BICSI Insider

Insider Volume 6 Issue 1

Issue link: https://www.e-digitaleditions.com/i/1087604

Contents of this Issue

Navigation

Page 28 of 32

Page 29 EDUCATION Network Storage and Security 10 CECs This course introduces the methods, concepts and technologies involved in storing and protecting critical data. You'll learn about the technology behind RAID arrays and the various types of storage architectures, as well as different server hardening techniques, the different types of network security systems and protocols, and logical access control methods. This course also covers how to troubleshoot networks when they encounter problems. Remote Access, Virtualization and Network Services 6 CECs Training begins by familiarizing students with cloud services, delivery methods, security considerations and networking services, and exploring cabling types, connectors and standards. Learning then transitions into the areas of virtual networking components, network storage and connection types, and wide area network (WAN) concepts. At the end of the series, students focus on monitoring concepts, including event logs, alerts and patch management, and discover remote access methods, such as VPNs, RDP, SSH, VNC and telnet. What's New With BICSI CONNECT? Data Center Networks 3 CECs Get acquainted with the storage and network infrastructure of the data center. This course outlines the configuration and provisioning of the data center's components, including the different networking protocols available and how to troubleshoot and optimize the networks. IPv6 Fundamentals: The New Age of Internet Protocol Addresses 3 CECs Build your knowledge of IPv6 now before it replaces IPv4. Gain a foundational knowledge, including what IPv6 addressing is and how it will be deployed. Identify how ICMPv6 plays a role in IPv6 networks, explore the neighbor discovery process and learn how IPv6 addresses can be allocated within a network. Are You Ready for the Internet of Things (IoT) to Change Our Buildings? 1 CEC Learn how the data collected by the Internet of Things (IoT) will change how we operate, maintain and work inside commercial buildings. This course will demonstrate the distinctions between information technology (IT) and operational technology (OT), how to effectively deploy them and why you should care about the growth of IoT. Safety and Performance Implications of Counterfeit Cables 1 CEC Discover the ways unscrupulous manufacturers fraudulently market cable that has not been verified by a nationally recognized testing laboratory and steps you can take to identify such cables and protect yourself. Learn how counterfeit cable can expose your installations to fire and safety risks, and your company to liability. Find out how to distinguish between authentic UL or ETL-rated cable and counterfeit versions. View and register for these and many other online courses at bicsi.org/connect. New courses have recently been added to our online learning portal, BICSI CONNECT. Fit in professional development based on your unique schedule by signing up for one of these self-paced classes. It's Easier With BICSI CONNECT • Set your own pace. • Available anytime, anywhere there's an internet connection. • Earn CECs without leaving your home or office. • Gain skills quickly.

Articles in this issue

Links on this page

Archives of this issue

view archives of BICSI Insider - Insider Volume 6 Issue 1