Network Storage and Security
COURSE DESCRIPTION
Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be kept available and safe. Storage and security technologies have improved with the growth of data requirements. This course introduces the methods, concepts, and technologies involved in storing and protecting this data. You'll learn about the technology behind RAID arrays and the various types of storage architectures as well as different server hardening techniques, the different types of network security systems and protocols, as well as logical access control methods. This course also covers how to troubleshoot networks when they encounter problems.
Why you should attend?
Learn methods, concepts, and technologies involved in storing and protecting critical data.
What to expect?
Technical Requirements
This course has an audio component; please make sure you have speakers/headphones available.
All BICSI CONNECT courses require an Internet-capable device and Internet connection.
Java software; Windows 7 or 8; Mac OSx10.6+; Android 4.1 or later; Apple 10S 6.x, 7.x; IE 10 or later; Firefox 21 or later; Chrome 29 or later; Safari 5.1.8 or later; sound card with speakers/headphones for audio (audio not available for all courses); pop-up blockers disabled.
Who should attend?
This course is recommended for IT and ICT professionals, including network administrators and designers.
What will I learn?
After this course, you will be able to:
- Given a scenario, install and deploy primary storage
devices based on given specifications and interfaces
- Given a scenario, configure RAID using best practices
- Summarize hardware and features of various storage
technologies
- Given a scenario, calculate appropriate storage
capacity and plan for future growth
- Compare and contrast physical security methods and
concepts
- Given a scenario, apply server hardening techniques
- Explain basic network security systems and protocols
- Implement logical access control methods based on
company policy
- Implement data security methods and secure storage
disposal techniques
- Given a scenario, implement proper environmental
controls and techniques
- Given a scenario, effectively troubleshoot software
problems, selecting the appropriate tools and methods
- Given a scenario, effectively diagnose network
problems, selecting the appropriate tools and methods
- Given a scenario, effectively troubleshoot storage
problems, selecting the appropriate tools and methods
- Given a scenario, effectively diagnose security
issues, selecting the appropriate tools and methods
- Troubleshoot some common network hardware, software, security, and storage problems
How long is this course?
Ten-hour self-paced course with 90 days from the date of purchase to complete.
Can I earn credit?
Earn 10 Continuing Education Credit (CECs) upon successfully completing this program
What is the cancellation policy?
All BICSI CONNECT courses are nonrefundable and nontransferable.