|
|
|
|
班级规模及环境--热线:4008699035 手机:15921673576( 微信同号) |
|
坚持小班授课,为保证培训效果,增加互动环节,每期人数限3到5人。 |
|
上课时间和地点 |
|
上课地点:【深圳分部】:电影大厦(地铁一号线大剧院站)/深圳大学成教院 【上海】:同济大学(沪西)/新城金郡商务楼(11号线白银路站) 【北京分部】:北京中山学院/福鑫大楼 【南京分部】:金港大厦(和燕路) 【武汉分部】:佳源大厦(高新二路) 【成都分部】:领馆区1号(中和大道) 【沈阳分部】:沈阳理工大学/六宅臻品 【郑州分部】:郑州大学/锦华大厦 【广州分部】:广粮大厦 【西安分部】:协同大厦 【石家庄分部】:河北科技大学/瑞景大厦
最近开课时间(周末班/连续班/晚班):请点击此处咨询在线客服 |
|
实验设备 |
|
☆资深工程师授课
☆注重质量
☆边讲边练
☆合格学员免费推荐工作
★实验设备请点击这儿查看★ |
|
质量保障 |
|
1、培训过程中,如有部分内容理解不透或消化不好,可免费在以后培训班中重听;
2、课程完成后,授课老师留给学员手机和Email,保障培训效果,免费提供课后答疑。
3、培训合格学员可享受免费推荐就业机会。 |
|
课程大纲 |
|
|
|
-
课程介绍:
Accelerated NCDABoot Camp Data ONTAP 8.0 7-Mode(ANCDA)课程是为从事NetApp的专业技术人员的职业发展而量身设计的高级存储技术课程。通过5天的培训帮助您通过 NS0-155NetApp Certified Data Management Administrator(NCDA)认证考试。
本课程将CIFS administrator、NFS administrator、SAN administrator、NetApp Protection Software Administration 4门高级进阶培训进行提炼,使您在最短的时候对Netapp存储的高级配置、解决方案和存储访问协议的细节有更深入的了解。
课程对象:
高级存储工程师,高级IT架构师,NetApp渠道合作伙伴和最终用户。
建议先参加Data ONTAP 7-Mode Administration培训,再参加此项进阶培训。
-
课程大纲:
:
第一章:
NCDA Overview
Explain the NCDA certification
Review key concepts from the Data ONTAP® 8.0 7-Mode Administration course
第二章:
NFS Overview
Define Network File System (NFS)
Differentiate between NFS protocol versions
Recognize the difference between stateless and stateful protocols
Describe how the storage system acts as an NFS file server
List the requirements of NFS
第三章:
NFS Setup
Configure Network File System (NFS) on a NetApp® storage system
Add Network Information Server (NIS) to manage users, groups, and name-to-IP resolution
Administer a storage system to perform Domain Name System (DNS) lookups
Configure a storage system to access a Lightweight Directory Access Protocol (LDAP) server to centrally manage users and groups
Set up PC-NFS and WebNFS environments to extend the reach of NFS
第四章:
Exports and Mounts
Identify exportable resources
Export and unexport resources to clients, subnets, and netgroups
Administer storage system with the exportfs command
Create mountpoints and mount exported resources on a client
Monitor the usage of exported resources
第五章:
CIFS Overview
Describe basic CIFS features
Describe the following network environments:
Microsoft® Windows® workgroup
Non-Windows workgroup
Windows domains
Describe how a storage system authenticates users in each server environment
Explain the advantages and disadvantages of each server environment
第六章:
CIFS Workgroups
License CIFS on a storage system
Join a storage system to a Windows® workgroup environment using the cifs setup command
Observe the results of cifs setup
Manage newly created configuration files for the CIFS workgroup environment
:
第七章:
CIFS Shares and Sessions
Display all shares available on the storage system
List the default shares
Configure a client machine to access any share
Identify the CIFS sessions established by accessing a share on the storage system
Add, modify, and delete shares
第八章:
CIFS Access Control
Create and manage local users for a storage system
Identify how to create a local group and make a local user a member of that group
Use the command-line interface, NetApp® System Manager or Microsoft® tools to add, delete, and modify access permissions of shares
Use Microsoft tools to add, delete, and modify access permissions of files and folders
第九章:
CIFS Domains
Terminate the CIFS service to prepare for CIFS domain configuration
Reconfigure the CIFS service for a Windows® domain
Identify the resulting files
Create domain users and add the domain users to a local storage system group
Set up Preferred Domain Controllers (DCs)
第十章:
NAS Multiprotocol
Determine and verify user mappings for CIFS users accessing UNIX® and MIXED volumes and qtrees
Determine and verify user mappings for UNIX users accessing NTFS and MIXED volumes and qtrees
第十一章:
NAS Troubleshooting
Locate options and configuration files that can be misconfigured on the storage system
Test for Domain Name System (DNS) resolution on both the storage system and the client
Use client-side tools to test the client configuration
Use storage system and client tools to isolate network system blockages
Recognize typical error messages and list commands to identify the source of the error messages
:
第十二章:
SAN Overview
Describe the differences between network-attached storage (NAS) and storage area network (SAN)
List the methods to implement a SAN environment
Define logical unit number, initiator, and target
Describe ports, worldwide node names, and worldwide port names
List the basic steps to implement a SAN
第十三章:
FC Connectivity
Describe multiple path implementation with Fibre Channel (FC) connectivity
Describe how to configure FC ports on Windows®, for Red Hat®, and NetApp® systems
Describe commands and utilities to identify the worldwide node name (WWNN) and worldwide port name (WWPN) on Windows, Red Hat, and NetApp systems
第十四章:
iSCSI Connectivity
Describe multiple path implementation with iSCSI connectivity
Configure network ports on Windows®, Red Hat ®, and NetApp® systems
Identify the worldwide node name (WWNN) on Windows, Red Hat, and NetApp systems
Set up and verify multiple path iSCSI connectivity between Windows, Red Hat, and NetApp systems
第十五章:
LUN Access
Describe the steps to allow a Windows® Server 2008 R2 initiator to access a LUN on a storage system
Describe the steps to allow a Red Hat® initiator to access a LUN on a storage system
第十六章:
Availability Overview
List the methods to back up and recover data for data availability
Describe the methods to ensure system availability
第十七章:
Snapshot Copies
Describe the function of Snapshot™ copies
Explain the benefits of Snapshot copies
Identify and execute Snapshot commands
Create and delete Snapshot copies
Configure and modify Snapshot options
Explain the importance of the .snapshot directory
Describe how disk space is allocated by a Snapshot copy for volumes and aggregates
Schedule Snapshot copies
Configure and manage the Snapshot reserve
第十八章:
SnapRestore
Explain how SnapRestore® technology works with Snapshot™ copies
Describe what SnapRestore reverts
Revert a volume or a file using SnapRestore
Explain how SnapRestore works with SnapMirror®
Describe the effects of SnapRestore on backup operations
第十九章:
SnapVault
Describe SnapVault® components and benefits
Configure SnapVault on primary and secondary systems
Administer SnapVault on primary and secondary systems
Describe the application-consistent backup feature available in Data ONTAP® 8.0 7-Mode
Restore data from secondary to primary systems
第二十章:
OSSV
Describe how Open Systems SnapVault® integrates with Data ONTAP® SnapVault
List Open Systems SnapVault advanced features
Configure and administer Open Systems SnapVault
Perform Open Systems SnapVault backup and restore operations
Troubleshoot and resolve Open Systems SnapVault transfer failures
第二十一章:
High-Availability
Define the high-availability controller configuration
Describe the three modes of high-availability operation with a high-availability pair
Analyze the effect on client protocols during failover and giveback operations
第二十二章:
MetroCluster
Describe a stretch MetroCluster environment
List the basic steps to implement a stretch MetroCluster
Describe a fabric-attached MetroCluster environment
List the basic steps to implement a fabric-attached MetroCluster
第二十三章:
SnapMirror
Explain the SnapMirror® Async, Sync, and Semi-Sync modes of operation
Describe how volume SnapMirror and qtree SnapMirror replicate data
Configure SnapMirror
Perform advanced SnapMirror operations
Explain SnapMirror performance impact
第二十四章:
Performance
Use Data ONTAP® tools to identify networking, disk I/O, FC loop saturation, and CPU bottlenecks using systat, stats, and perfstat
Discuss how increasing utilization can affect performance
Use the reallocate command to maintain performance
Use recommended techniques to optimize Data ONTAP configuration for SAN and NAS
|
|
|
|
|
|
Troubleshooting Java Applications
Classpath Errors
Class Loaders
Common Java Errors
Troubleshooting Servers
Native Libraries
Threading Architecture
Work Managers
Deadlocks
Overload Protection
Deployment Problems
Troubleshooting JDBC
Data Source Management
Diagnostics
Debug Flags
Connectivity Problems
Connection Leaks
Database Availability
Troubleshooting JMS
Management
MBean Hierarchy
Message Logging
Diagnostics
Debug Flags
Overload Protection
Lost Messages
Duplicate Messages
Troubleshooting Security
SSL Internals
Keystore Management
Debug Flags
Common SSL Problems
Certificate Validation
Embedded LDAP
Security Audit
Common LDAP Problems
Troubleshooting Node Manager
Internals
Security
Common Issues
Troubleshooting Clusters
Plug-in Configuration
OHS Overview
Plug-in Connectivity
Plug-in Diagnostics
Unicast Communication
Replication Debug Flags
Typical Replication Issues
|