Course Code: 821804
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery...
Learn 10 common ways that malicious code can penetrate your network.
Examine the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Discover the prospects of Network Functions Virtualization (NFV) as it evolves from a hardware-centric approach to a software-driven model. This paper also examines the future market implications and how NFV can help organizations to achieve their goals.
Learn how the latest feature updates including database management via MariaDB, container-based app isolation, the XFS file system and OpenLMI represent key open source advances.
Explore how Microsoft Office 365 works, and then discover what steps your organization should choose to implement an infrastructure that is completely driven by it.
Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.
Learn the basics of cloud computing and the types (models) available.
A zero day exploit is an attack that was previously unknown to the target or security experts in general.
Learn about the uplink strategies for traffic coming in and out of a Cisco Unified Computing Solution (UCS) chassis.