Imate žicu za učenje?

Overview/Description Security professionals are increasingly being made responsible for securing remote and wireless environments. This course examines different remote access strategies and technologies such as PPP, VPNs, PPTP, L2TP, IPsec, RADIUS, and TACACS. This course also examines wireless security mechanisms such as WEP, WPA, CCMP, EAP, PEAP, LEAP, MAC filters, SSID broadcast, and antenna placement and the attacks they are designed to fend off. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301. Target Audience Individuals who have day to day...
Overview/Description Web servers, web applications, virtualization, and cloud computing are becoming standard parts of corporate infrastructures. This course examines the communications standards and protocols that are used in the web server environment, along with the ways to harden web servers and web browsers. This course also examines the different types of attacks that web servers and web-based applications can face. Finally, this course looks at virtualized environments, along with cloud computing and the different types of services and challenges that each can offer. This course helps...
Overview/Description Security professionals must be able to create secure networking environments using appropriate tools and techniques while also being able to test existing network environments for security weaknesses. This course examines the use of routers and switches to create a secure environment, while also looking at how techniques such as creating subnets, DMZs, and VLANs can be used to secure an environment. This course also examines security assessment techniques and how penetration testing, vulnerability scanning tools, and honeypots can be used to find holes in network security...
Overview/Description Securing the networking environment is the most important job role that a Security specialist will perform. This course examines the methods, tools, and applications that can be used to secure the data, mobile devices, and operating systems, as well as how to deploy environmental controls and physical access controls. This course looks at locking mechanisms - application and physical - along with encryption schemes for data on servers and mobile devices. This course also examines the different environmental and physical controls that can be used to secure an IT...
Overview/Description To outline the maintenance practices of LDAP Target Audience IT management and staff, designers, engineers, and consultants Prerequisites An understanding of the fundamentals of communications and data storage Expected Duration (hours) 3.7 Lesson ObjectivesDesigning and Maintaining LDAP Directory Services outline the considerations for data design of LDAP. describe LDAP schema design considerations and schema elements. outline the considerations for designing a namespace in LDAP. outline the considerations in LDAP security design. identify an appropriate design for a...
Overview/Description To identify the main components of Internet commerce payment systems and to recognize new and recently outdated payment trends Target Audience Computer professionals already engaged or seeking to be involved in network design, implementation, consultancy and support; IT and business managers who need to learn about current and future digital payment technologies; students investigating or researching digital payments and related technologies Prerequisites An understanding of computers and the basic concepts of Internet commerce systems Expected Duration (hours) 2.8 Lesson...
Overview/Description This course covers the importance of Business Continuity, the factors that can affect Information Availability, and the consequences of information unavailability. It also details the Business Continuity planning process and technology solutions, specifically on eliminating single points of failure. It goes on to discuss backup granularities and backup operations. It also focuses on various backup targets and data deduplication. It details backup in a virtualized environment, and data archiving, as well as various methods and technologies for local replication. This...
Overview/Description This course focuses on the definition of data and information, types of data, and evolution of storage architecture. It discusses the key components and describes the key characteristics of a data center. This course also provides an overview of virtualization and cloud computing, and focuses on compute, memory, desktop, and application virtualization. This course is part of a series that cover the objectives for EMC Proven Professional certification exam E10-001 Information Storage and Management Exam Version 2. Target Audience Experienced IT professionals who wish to be...
Overview/Description This course explains Fibre Channel Storage Area Network (FC SAN) components, fibre channel interconnectivity options, and fibre channel architecture. It also covers virtualization in a SAN environment. The course covers the infrastructure components and topology of two protocols: IP SAN - which includes Internet SCSI (iSCSI) and Fibre Channel over IP (FCIP) - and Fibre Channel over Ethernet (FCoE). This course is part of a series that covers the objectives for EMC Proven Professional certification exam E10-001 Information Storage and Management Exam Version 2. Target...
Overview/Description This course focuses on activities related to the monitoring and management of a storage infrastructure. It explains key storage infrastructure components that are monitored, as well as monitoring parameters. Further, the course describes commonly used storage management strategies. It also describes challenges related to storage infrastructure management, along with existing and emerging solutions, such as Information Lifecycle Management and storage tiering. This course is part of a series that cover the objectives for EMC Proven Professional certification exam E10-001...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?