration and operational procedures for enterprise VMware environments.
- Apply desktop pool architecture design including clone types, assignment models, and capacity sizing best practices including deployment standards and integration with related components.
- Analyze desktop pool architecture design including clone types, assignment models, and capacity sizing configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze desktop pool architecture design including clone types, assignment models, and capacity sizing tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a desktop pool architecture design including clone types, assignment models, and capacity sizing strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Image Management
- Apply image management design including golden images, App Volumes, and template lifecycle techniques for complex scenarios requiring multi-component coordination and integration.
- Apply image management design including golden images, App Volumes, and template lifecycle integration with monitoring, automation, and third-party systems for unified management.
- Analyze image management design including golden images, App Volumes, and template lifecycle failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of image management design including golden images, App Volumes, and template lifecycle changes on dependent services and infrastructure stability.
- Design comprehensive image management design including golden images, App Volumes, and template lifecycle procedures including automation, monitoring, escalation, and documentation.
3
Domain 3: Application Design
2 topics
App Delivery Strategy
- Apply application delivery design selecting App Volumes, published apps, ThinApp, and virtual apps configuration and operational procedures for enterprise VMware environments.
- Apply application delivery design selecting App Volumes, published apps, ThinApp, and virtual apps best practices including deployment standards and integration with related components.
- Analyze application delivery design selecting App Volumes, published apps, ThinApp, and virtual apps configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze application delivery design selecting App Volumes, published apps, ThinApp, and virtual apps tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a application delivery design selecting App Volumes, published apps, ThinApp, and virtual apps strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
User Environment
- Apply user environment management design with DEM, profile management, and GPO strategy techniques for complex scenarios requiring multi-component coordination and integration.
- Apply user environment management design with DEM, profile management, and GPO strategy integration with monitoring, automation, and third-party systems for unified management.
- Analyze user environment management design with DEM, profile management, and GPO strategy failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of user environment management design with DEM, profile management, and GPO strategy changes on dependent services and infrastructure stability.
- Design comprehensive user environment management design with DEM, profile management, and GPO strategy procedures including automation, monitoring, escalation, and documentation.
4
Domain 4: Identity Design
2 topics
Authentication Architecture
- Apply authentication architecture design with Workspace ONE Access, SSO, and conditional access configuration and operational procedures for enterprise VMware environments.
- Apply authentication architecture design with Workspace ONE Access, SSO, and conditional access best practices including deployment standards and integration with related components.
- Analyze authentication architecture design with Workspace ONE Access, SSO, and conditional access configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze authentication architecture design with Workspace ONE Access, SSO, and conditional access tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a authentication architecture design with Workspace ONE Access, SSO, and conditional access strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Access Policies
- Apply access policy design with MFA chains, device compliance, and risk-based authentication techniques for complex scenarios requiring multi-component coordination and integration.
- Apply access policy design with MFA chains, device compliance, and risk-based authentication integration with monitoring, automation, and third-party systems for unified management.
- Analyze access policy design with MFA chains, device compliance, and risk-based authentication failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of access policy design with MFA chains, device compliance, and risk-based authentication changes on dependent services and infrastructure stability.
- Design comprehensive access policy design with MFA chains, device compliance, and risk-based authentication procedures including automation, monitoring, escalation, and documentation.
5
Domain 5: Security Design
2 topics
Endpoint Security
- Apply endpoint security design with Workspace ONE Tunnel, DLP, and compliance enforcement configuration and operational procedures for enterprise VMware environments.
- Apply endpoint security design with Workspace ONE Tunnel, DLP, and compliance enforcement best practices including deployment standards and integration with related components.
- Analyze endpoint security design with Workspace ONE Tunnel, DLP, and compliance enforcement configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze endpoint security design with Workspace ONE Tunnel, DLP, and compliance enforcement tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a endpoint security design with Workspace ONE Tunnel, DLP, and compliance enforcement strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Data Protection
- Apply data protection design including encryption, remote wipe, and secure content management techniques for complex scenarios requiring multi-component coordination and integration.
- Apply data protection design including encryption, remote wipe, and secure content management integration with monitoring, automation, and third-party systems for unified management.
- Analyze data protection design including encryption, remote wipe, and secure content management failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of data protection design including encryption, remote wipe, and secure content management changes on dependent services and infrastructure stability.
- Design comprehensive data protection design including encryption, remote wipe, and secure content management procedures including automation, monitoring, escalation, and documentation.
6
Domain 6: Operations Design
2 topics
Monitoring Strategy
- Apply EUC monitoring design with Horizon Console, Workspace ONE Intelligence, and experience scoring configuration and operational procedures for enterprise VMware environments.
- Apply EUC monitoring design with Horizon Console, Workspace ONE Intelligence, and experience scoring best practices including deployment standards and integration with related components.
- Analyze EUC monitoring design with Horizon Console, Workspace ONE Intelligence, and experience scoring configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze EUC monitoring design with Horizon Console, Workspace ONE Intelligence, and experience scoring tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a EUC monitoring design with Horizon Console, Workspace ONE Intelligence, and experience scoring strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Capacity Planning
- Apply desktop infrastructure capacity planning including user profiling, IOPS sizing, and GPU planning techniques for complex scenarios requiring multi-component coordination and integration.
- Apply desktop infrastructure capacity planning including user profiling, IOPS sizing, and GPU planning integration with monitoring, automation, and third-party systems for unified management.
- Analyze desktop infrastructure capacity planning including user profiling, IOPS sizing, and GPU planning failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of desktop infrastructure capacity planning including user profiling, IOPS sizing, and GPU planning changes on dependent services and infrastructure stability.
- Design comprehensive desktop infrastructure capacity planning including user profiling, IOPS sizing, and GPU planning procedures including automation, monitoring, escalation, and documentation.
7
Domain 7: DR and Multi-Site
2 topics
DR Design
- Apply Horizon disaster recovery design including Cloud Pod Architecture and site failover strategy configuration and operational procedures for enterprise VMware environments.
- Apply Horizon disaster recovery design including Cloud Pod Architecture and site failover strategy best practices including deployment standards and integration with related components.
- Analyze Horizon disaster recovery design including Cloud Pod Architecture and site failover strategy configuration and data to identify issues, performance bottlenecks, and optimization opportunities.
- Analyze Horizon disaster recovery design including Cloud Pod Architecture and site failover strategy tradeoffs between different implementation approaches evaluating complexity, cost, and operational impact.
- Design a Horizon disaster recovery design including Cloud Pod Architecture and site failover strategy strategy that satisfies enterprise requirements for scalability, performance, security, and governance.
Hybrid Cloud
- Apply Horizon Cloud integration design for hybrid desktop delivery across on-premises and cloud techniques for complex scenarios requiring multi-component coordination and integration.
- Apply Horizon Cloud integration design for hybrid desktop delivery across on-premises and cloud integration with monitoring, automation, and third-party systems for unified management.
- Analyze Horizon Cloud integration design for hybrid desktop delivery across on-premises and cloud failures and degradation using diagnostic tools, logs, and metrics to determine root causes.
- Analyze the operational impact of Horizon Cloud integration design for hybrid desktop delivery across on-premises and cloud changes on dependent services and infrastructure stability.
- Design comprehensive Horizon Cloud integration design for hybrid desktop delivery across on-premises and cloud procedures including automation, monitoring, escalation, and documentation.
Scope
Included Topics
- End-User Computing advanced design including Horizon architecture, desktop strategy, application delivery, Workspace ONE integration, identity design, security, and DR planning.
- Enterprise-level VMware technology knowledge for EUC Design.
Not Covered
- Implementation details beyond stated certification scope.
- Vendor-specific third-party configurations.
- Current pricing and partner program details.
Official Exam Page
Learn more at VMware/Broadcom
3V0-61.22 is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified