Data Protection with RAID
4.1 (217 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,030 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Data Protection with RAID to your Wishlist.

Add to Wishlist

Data Protection with RAID

Concepts, Configurations and Techniques
4.1 (217 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6,030 students enrolled
Last updated 8/2017
English
Price: Free
Includes:
  • 40 mins on-demand video
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn about different RAID configurations and related techniques and configurations
  • Learn concepts like Mirroring, Stripping and Parity
  • Deep-dive into different RAID configurations
View Curriculum
Requirements
  • Basic understanding of Data Storage Devices
Description

Today any business can't exist without capabilities to get instant access of information and internet. This increase in dependency on information has also increased challenges associated with storage, protection and management of this data. Data Storage is one of the major requirement of any IT infrastructure system along with Computing and networking.

Data Storage Network is considered as one of the most confusing, misunderstood and complex domain in IT industry. This is primarily due to lack of awareness about Data Storage technologies, devices, protocols, features and training. So, due to scarcity of resources available in industry, it is one of the, always in-demand skill set in IT market. Dealing with Storage Security is another pain point, which pinch mostly to Security Engineers and auditors. Due to number of myths, misconceptions and mysteries associated with this topic.

RAID stands for Redundant Array of Independent Disks. It is an arrangement of several hard Disk acting as a single logical drive for a computer system to provide reliability and performance to data storage. RAID technology has now grown from theoretical concept to an industry standard and is a common implementation in today's storage arrays.

This course talks about different RAID technologies and possible configurations.

Who is the target audience?
  • This course has content for every one, irrespective of expertise level, role and experience
  • Network and Storage Administrator
  • QA Engineer
  • Security Engineer, Auditor and Testing Engineer
  • Managers and Decision makers
  • Students, Fresh College Graduates
  • Job Seekers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Introduction
1 Lecture 04:26
Introduction
04:26
+
Data Protection with RAID
3 Lectures 25:07

Usual computer systems use Hard Disk drive as primary form of storage. Data Storage in these disk is getting faster and reliable with every advancement in technology. However, there is always a Risk of Data Loss due to Disk Failure. Having redundancy in data storage is a must have requirement to avoid any disastrous consequences.

In current video, we will talk about RAID and its usage to achieve Reliability and Performance in data storage. We will also see, how it is used to provide data redundancy to protect data from hard disk failures.

Data Protection with RAID..Part 1
15:55

Usual computer systems use Hard Disk drive as primary form of storage. Data Storage in these disk is getting faster and reliable with every advancement in technology. However, there is always a Risk of Data Loss due to Disk Failure. Having redundancy in data storage is a must have requirement to avoid any disastrous consequences.

In current video, we will talk about RAID and its usage to achieve Reliability and Performance in data storage. We will also see, how it is used to provide data redundancy to protect data from hard disk failures.

Data Protection with RAID..Part 2
09:12

RAID Comparison
1 page
+
Hack2Secure's Self Paced Training & Certification Programs
2 Lectures 10:40

Learn More and Enroll Now at  

https://www.online.hack2secure.com/courses/secure-software-development-life-cycle-securesdlc

Self Paced program: Secure Software Development Life Cycle (Secure SDLC)
05:18

Learn More & Enroll Now at 

https://www.online.hack2secure.com/courses/web-application-security-testing-wast

Self Paced program: Web Application Security Testing (WAST)
05:22
About the Instructor
Hack2Secure Training
3.8 Average rating
679 Reviews
12,352 Students
3 Courses
IT Security Training

Hack2Secure is an expert team of Certified Information Security Professionals, who have years of experience in the exciting field of IT Security. We believe and understand the needs of today's IT professionals and is best positioned to offer world class Security Training & Professional Services in Information Security.

Hack2Secure is one of the few companies who offer wide range of theoretical and practical security training programs that can help a diverse group of people, from College Students to Corporate Professionals. We believe in knowledge sharing and transfer. Our experienced trainers will provide you the required knowledge of tools, techniques and resources along with guidance, so that you could be at the forefront of a vital and rapidly changing IT industry.