Recovery Strategies

$150.00

CECs

1

In this OnDemand course, ICT professionals will learn about the OSI and TCP/IP models, and how they are used to facilitate communication between entities on a network. Explore how security controls behave at different layers of the OSI and TCP/IP models. Explore common network devices and learn how they can be compromised physically or administratively. Discover how to differentiate between discovery, footprinting, and scanning tools, and explore categories of discovery tools including auditing, vulnerability scanning, and SNMP. Explore Nmap, Zenmap, and SuperScan network discovery tools, and learn when to use protocol analyzer tools such as Wireshark. Lastly, discover the benefits of periodically referencing the Common Vulnerabilities and Exposures database. This course was originally created by Global Knowledge (GK). This course provides the process of identifying or mapping internal networks and computer resources in an organization. Conveniently, network discovery tools can be used to automate the scanning process and discover all the devices on a specific network.

 

Course Highlights

Manage lagged mailbox database copies
Describe procedure 1 of activate lagged mailbox database copies
Activate a lagged copy of the database
Enforce redelivery from safety net
Describe Exchange Server recovery
Recover mailbox databases
Set item-level recovery
Set recoverable items retention, folder quota, and alerts
Define in-place hold
Recover the public folder hierarchy and public folders
Perform a dial tone restore
Use the Exchange recover server option

 

Cancellation Policy

All BICSI Connect courses are nonrefundable and nontransferable.

 

Frequently Asked Questions

Who Should Attend?

This course is intended for all Project Managers.

Technical Requirements

  • Operating Systems:

    • Windows: Windows 10 or later
    • Mac: macOS 11 (Big Sur) or later
    • Mobile Devices:

      • iOS: iOS 14 or later
      • Android: Android 10 or later
  • Browsers (latest versions recommended):

    • Google Chrome
    • Mozilla Firefox
    • Microsoft Edge
    • Safari
  • Internet Requirements: A stable high-speed internet connection

How Long is This Workshop?

One-hour self-paced course with 90 days from the date of purchase to complete