Data Protection with RAID

Concepts, Configurations and Techniques
3.8 (152 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
4,784 students enrolled
Free
Start Learning Now
  • Lectures 5
  • Length 32 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2015 English

Course Description

Today any business can't exist without capabilities to get instant access of information and internet. This increase in dependency on information has also increased challenges associated with storage, protection and management of this data. Data Storage is one of the major requirement of any IT infrastructure system along with Computing and networking.

Data Storage Network is considered as one of the most confusing, misunderstood and complex domain in IT industry. This is primarily due to lack of awareness about Data Storage technologies, devices, protocols, features and training. So, due to scarcity of resources available in industry, it is one of the, always in-demand skill set in IT market. Dealing with Storage Security is another pain point, which pinch mostly to Security Engineers and auditors. Due to number of myths, misconceptions and mysteries associated with this topic.

RAID stands for Redundant Array of Independent Disks. It is an arrangement of several hard Disk acting as a single logical drive for a computer system to provide reliability and performance to data storage. RAID technology has now grown from theoretical concept to an industry standard and is a common implementation in today's storage arrays.

This course talks about different RAID technologies and possible configurations.

What are the requirements?

  • Basic understanding of Data Storage Devices

What am I going to get from this course?

  • Learn about different RAID configurations and related techniques and configurations
  • Learn concepts like Mirroring, Stripping and Parity
  • Deep-dive into different RAID configurations

What is the target audience?

  • This course has content for every one, irrespective of expertise level, role and experience
  • Network and Storage Administrator
  • QA Engineer
  • Security Engineer, Auditor and Testing Engineer
  • Managers and Decision makers
  • Students, Fresh College Graduates
  • Job Seekers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Introduction
04:26
Section 2: Data Protection with RAID
15:55

Usual computer systems use Hard Disk drive as primary form of storage. Data Storage in these disk is getting faster and reliable with every advancement in technology. However, there is always a Risk of Data Loss due to Disk Failure. Having redundancy in data storage is a must have requirement to avoid any disastrous consequences.

In current video, we will talk about RAID and its usage to achieve Reliability and Performance in data storage. We will also see, how it is used to provide data redundancy to protect data from hard disk failures.

09:12

Usual computer systems use Hard Disk drive as primary form of storage. Data Storage in these disk is getting faster and reliable with every advancement in technology. However, there is always a Risk of Data Loss due to Disk Failure. Having redundancy in data storage is a must have requirement to avoid any disastrous consequences.

In current video, we will talk about RAID and its usage to achieve Reliability and Performance in data storage. We will also see, how it is used to provide data redundancy to protect data from hard disk failures.

RAID Comparison
1 page
Section 3: Complete Course Details: Data Storage Network and Security
Course Details & Offers
1 page

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Hack2Secure Training, IT Security Training

Hack2Secure is an expert team of Certified Information Security Professionals, who have years of experience in the exciting field of IT Security. We believe and understand the needs of today's IT professionals and is best positioned to offer world class Security Training & Professional Services in Information Security.

Hack2Secure is one of the few companies who offer wide range of theoretical and practical security training programs that can help a diverse group of people, from College Students to Corporate Professionals. We believe in knowledge sharing and transfer. Our experienced trainers will provide you the required knowledge of tools, techniques and resources along with guidance, so that you could be at the forefront of a vital and rapidly changing IT industry.

Ready to start learning?
Start Learning Now