Vi ste ovdje
Overview/Description
The day to day security activities in an organization are the heart of security operations. In this course, you'll learn techniques for performing general security operations activities such as security investigations, including best practices and requirements for the types of investigations that security professionals typically take part in. This course also introduces you to techniques for using logging and monitoring activities for security purposes, establishing secure resource provisioning, and applying general security concepts such as least privilege to all...
Overview/Description
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection, response, mitigation, reporting, and recovery best practices. This course also covers how to use preventative measures such as firewalls, whitelisting and blacklisting, sandboxing, and anti-malware. In addition, you'll be introduced to patch and vulnerability management activities such as patch testing, installation, and deployment. Finally, this course covers change...
Overview/Description
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this course, you'll learn how to develop and implement recovery strategies, including specific strategies for backup storage, recovery sites, multiple processing sites, and system resilience and fault tolerance requirements. This course also covers best practices for disaster recovery activities, including response, personnel, communications, assessment, restoration, and...
Overview/Description
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the organizational environment. In this course you'll learn about best practices for implementing and enforcing software security controls. This course also covers best practices for assessing software security effectiveness, such as using change logs and audits, software security risk analysis, and software security acceptance testing. Finally this course covers best practices...
Overview/Description
The functional layers that are designed to serve the needs of the data center are typically built around three layers: the core layer, the aggregation layer, and the access layer. In this course, you will explore these layers and learn about their use in the data center model. You will also learn about the functions of the topology layers in Cisco data center LAN and SAN networks. The Cisco Nexus 7000 Series create the network foundation for a unified fabric data center and high-end performance campus core. This course will also describe the features of the Cisco Nexus...
Overview/Description
The Cisco Nexus 5000 Series and 2000 Series family of products create the network foundation for a unified fabric data center and high-end performance campus core. The Cisco Multilayer Director Switch (Cisco MDS) Fibre Channel switches are used in the SAN environment to provide Fibre Channel network connectivity for devices. In this course, you'll learn about the features of Cisco Nexus 5000 Series and 2000 Series Fabric Extenders products as well as the Cisco MDS Fibre Channel switches and their relationship to the layered design model. This course is one of a series in...
Overview/Description
The Cisco Nexus switches have no default configuration and are only activated by an admin user. When the switch is first switched on, an initial configuration needs to be performed. In this course, you will learn how to perform an initial configuration and validate common features of the Cisco Nexus 7000 and 5000 Series Switches. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 640-916: Introducing Cisco Data Center Technologies.
Target Audience
This course is targeted toward data center network engineers and...
Overview/Description
Cisco FabricPath and virtual port channels (vPCs) can be used to provide a Layer 2 multipathing solution for the data center. Cisco Overlay Transport Virtualization (OTV) is a MAC in IP technique for supporting the extension of Layer 2 VLANs over any transport that can forward IP packets. In this course, you will learn about vPCs and Cisco Fabric Path and how to verify their operation on Cisco Nexus 7000 and 5000 Series Switches, as well as explore OTV as a method of data center interconnect (DCI). This course is one of a series in the Skillsoft learning path that covers...
Overview/Description
Using virtual device contexts (VDCs) and Network Interface Virtualization (NIV), Cisco Nexus 5000 and 7000 Series Switches allow you to lower complexity and cost of ownership of data center network and storage resources. In this course, you will learn about the virtualization capabilities of Cisco Nexus 7000 and 5000 Series Switches. You will also explore the configuration of VDCs and FEX operations. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 640-916: Introducing Cisco Data Center Technologies.
Target...
Overview/Description
Virtualization of storage helps to provide location independence by abstracting the physical location of the data. This course describes how storage is virtualized for high availability and configuration flexibility and the benefits of server virtualization in the data center. You will learn how RAID groups and LUNs virtualize storage for high availability and configuration flexibility. This course is one of a series in the Skillsoft learning path that covers the objectives for Cisco exam 640-916: Introducing Cisco Data Center Technologies.
Target Audience
This...