Outages are never a good thing, but these unfortunate incidents must be managed and quantified in relation to their organizational impact. In this video, you’ll learn about calculating uptime and the metrics used when quantifying recovery times.
The fundamentals of security are broadly defined in the areas of confidentiality, integrity, and availability.
If you’re putting together a disaster recovery process, you have a lot of options for your DR site. In this video, you’ll learn the advantages and disadvantages of a cold site, a hot site, and a warm site.
How can you maintain uptime, even when your hardware fails? In this video, you’ll learn about high availability, redundancy and fault tolerance, hard drive RAID technologies, and server clustering.
Backing up your data is one of the most important aspects of your organization’s security policy. In this video, you’ll learn about backup strategies, types of backups, and security concerns associated with onsite and offsite backups.
What are your plans when a disaster strikes? In this video, you’ll learn about disaster recovery planning, contingency methods, and some best-practices for disaster recovery contingency planning.
Today’s generation of botnets have provided the bad guys with lots of money and access to millions of Internet-connected computers.
A logic bomb is not only quite stealthy, but the resulting digital explosion can cause massive damage to your infrastructure.
Rootkits are extremely nasty, especially since they make themselves invisible to the operating system. In this video, you’ll learn about rootkits and how you can find and remove these stealthy pieces of malware.
Trojans are the sneakiest of computer attacks, and they often leave backdoors open for other malware to use. In this video, you’ll learn about Trojans and backdoors, and we’ll infect one of our own computers to show you how they work.