Detailed Course Outline
Module 1: Compliance Solutions
- Data Compliance
- Challenges
- High availability
- Backup and archive
- Disaster recovery
- Compliance
- Cloud integration
- Data compliance types
- Data retention
- Data encryption
- Data protection solutions
- Compliance features
Module 2: ONTAP Data Retention
- SnapLock compliance software
- SnapLock Compliance
- SnapLock Enterprise
- SnapLock architecture
- Compliance clock
- Clock architecture
- SnapLock compliance volume
- SnapLock enterprise volume
- File types
- Regular
- WORM
- WORM appendable
- SnapLock settings verification
- Protecting SnapLock volumes
- Snapshot copies
- Replication
- SnapVault
- Advanced SnapLock features
- Privileged delete feature
- Audit log
- Compliance administrator account
- SnapLock APIs
Module 3: ONTAP Key Management
- Key management
- Centralized key management
- Compliance with mandates
- Investment protection
- OKM
- External Key Server (KMIP)
- Setup wizard
Module 4: ONTAP Data Encryption
- Storage encryption solutions
- ONTAP 9.1
- NetApp storage encryption (NSE)
- NetApp volume encryption (NVE)
- NetApp SANtricity full disk encryption (FDE)
- FIPS security levels
- Volume encryption demonstration
- License
- OKM setup
- OKM backup
- Node keys
- Create encrypted volume
- SVM key
- Volume key
- Encrypt existing volume
- Decrypt volume
- Move encrypted volume
- Re-key encrypted volume
- Delete
LABS:
- Configure SnapLock for file retention
- Create aggregates that are compatible with SnapLock software
- Create SnapLock volumes
- Create SnapLock volume shares
- Manage a SnapLock enterprise volume
- Manage a SnapLock compliance volume
- Create a cluster peer relationship
- Create an SVM on cluster2
- Create an SVM peer relationship
- Create a SnapLock for SnapVault protection relationship
- Manage source and destination volumes
- Manage a SnapLock for SnapVault relationship
- Create an audit log
- Create a compliance administrator account
- Enable the privileged delete feature
- Delete WORM files by using the privileged delete feature
- Configure the onboard key manager
- Display the key management backup information
- Verify the creation of encryption keys for each node