Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. What issues will they face, and, if needed, how can they collect information from the cloud?
Learn how Hyper-V Replicas make it possible to copy Hyper-V virtual machines across a LAN or WAN even if you don't have a failover cluster or shared storage between the virtual machines.
Explore how to secure your data by using public key infrastructure (PKI).
Learn how to set up Amazon Relational Database Service (Amazon RDS) and use it as a drop-in replacement for traditional Database Management Systems (DBMS), with all the cost, scaling, and agility advantages of deploying software in the cloud.
Understand Cisco FabricPath find out why routing at Layer 2 can be an acceptable description of Cisco FabricPath.
With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access.
Learn how IBM Tivoli Endpoint Manager (ITEM) can help reduce operator workloads, optimize the use of available time during maintenance windows, and keep end users happily working during distributions.
When upgrading to ESXi 5.1, you need to consider several things: Why are you upgrading? What are you upgrading? What should you do to get ready? What is the correct upgrade process? and finally What should you do after the upgrade is complete?
Examine the different types of cloud computing and learn what cloud computing has to offer you as either a consumer or producer.
Examine addressing classifications for IPV6 in detail and outline their functions within the context of the protocol.