Course Duration : 1 Day 
Course Fee : Available upon request (Write to us at info@tlcpak.com)
Course Location : TLC (Karachi), Customer On-site and Online
: Online workshop are delivered in two days, two units each day between 11 am to 1 pm and 3 pm to 5 pm
Course Code : TN185
Deliverables : Comprehensive Student Guide and Workshop Certificate
PURPOSE:
Data protection contains much more than just adopting basic backup and recovery techniques, extending to issues related to data corruption, retention and data loss, data accessibility and availability, data confidentiality and sanitization, and compliance. In a nut-shell, this workshop shall cover factors to consider for data protection at the storage level and offers detailed best practices to:
  • Safeguarding of physical and logical data following SNIA best practices
  • Restore critical data in the event of a disaster
  • Determine appropriate backup retention periods using DLM and ILM
  • Classify and archive sensitive data according to regulatory and policy requirements 
  • Ensure securing data to meet appropriate compliance regulations
This is a one day lecture based face-to-face instructor led workshop that is specially designed to develop human resources in the field of business resilience and data data protection. 

TARGETED AUDIENCE:
This workshop is equally beneficial for fresh universities graduates and for those who want to start their career as technology professional. This workshop is a prerequsite of the following job roles.

  • Want to start their career as a Storage Solution Architect, Data Security Design, and Storage Presales Specialists. 
  • Want to develop skills in the space of storage data protection and business resilience as Technology Consultants and Systems Integrators. 
  • Senior IT Managers and Leaders who want to refresh their knowledge in the field of storage data protection technologies. 
  • Project Managers and Enterprise Architects.
  • Technology vendors and their Business Partners. 
  • End-users to expand their knowledge enabling them to better communicate with their technology vendors during presales cycle, preparing RPFs etc. 
  • Data Center Operation Managers, System and Storage Administrators.
  • Audit and Compliance experts.
PREREQUISITES:
Participants should have basic level of understandings of Information Technology. 

OBJECTIVES:
On completion of this course participants should be able to:

COURSE OUTLINE 
Unit 1: Business Resilience, Data Protection and Strorage Challenges
  • Understanding new challenges of Digital Transformation
  • What is Business Resilience and why?
  • Business Resilience Strategy and ISO 22301
  • Business requirements
  • The impact of Business Resilience and Data Protection
  • Understanding Fault Tolerant and Fault Resilience
  • Information explosion The growth
  • Storage Some key facts and figures (Big Data & Analytics)
  • Reduce cost, minimize risk and improve services 
  • Backup Restore solutions and Storage Efficiency
  • Key considerations prior investing in new storage solution
  • Understanding important storage planning and performance management considerations 
  • Critical facts about storage that you cannot ignore
  • Which storage technology is best? 


Unit 2: Information Infrastructure Challenges and Storage Securities

  • Differentiate between Security & Information Security
  • Business and Technology needs and priorities
  • Consequences of data security breaches
  • Types of threats to Information Security
  • What is information infrastructure and its challenges
  • Information Infrastructure model
  • Critical Characteristics of Information
  • Components of information infrastructure solution
  • Data protection technologies
  • Multiple layers of securities
  • What is storage security and why it is required?
  • Data replication technologies
  • Access Control Authentication and Authorization
  • Understanding Encryption Symmetric and Asymmetric
  • Why encryption is essential
  • Fabric-based encryption for data-at-rest
  • About Self-Encrypting Devices
  • Understand what is Latency, Storage legacy and SAN


 

Unit 3: Storage and Data Management Methodologies
  • Why Storage Management
  • Storage Management Challenges
  • SMI-S and Benefits
  • Storage Vs Data Classification
  • Information Lifecycle Management
  • ILM Three Storage Strategies
  • Data Classification
  • Hierarchical Storage Management
  • Understand Data Protection & Methods
  • Backup and Restore 
  • Types of Backups Full, Incremental & Differential
  • Understand Snapshot & Continuous Data Protection technologies
  • Importance of Virtual Tape Library
  • About Data De-duplication technology

  • Data De-duplication Example


Unit 4: Data Protection Best Practices using Common Data Protection Technologies

  • Data Protection Overview
  • Personal Data Defined
  • Five phases of the data protection life cycle
  • The two faces of Data Protection
  • Data Protection and Digital Archives
  • Drivers of Data Protection
  • Data Corruption and Data Loss, Data Protection Algorithms
  • Continuous Data Protection, Replication and Mirroring
  • Data Protection in the Cloud
  • Accessibility and Availability , Replication Multi-Site
  • Business Continuity Management
  • Basic Infrastructure Resiliency
  • Data Compliance, Data Retention and Disposition
  • Data Authenticity, Data Integrity, Data Confidentiality and Sanitization
  • Using storage backup recovery tools following SNIA data protection best practices and knowing their complete set of pros and cons.
  • Data Monitoring, Auditing and Reporting

 

Following are the customers who have attended this workshop.


 





 

List of IBM AIX Operating System 
Standard Courses

AIX 7 Basics

Power Systems for AIX II - AIX Implementation and Administration

Power Systems for AIX III - Advanced Administration and Problem Determination

Introduction to AIX Korn Shell Scripting - AIX 7,1, AIX 6.1, AIX 5.3 and Linux

AIX 7 Jumpstart for UNIX Professionals

Security for Power Systems AIX

IBM POWER Virtualization Technologies

AIX Disk Storage Management and Recovery Procedures

AIX Performance Monitoring and Management

Introduction to IT Infrastructure Technologies

Understanding the Role of Storage Technologies and Big Data

Linux Basics for Users

 

List of IBM AIX Operating System 
Short-Term Courses

AIX System Configuration Devices & AIX System Storage Overview

AIX Disk Storage Management & Recovery Procedures

AIX Performance Monitoring & Management

Understanding & Managing AIX ODM (Object Data Manager)

Security for Power Systems AIX

AIX Software Installation Maintenance & Backup & Restotore

Working with Logical Volume Manager & File System Administration

AIX Error Monitoring & System Dump Facility and AIX Scheduling

AIX Security & User Administration