|
Dec 21, 2024
|
|
|
|
CVF 1092 - Information Storage Management and Security Credits: 3 Hours/Week: Lecture 2 Lab 2 Course Description: This course explores information on cyber-storage infrastructure, including virtual environments, from a digital forensics and network penetration perspective. Additional topics include the architectures, features, and benefits of Intelligent Storage Systems, such as FC-SAN, IP-SAN, NAS, object-based, and unified storage. The EMCISM Certification (ISM) exam is part of this course. MnTC Goals None
Prerequisite(s): None Corequisite(s): None Recommendation: CVF 1065 with a grade of C or higher OR instructor consent.
Major Content
- Allocating Computer Resources to Business Functions
- CPU and memory resource management techniques used in ESXi
- Virtual machine resource controls to allocate CPU and memory resources
- Resources pools to hierarchically allocate CPU and memory resources
- Balancing Virtual Machine Workloads
- Operation and scalability benefits of vSphere Distributed Resource Scheduler (DRS)
- DRS cluster and resource pools
- Operation and scalability benefits of Storage DRS
- Storage DRS cluster
- Operation and cost benefits of vSphere Distributed Power Management
- Creating Virtual Machines
- Virtual machine virtual hardware components
- Templates to deploy virtual machines
- Functionality and benefits of installing VMware Tools on virtual machines
- Guest operating system customization
- Extending VMware vSphere Capabilities
- How different VMware products and features work together to reduce the costs and improve the efficiency, availability, flexibility, and manageability of your datacenter
- Forensics and Cloud computing
- Forensics imaging in the cloud
- Cloud computing and pen test
- Securing the storage Infrastructure
- Managing the Storage Infrastructure
- Forensics on Network Storage
- FC SAN
- IP SAN
- FCoE
- NAS
- High Availability and Fault Tolerance
- Operation and availability benefits of vSphere High Availability
- vSphere HA cluster
- Operation and availability benefits of VMware Fault Tolerance
- Virtual machine for fault tolerance
- Introduction to Business continuity
- Backup and Archive
- Local replication
- Remote Replication
- Introduction to Information Storage and Forensics
- Big data analytics
- Personal data management
- Data center environmental control parameters
- File system e. Memory virtualization
- Migrating Virtual Machines
- Operation and benefits of vMotion and Storage vMotion
- vMotion to migrate a live virtual machine
- Storage vMotion to migrate a live virtual machine’s data
- Monitoring the Virtual Datacenter
- vCenter Server monitoring capabilities, including performance graphs and alarms
- Performance graphs to monitor ESXi hosts
- ESXi host and virtual machine alarms
- Virtual Infrastructure Overview and Forensics
- Server virtualization concepts
- vSphere components, including vCenter Server, ESXi, and the vSphere Client
- Virtual network and storage components
- vSphere Client management interface
Learning Outcomes At the end of this course students will be able to:
- describe how cloud computing benefits both IT departments and their end users.
- design and implement business continuity planning and determine optimum information availability strategies.
- demonstrate in a lab environment how IT resources are delivered, consumed, metered, and secured in a vCloud environment.
- explain storage, network, and virtualization concepts.
- implement the correct storage networking option and unified storage solutions that are crucial to meeting customer requirements.
- define the Business Continuity (BC) and Disaster Recovery (DR) objectives is critical for designing and implementing cost-effective BC/DR solutions.
- discuss benefits of, and deploy cloud computing models and service offerings.
- identify storage security threats and set appropriate mechanisms in place.
- conduct a full IT audit as a forensics investigator.
- describe the functionality and benefits of the Cloud solution.
- discuss backup, recovery, and archival requirements and solutions for business-critical data.
- allocate CPU and memory resources hierarchically to specific business functions.
- perform data recovery in a simulated data ware house physical disaster.
- perform forensics investigation using VMware vSphere Client.
- perform network penetration testing and vulnerability assessment of a standard network.
- recognize the critical role of ‘information’ infrastructure.
- set, monitor, and report key information storage management parameters, including storage tiering policies.
Competency 1 (1-6) None Competency 2 (7-10) None Courses and Registration
Add to Portfolio (opens a new window)
|
|