Vi ste ovdje
Overview/Description
This course focuses on benefits and components of three types of storage: Network-Attached Storage (NAS), object-based storage, and unified storage. It covers NAS file-sharing protocols, different NAS implementations, and file-level virtualization. The course also covers the function of the key components of object-based storage and two examples of its uses: content-addressed and cloud-based storage. The function of the key components of unified storage and the process of data access from unified storage are also covered. This course is part of a series that cover the...
Overview/Description
This course focuses on RAID and its use to improve performance and protection. It details various RAID implementations, techniques, and levels commonly used. This course also describes the impact of RAID on performance and equips you to select the best RAID levels for your organization. It also covers the key components of an intelligent storage system. It details the function of each component, including cache management and protection techniques. The course also focuses on the two storage provisioning methods. Finally, it describes the two types of intelligent storage...
Overview/Description
This course covers synchronous and asynchronous remote replication modes. It also focuses on host-based, array-based, and network-based remote replication technologies. Further, it details three-site remote replication, data migration solutions, and remote replication and migration in a virtualized environment. It also focuses on the essential characteristics of cloud computing, cloud services and deployment models, and cloud computing infrastructure. It covers the challenges of cloud computing and cloud adoption considerations. This course is part of a series that cover...
Overview/Description
This course focuses on the recognized information security framework and storage security domains. This course also focuses on security implementation in SAN, NAS, and IP SAN, as well as security in virtualized and cloud environments. This course is part of a series that cover the objectives for EMC Proven Professional certification exam E10-001 Information Storage and Management Exam Version 2.
Target Audience
Experienced IT professionals who wish to be or currently are responsible for information storage or for planning, designing, deploying, managing, or leveraging...
Overview/Description
This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. Cloud storage is of key interest to many consumers as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course presents the importance of classifying your type of data, what type of security...
Overview/Description
Access control lists enable administrators to identify specific traffic which get special treatment. This course introduces the general concepts of ACL operation and how ACLs can use wildcard masking, as well as how to determine the wildcard mask for a range of IP subnets. The course distinguishes between different types of ACLs, with a focus on the configuration for standard numbered ACLs. Two scalability challenges for the Internet are the depletion of the registered IPv4 address space and scaling in routing. Cisco IOS NAT and PAT are mechanisms for conserving...
Overview/Description
Once you have the subnetting basics down and understand how to divide a network into two or more networks you are ready to determine the optimal subnet mask for a given scenario and how to calculate the usable range of IP addresses that can be used in each of those subnets. This course starts by reviewing and working through a detailed subnetting example that has specific requirements. Next the course introduces block sizes which tell you how many addresses are within the network. It also explains how the first subnet address is reserved to refer to the network itself...
Overview/Description
Ethernet is the network access layer of TCP/IP. This course describes different Ethernet copper and fiber options. Ethernet media options are presented with a description of the most common connectors and cable types. The Ethernet frame structure is introduced, and important fields are explained. MAC addresses and their function are described, while switch frame processing operations and duplex options are explained. The course also covers collision domains and provides configuration examples for duplex settings. Most issues that affect a switched network are...
Overview/Description
The growth of the Internet and the adoption of networking over the past 20 years are pushing the IP version 4 (IPv4) to the limits of its addressing capacity and its ability for continued growth. To sustain the evolution of the Internet and the ability to scale networks for future demands requires a limitless supply of IP addresses and improved mobility. In response, the Internet Engineering Task Force (IETF) developed a next-generation protocol, IP version 6 (IPv6). IPv6 satisfies the increasingly complex requirements of hierarchical addressing that IPv4 does not satisfy...
Overview/Description
When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct...