Course Duration |
: 2 Day - Face-To-Face Instructor
Led Workshop |
Course Fee |
: Available upon request (Write
to us at
info@tlcpak.com) |
Course Location |
: TLC (Karachi), Customer Onsite,
and Online |
|
: Online workshop are delivered
in four days, two units each day between 11 am to 1 pm and 3 pm to 5 pm |
Course Code |
: TN175 |
Deliverables |
: Comprehensive Student Guide and
Workshop Certificate |
PURPOSE:
This course is designed to provide
you with introductory information on leading edge infrastructure and emerging
technologies. You will be taught about the capabilities, functions and
basic solutions offered by the various technology market leaders.
This is a two day face-to-face workshop
that is specially designed to develop human resources in the field of infrastructure
technologies.
Based on 27 years of experience,
this course is developed and designed to prepare human resources to meet
local and global demand gap where you can demonstrate your abilities as
a key IT resource for any organization.
TARGETED AUDIENCE:
This workshop is equally beneficial
for fresh universities graduates and for those who want to start their
career as technology professional. This workshop is a prerequsite of the
following job roles.
-
Customer who want to update their knowledge
in the field of Infrastructure Technologies based on emerging technologies
like Virtualization, IoT's, Object Storage, and Cloud Computing. This shall
ebable customers to exapnd their knowledge helping them to better communicate
with their technology vendors during presales cycle, preparing RPFs etc.
-
People who want to start their career
as Infrastructure Technology Pre Sales Specialists.
-
People who want to develop skills as
IT Infrastructure Technology Consultants and Systems Integrators.
-
Senior IT resources and managers who
want to refresh their knowledge in IT Infrastructure Technologies.
-
Technology vendors, their Business Partners
and distributors.
-
Technology sales people who want to
change their profession from other technology discipline to IT Infrastrastructure
Sales Professionals.
PREREQUISITES:
Participants should have basic level
of understandings of Information Technology.
OBJECTIVES:
On completion of this course participants
should be able to:
COURSE OUTLINE
Unit 1 – Data Center Technologies
-
Understand Data Center –Consolidation
& Colocation.
-
Next Generation Data Center.
-
System Availability –Some Facts.
-
Continuous Availability for Local &
DR –Change Management.
-
9 Layer of IT Infrastructure Foundation
–Knowing the Mistake.
-
Why Data Protection is important?
-
Why enterprises are increasingly more
vulnerable to disaster?
-
Important consideration from Data Recovery
point of view.
-
Understanding Recovery Point Objective
–RPO and RTO.
-
Data Center Tiers.
-
DData Center Architecture and Design.
-
Data Center Security and Safety.
-
Data Center Infrastructure Management
and Monitoring.
-
Open System Interconnection –OSI Model.
-
Networking Devices –An integral part
of Data Center.
-
Mandatory components of Data Center.
-
Some of the Big Challenges –Data Center.
-
Understanding the difference between
TCO and TCA.
-
IDC’s top 10 predictions for the data
center.
Unit 2 – Virtualization Technologies
-
Typical standalone server configuration.
-
Management key objectives & Challenges.
-
Virtualization Defined.
-
Understand different forms of Virtualization.
-
Traditional IT Infrastructure.
-
What is Virtualization and the role
of hypervisor.
-
Virtualization and overall benefits.
-
CPU, Memory, Storage and Network virtualization.
-
Advantages of virtualization.
-
Impact of Server Virtualization –Consolidation
Example.
-
Virtualization –Hypervisor, the core
technology.
-
Desktop virtualization.
-
Storage Capacity Utilization –Expanding
more for less.
-
Why there is a need for Storage Virtualization.
-
Key features & benefits offered
by Storage Virtualization.
-
Flexibility through Storage Virtualization.
Unit 3 – Storage in a view - Challenges
and Trends
-
Storage types and subsystems
-
IT Trends and storage dilemma
-
Business requirements
-
Pressure on the IT management
-
Information infrastructure model
-
Information explosion –The growth
-
Reduce cost, minimize risk and improve
services
-
Backup and restore solutions Planning
about new storage purchase
-
Understanding SAN & the role of
SNIA –Standards & Compliances.
-
Why SAN and SAN highlights and utility.
-
Components and benefits of SAN.
-
SAN –A high speed data transfer between
hosts.
-
Protocols supported by SAN –FC SAN and
IP SAN.
-
Understand igroup and LUN.
-
Logical Unit Number specifics.
-
Information you require to create a
LUN.
-
Understanding Block Level Storage &
its applications.
-
Major SAN players.
-
Understand file sharing environment
and NAS.
-
Describe File Based Storage and NAS
Advantages.
-
Understand NAS Protocols –NFS, CIFS,
HTP.
-
Server and NAS connectivity.
-
NAS communications and security.
-
iSCSI –What is it? and Basic iSCSI storage
configuration.
-
Understanding TCP/IP Offload Engine
(TOE).
-
NAS Implementation.
-
Understand NAS I/O and NAS benefits.
-
SAN NAS comparison chart.
-
Understand Snapshot technology.
-
Understanding Network Data Management
Protocol and its functionality.
-
Difference between Unstructured and
Structured data types.
-
What is an Object and Metadata?
-
What is Object Storage?
-
Understand Object Storage Concepts.
-
About Object Store Contents.
-
Abstraction of Storage.
-
Object Storage components.
-
Key characteristics of Object Storage.
-
Object Storage –Data Containers &
Attributes.
-
Components of Object Storage.
-
Understanding REST.
-
Features and Benefits of Object Storage.
|
-
Nine reasons Object Level Storage adoption
has increased.
-
Object Storage –Usage scenario with
respect to Applications.
-
Global Use Cases.
-
Object Storage as a Scalable Cloud Storage
Service.
-
Global Object Storage vendors and their
positioning.
Unit 4 - Backup Recovery and Data
Security
-
Why backups are important?
-
Why recovery of the data is critical?
-
Types of general purpose user applications.
-
Data replication technologies and replication
types.
-
Network bandwidth consideration and
latency.
-
Data integrity and data consistency.
-
Online backup consistency and problems.
-
Understanding Encryption –Symmetric
& Asymmetric.
-
Why encryption is essential.
-
Consequences of data security breaches.
-
Fabric-based encryption for data-at-rest.
-
Self Encrypting Hard Disk Drives and
Tape Drives.
-
Data Encryption supported on Storage
Subsystems –Example.
Unit 5 – Cloud Computing Defined
-
Cloud Computing Defined.
-
Defining Service Oriented Architecture
(SOA) and Web Services.
-
Describe Representational State Transfer
(REST) Architecture.
-
Technologies that Enable Cloud Computing.
-
Virtualization, Hypervisor, Provisioning,
Orchestration, Security, and Lifecycle Management.
-
Understand three Cloud Service Models
& their details.
-
Describe Cloud four Deployment Models
with Several Variations and their details.
-
Clients are moving workloads to cloud.
-
Application Readiness with respect to
Cloud.
-
Cloud solution to common IT problems
& challenges.
-
Common terms & phrases related to
cloud solutions.
-
Cloud Architecture and a view on Cloud
Computing Reference Architecture.
-
Cloud migration from architecture through
implementation.
-
Vendors are helping their clients achieve
compelling business outcomes.
-
Cloud local and international market
players.
-
Cloud boundaries getting blurred and
complex.
Unit 6 – Exploiting Internet of Things
(IoT)
-
What is Internet of Thing –IoT and Major
components of IoT.
-
Understand how IOT Works.
-
Example of an IoT system.
-
What are Sensor Based Data Acquisition
Systems?
-
Internet of Things –Hardware & Software.
-
Basic Architecture of Internet of Things.
-
IoT –Embedded Operating System and Supported
Platforms.
-
Top 5 wireless technologies for IoT
& 5G networks.
-
Exponential growth of IoT.
-
IoT is the current wave of the Internet.
-
M2M Vs IoT –A Smart Comparison
-
IoT disadvantages that you should know.
-
IoT Market –Sizing the opportunity.
-
Emerging Standards supporting IoT.
-
Standard IoT Devices & Simple view
of the Internet of Things.
-
IoT Device Management.
-
Internet of Things -Common Uses.
-
IoT Applications.
-
Why most IoT projects are unsuccessful.
Unit 7 – Information Security Awareness
-
Our world –and how we interact with
it –is changing.
-
The Evolution of Data increases storage
security threats.
-
The Evolution of Storage technologies
and future.
-
What is Information Security and Dependability.
-
Business Drivers for Data Security and
Risks attached to Poor Security.
-
Top 11 ways poor cyber security can
harm you.
-
Key Cybersecurity initiatives business
should consider.
-
Security Vs. Safety in a view.
-
Threats definitions –Just a refresher.
-
Malware Detection and Security –Defense
in depth.
-
Avoid Social Engineering and Malicious
Software.
-
Other Hacker tricks to avoid.
-
Understand Fraud and Pulling fraud out
of the shadows.
-
Top Security Concerns for Cloud-Based
Storage Services.
-
Keep your Storage Security policy simple.
-
5 Questions you should ask your Cloud
Services Provider
-
Top 5 Cloud Storage Security Challenges.
-
Generalized Security Framework.
-
Traditional Approach to Security.
-
Enterprise Security in a View.
|
|
|
|