Nov 23, 2024  
2018-2019 Course Catalog 
    
2018-2019 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CVF 1092 - Information Storage Management and Security

Credits: 3
Hours/Week: Lecture 2 Lab 2
Course Description: This course explores information on cyber-storage infrastructure, including virtual environments, from a digital forensics and network penetration perspective. Additional topics include the architectures, features, and benefits of Intelligent Storage Systems, such as FC-SAN, IP-SAN, NAS, object-based, and unified storage. The EMCISM Certification (ISM) exam is part of this course.
MnTC Goals
None

Prerequisite(s): None
Corequisite(s): None
Recommendation: CVF 1065  with a grade of C or higher OR instructor consent.

Major Content
  1. Allocating Computer Resources to Business Functions
    1. CPU and memory resource management techniques used in ESXi
    2. Virtual machine resource controls to allocate CPU and memory resources
    3. Resources pools to hierarchically allocate CPU and memory resources
  2. Balancing Virtual Machine Workloads
    1. Operation and scalability benefits of vSphere Distributed Resource Scheduler (DRS)
    2. DRS cluster and resource pools
    3. Operation and scalability benefits of Storage DRS
    4. Storage DRS cluster
    5. Operation and cost benefits of vSphere Distributed Power Management
  3. Creating Virtual Machines
    1. Virtual machine virtual hardware components
    2. Templates to deploy virtual machines
    3. Functionality and benefits of installing VMware Tools on virtual machines
    4. Guest operating system customization
  4. Extending VMware vSphere Capabilities
    1. How different VMware products and features work together to reduce the costs and improve the efficiency, availability, flexibility, and manageability of your datacenter
  5. Forensics and Cloud computing
    1. Forensics imaging in the cloud
    2. Cloud computing and pen test
    3. Securing the storage Infrastructure
    4. Managing the Storage Infrastructure
  6. Forensics on Network Storage
    1. FC SAN
    2. IP SAN
    3. FCoE
    4. NAS
  7. High Availability and Fault Tolerance
    1. Operation and availability benefits of vSphere High Availability
    2. vSphere HA cluster
    3. Operation and availability benefits of VMware Fault Tolerance
    4. Virtual machine for fault tolerance
  8. Introduction to Business continuity
    1. Backup and Archive
    2. Local replication
    3. Remote Replication
  9. Introduction to Information Storage and Forensics
    1. Big data analytics
    2. Personal data management
    3. Data center environmental control parameters
    4. File system e. Memory virtualization
  10. Migrating Virtual Machines
    1. Operation and benefits of vMotion and Storage vMotion
    2. vMotion to migrate a live virtual machine
    3. Storage vMotion to migrate a live virtual machine’s data
  11. Monitoring the Virtual Datacenter
    1. vCenter Server monitoring capabilities, including performance graphs and alarms
    2. Performance graphs to monitor ESXi hosts
    3. ESXi host and virtual machine alarms
  12. Virtual Infrastructure Overview and Forensics
    1. Server virtualization concepts
    2. vSphere components, including vCenter Server, ESXi, and the vSphere Client
    3. Virtual network and storage components
    4. vSphere Client management interface

Learning Outcomes
At the end of this course students will be able to:

  1. describe how cloud computing benefits both IT departments and their end users.
  2. design and implement business continuity planning and determine optimum information availability strategies.
  3. demonstrate in a lab environment how IT resources are delivered, consumed, metered, and secured in a vCloud environment.
  4. explain storage, network, and virtualization concepts.
  5. implement the correct storage networking option and unified storage solutions that are crucial to meeting customer requirements.
  6. define the Business Continuity (BC) and Disaster Recovery (DR) objectives is critical for designing and implementing cost-effective BC/DR solutions.
  7. discuss benefits of, and deploy cloud computing models and service offerings.
  8. identify storage security threats and set appropriate mechanisms in place.
  9. conduct a full IT audit as a forensics investigator.
  10. describe the functionality and benefits of the Cloud solution.
  11. discuss backup, recovery, and archival requirements and solutions for business-critical data.
  12. allocate CPU and memory resources hierarchically to specific business functions.
  13. perform data recovery in a simulated data ware house physical disaster.
  14. perform forensics investigation using VMware vSphere Client.
  15. perform network penetration testing and vulnerability assessment of a standard network.
  16. recognize the critical role of ‘information’ infrastructure.
  17. set, monitor, and report key information storage management parameters, including storage tiering policies.

Competency 1 (1-6)
None
Competency 2 (7-10)
None


Courses and Registration



Add to Portfolio (opens a new window)