Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be kept available and safe. Storage and security technologies have improved with the growth of data requirements. This course introduces the methods, concepts, and technologies involved in storing and protecting this data. You'll learn about the technology behind RAID arrays and the various types of storage architectures as well as different server hardening techniques, the different types of network security systems and protocols, as well as logical access control methods. This course also covers how to troubleshoot networks when they encounter problems.
Course Highlights
Given a scenario, install and deploy primary storage devices based on given specifications and interfaces | |
Given a scenario, configure RAID using best practices | |
Summarize hardware and features of various storage technologies | |
Given a scenario, calculate appropriate storage capacity and plan for future growth | |
Compare and contrast physical security methods and concepts | |
Given a scenario, apply server hardening techniques | |
Explain basic network security systems and protocols |
|
Implement logical access control methods based on company policy |
|
Implement data security methods and secure storage disposal techniques |
|
Given a scenario, implement proper environmental controls and techniques |
|
Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods |
|
Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods |
|
Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods |
|
Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods |
|
Troubleshoot some common network hardware, software, security, and storage problems |
Cancellation Policy
All BICSI Connect courses are nonrefundable and nontransferable.
Frequently Asked Questions
Who Should Attend?
This course is recommended for IT and ICT professionals, including network administrators and designers.
Technical Requirements
-
Operating Systems:
-
Windows: Windows 10 or later
-
Mac: macOS 11 (Big Sur) or later
-
Mobile Devices:
-
iOS: iOS 14 or later
-
Android: Android 10 or later
-
-
-
Browsers (latest versions recommended):
-
Google Chrome
-
Mozilla Firefox
-
Microsoft Edge
-
Safari
-
-
Internet Requirements: A stable high-speed internet connection