Network Storage and Security

$695.00

CECs

10

Because so much work is done electronically, businesses and governments generate vast amounts of information, most of which needs to be kept available and safe. Storage and security technologies have improved with the growth of data requirements. This course introduces the methods, concepts, and technologies involved in storing and protecting this data. You'll learn about the technology behind RAID arrays and the various types of storage architectures as well as different server hardening techniques, the different types of network security systems and protocols, as well as logical access control methods. This course also covers how to troubleshoot networks when they encounter problems.

 

Course Highlights

Given a scenario, install and deploy primary storage devices based on given specifications and interfaces
Given a scenario, configure RAID using best practices
Summarize hardware and features of various storage technologies
Given a scenario, calculate appropriate storage capacity and plan for future growth
Compare and contrast physical security methods and concepts
Given a scenario, apply server hardening techniques
Explain basic network security systems and protocols
Implement logical access control methods based on company policy
Implement data security methods and secure storage disposal techniques
Given a scenario, implement proper environmental controls and techniques
Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods
Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods
Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods
Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods
Troubleshoot some common network hardware, software, security, and storage problems

 

Cancellation Policy

All BICSI Connect courses are nonrefundable and nontransferable.

 

Frequently Asked Questions

Who Should Attend?

This course is recommended for IT and ICT professionals, including network administrators and designers.

Technical Requirements

  • Operating Systems:

    • Windows: Windows 10 or later
    • Mac: macOS 11 (Big Sur) or later
    • Mobile Devices:

      • iOS: iOS 14 or later
      • Android: Android 10 or later
  • Browsers (latest versions recommended):

    • Google Chrome
    • Mozilla Firefox
    • Microsoft Edge
    • Safari
  • Internet Requirements: A stable high-speed internet connection

How Long is This Workshop?

Ten-hour self-paced course with 90 days from the date of purchase to complete