EN
AR

Network Virtualization, Storage Management, and Ethical Hacking

Overview

This course provides students with a background in virtualization technology needed to advance in today’s technology workplace. Presentations focus on using virtualization software in networked server environments and include building virtual networks, implementing high-availability clusters, enhancing performance and security, and using Virtual Machine Manager to centralize management of multiple virtual servers. Many hands-on activities are included, which allow the student to work with virtual computing concepts, using real-world situations to build the skills necessary for a successful understanding of virtualization. Familiarization with why industry uses virtualization are covered, comparing leading industry virtualization solutions currently in use today, how virtualization relates to server, desktop, and application environments and how to install and configure the different types of virtualization scenarios based on a company’s datacenter needs.

Students who complete this course may enroll in any of several more-advanced vSphere courses. Approved for Veterans.

Course Objectives

At the end of the course, you should gain an understanding of the functionality in VMware vSphere 5 and be able to:

    • Install and configure ESX or ESXi
    • Install and configure vCenter Server components
    • Configure and manage ESX/ESXi networking and storage using vCenter Server
    • Deploy, manage, and migrate virtual machines
    • Manage user access to the VMware infrastructure
    • Use vCenter Server to monitor resource usage
    • Use vCenter Server to increase scalability
    • Use VMware vCenter Update Manager to apply ESX/ESXi patches
    • Use vCenter Server to manage higher availability and data protection

Cloud Computing

This course is divided into two parts: the first part discusses cloud computing architecture and the second part introduces cloud computing security concepts. First, students will be introduced to cloud computing and review a wide variety of currently available solutions. Students will become familiar with why industry uses cloud computing, cloud characteristics, cloud models and deployment methods. A solid understanding of hardware, storage, thin clients and virtualization in the cloud computing platform will be covered. The second part of this course will discuss the cloud security fundamentals and virtualization security management. The CompTIA Cloud Essentials specialty certification demonstrates that an individual knows what cloud computing means from a business and technical perspective, as well as what is involved in moving to and governing the cloud.

EMC Proven Professional Information Storage and Management – E20-001 Exam

The EMC Storage training provides students with a background in storage management needed to advance in today’s technology workplace. This course provides a comprehensive introduction to information storage that will enable one to make informed decisions in an ever growing complexity of the IT industry. The course includes an overview of storage technology with lectures dedicated to the latest storage products: FC-SAN, NAS, IP-SAN, iSCSI as well as the methodology for long-term archiving solutions, the critical need of information security and the ever growing field of storage technologies. Many hands-on activities are included, which allow the student to work with storage computing concepts, using real-world situations to build the skills necessary for a successful understanding of information storage management.

“According to an IDC study, by 2011, the digital universe will be 10 times the size it was in 2006. Managing this deluge of data is quickly becoming an enormous challenge for IT organizations worldwide, and our research shows that the number of available employees with the necessary skills and training to address this challenge are in short supply,” said Tom Clancy, Vice President, EMC Global Services Education Services. “By participating in EMC’s EAA program and offering its students the Information Storage and Management curriculum, ECPI University is giving its students skills and training that will provide a substantial advantage for their future careers.”

As part of the EMC Academic Alliance Program, BSU  joins the more than 350 universities and colleges across 20 countries incorporating EMC’s Information Storage and Management curriculum into their technology and computer science programs, helping to develop the next generation of IT professionals.

Ethical Hacking

The EMC Storage training provides students with a background in storage management needed to advance in today’s technology workplace. This course provides a comprehensive introduction to information storage that will enable one to make informed decisions in an ever growing complexity of the IT industry. The course includes an overview of storage technology with lectures dedicated to the latest storage products: FC-SAN, NAS, IP-SAN, iSCSI as well as the methodology for long-term archiving solutions, the critical need of information security and the ever growing field of storage technologies. Many hands-on activities are included, which allow the student to work with storage computing concepts, using real-world situations to build the skills necessary for a successful understanding of information storage management.

This course prepares students for the Certified Ethical Hacking (CEH) certification by immersing them in an interactive environment where they will be shown how to scan, test, hack and secure their own information systems. This course uses hacking techniques often employed by malicious, black-hat hackers as a means to learn the best defense mechanisms and mitigation strategies.

The advanced, lab-intensive environment provides each student with in-depth knowledge and practical experience of ethical hacking using the most current and essential security systems technologies. While these hacking skills can be used for malicious purposes, this course teaches the student how to use the same hacking techniques to perform a white-hat, or ethical hack, on an organizational network. Course objectives are delivered using a combination of lectures, demonstrations, discussions, and hands-on labs.

Upon completion of this course, students will be able to complete the following learning objectives:

  • Analyze the ethical and legal issues involved in hacking information systems
  • Describe different techniques used to gather information about the potential target
  • Apply the techniques used to investigate and learn about a specific target
  • Evaluate different types of operating system vulnerabilities and hacking techniques
  • Explain the vulnerabilities and utilize attack techniques against web servers
  • Identify wireless architecture and evaluate hacking methods
  • Clearly explain the concept of cryptography and the attacks and prevention on cryptographic systems
  • Perform a successful network penetration based on previously learned concepts

Ethical Hacking II

This class will prepare students for the Certified Ethical Hacking (CEH) certification by submerging them into an interactive environment where they will be shown how to scan, test, hack, and secure web servers and/or wireless networks through the use of encryption and penetration testing results. This course will use hacking techniques used by malicious, black-hat hackers as a means to learn best defense mechanisms and mitigation strategies.

The advanced lab intensive environment provides each student with in-depth knowledge and practical experience using the most current and essential security systems technologies. While these hacking skills can be used for malicious purposes, this class teaches the student how to use the same hacking techniques to perform a white-hat or ethical hack, on an organizational network. The course objectives are delivered using a combination of lectures, demonstrations, discussions, and hands-on labs.

Learning Objectives

Upon completion of this course, students will be able to complete the following learning objectives:

  • Explain the vulnerabilities and utilize attack techniques against web servers
  • Identify wireless architecture and evaluate hacking methods
  • Clearly explain the concept of cryptography and the attacks and prevention on cryptographic systems
  • Perform a successful network penetration based on previously learned concepts

Through the above course, you can obtain a certificate from the university registered with all the data in that session, which can be referred to the university through any institution that inquires about your data and you can join many courses and other programs available through the Berkshire University