INE – Implementing vSphere Data Protection Replication

INE – Implementing vSphere Data Protection Replication
English | Size: 395.6 MB
Category: Cloud-Comp | E-learning | Networking | VMware

In this course you will learn about the benefits, the architecture, the requirements and limitations of vSphere Data Protection. We will cover the deployment and configuration of vSphere Data Protection. This is followed by demonstration of the creation of backup jobs, backup data replication and application backup configurations. You will then learn about restoring virtual machines, performing File Level Restore and how to perform vSphere Data Protection Emergency Restore. Next, youíll learn about the benefits and the architecture of vSphere Replication. We will also cover the deployment and configuration of the vSphere Replication Appliance, as well as the setting of a Disaster Recovery site to act as a vSphere Replication target. Finally, you will learn how to configure replications and how to recover virtual machines. [Read more…]

ITPRO TV – General Data Protection Regulation (GDPR)

ITPRO TV – General Data Protection Regulation (GDPR)
English | Size: 3.13 GB
Category: Tutorial

In April of 2016, the European Commission published a data protection package to reform, modernize and harmonize European data protection law. The cornerstone of the package is the General Data Protection Regulation (GDPR) which will replace the 1995 Data Protection Directive and, in the UK, the Data Protection Act 1998. This overview highlights the key themes of the General Data Protection Regulation (GDPR) to help organizations understand the new legal framework in the EU. It is for those who have day-to-day responsibility for data protection. [Read more…]

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data
English | Size: 101.50 MB
Category: CBTs

Our valued, portable data assets benefit from intentional scrutiny and governance guidelines about how each should be preserved, protected, and destroyed. This course is for anyone who has data assets that are not contained in a locked file cabinet. It may also have relevance to those who have hard copy documents, but who have not considered how those documents should be managed. Here, learn about the different states of data, and how individuals and organizations can protect their portable data that’s at risk. Upon completing this course, you’ll have the knowledge you need to design and implement your own data management plan [Read more…]

Lynda – Learning System Center 2016 Endpoint Protection

Lynda – Learning System Center 2016 Endpoint Protection
English | Size: 231.31 MB
Category: CBTs

Microsoft System Center Endpoint Protection provides a centralized method of deploying and monitoring the security of managed devices with alert and report capabilities. In this course, discover how to leverage System Center Endpoint Protection to minimize malware incidents in the enterprise. Daniel Lachance begins the course by defining malware types, and explaining how to get Endpoint Protection up and running with System Center Configuration Manager. Next, he dives into creating antimalware policies and planning an update strategy. To wrap up, he covers monitoring, explaining how alerts and reports can be used to monitor the security health of devices. [Read more…]