INFORMATION STORAGE AND MANAGEMENT (ISM)
                     COURSE OVERVIEW
                     Information Storage and Management (ISM) is the only course of its kind to fill the knowledge
                     gap in understanding varied components of modern information storage infrastructure, including
                     virtual environments. It provides comprehensive learning of storage technology, which will
                     enable you to make more informed decisions in an increasingly complex IT environment. ISM
                     builds a strong understanding of underlying storage technologies and prepares you to learn
                     advanced concepts, technologies, and products. You will learn about the architectures, features,
                     and benefits of Intelligent Storage Systems; storage networking technologies such as FC-SAN,
                     IP-SAN, NAS, Object-based and unified storage; business continuity solutions such as backup,
                     replication, and archive; the increasingly critical area of information security; and the emerging
                     field of cloud computing. This unique, open course focuses on concepts and principles which are
                     further illustrated and reinforced with EMC examples.


                     SECTION1: STORAGE SYSTEM
                     Chapter 1: Introduction to Information Storage
                     This chapter introduces evolution of storage architecture, key data center elements,
                     virtualization, and cloud computing.

                     Chapter 2: Data center environment
                     This chapter details key data center elements – Host (or compute), connectivity, storage, and
                     application in both classic and virtual environments. It also focuses on components, addressing
                     scheme, and performance of mechanical and solid-state drives. This chapter also introduces
                     host access to storage via direct attached and network-based options.

                     Chapter 3: RAID
                     This chapter focuses on RAID implementations, techniques, and levels along with the impact of
                     RAID on application performance.

                     Chapter 4: Intelligent Storage system
                     This chapter details components of intelligent storage systems. It also covers virtual storage
                     provisioning and intelligent storage system implementations.

                     SECTION 2: STORAGE NETWORKING TECHNOLOGIES
                     Chapter 5: Fibre Channel Storage Area Network (FC SAN)
                     This chapter focuses on FC SAN components, connectivity options, and topologies including
                     access protection mechanism ‘zoning’. It also elaborates on FC protocol stack, addressing, and
                     other fabric services. SAN-based virtualization and VSAN technology is also covered here.

                     Chapter 6: IP SAN and Fibre Channel over Ethernet (FCoE)
                     This chapter covers iSCSI and FCIP protocols for storage access over IP network.
                     Converged protocol FCoE and its components are also detailed.

                     Chapter 7: Network Attached Storage (NAS)
                     This chapter focuses on file sharing technology using NAS and covers its benefits,
                     components, and implementations. File level storage virtualization is also discussed.

                     Chapter 8: Object based and Unified Storage
                     This chapter focuses on emerging areas of object-based storage and unified storage
                     solutions. Content addressed storage (CAS) as an implementation of object-based
                     solution is also covered.




EDUCATION SERVICES
SECTION 3: BACKUP. REPLICATION AND ARCHIVE

Chapter 9: Introduction to Business Continuity
This chapter focuses on information availability and business continuity solutions in both
virtualized and non-virtualized environments.

Chapter 10: Backup and Archive
This chapter focuses on backup and recovery in both virtualized and non-virtualized
environments.
It also covers deduplication technology to optimize data backups along with archival solutions to
address the fixed content storage requirements.

Chapter 11: Local Replication
This chapter focuses on local replication of data along with data restore and restart considerations.

Chapter 12: Remote Replication
This chapter focuses on remote replication technologies in virtualized and non-virtualized
environments.
It also covers three-site replication and continuous data replication options.

SECTION 4: CLOUD COMPUTING

Chapter 13: Cloud Computing
This chapter focuses on cloud computing, its benefits, characteristics, deployment models, and
services. It also covers cloud challenges and migration considerations.

SECTION 5: SECURING AND MANAGING STORAGE INFRASTRUCTURE

Chapter 14: Securing the Information Infrastructure
This chapter focuses on framework and domains of storage security along with covering security
implementation at storage networking. It also covers security in virtualized and cloud environments.
Chapter 15: Managing the Information Infrastructure
This chapter focuses on storage infrastructure monitoring and management. It covers storage
tiering, information lifecycle management (ILM), and cloud service management activities.



Faculty profile for success
Faculty who have been teaching courses on the following topics will have an added advantage in
successfully teaching the ISM course.
	 1.	 Computer architecture
	 2.	 Network administration
	 3.	 Operating systems, file systems, and data structures
	 4.	 Computer systems administration and integration
	 5.	 File systems and data structures

Student profile for success
Students who have completed courses on the following topics will have an added advantage in
comprehending the content of the ISM course.
	 1.	 Computer systems and architectures
	 2.	 Networking technologies
	 3.	 Operating system
	 4.	 Database Management Systems

Recommended year to offer the course
Senior year of undergraduate program in Computer Science, engineering, and
Information Technology
Senior year of postgraduate program – Computer Application, and computer
management
The knowledge you gain through the Information Storage and Management (ISM) ‘open’
course can be applied to impact business decisions in a variety of ways
 Key activities                                                                             Business Impact
           Explain the decisive role of information storage and                             Motivate business stakeholders and IT teams on the critical role of ‘information’
   1       management to the business.                                                      infrastructure. Business can strategically gain competitive advantage by successfully
                                                                                            managing the rapid growth of information.

           Understand key components of classic and virtualized                             Establish effective and efficient information storage and management
   2       information infrastructure and their requirements.                               infrastructure, which can play a critical role for the success of business.

           Explain intelligent storage systems architecture and                             Understanding various physical and logical components of storage subsystems
   3       working principles.                                                              and their behavior is critical for successful design of information infrastructure.

           Explain storage provisioning and RAID level                                      Efficient storage provisioning and RAID implementation to meet applications
   4       implementations based on application requirements.                               capacity, availability, and performance requirements guarantee high returns from
                                                                                            the information infrastructure.
                                                                                            With the globalization of business, data centers need to provide services
           Differentiate and deploy various storage networking                              24x7x365 to a variety of business applications and users. Implementing the
   5       solutions based on application requirements.                                     correct storage networking option such as FC SAN, IP SAN, NAS, and unified
                                                                                            storage solution is the most crucial part of meeting customers’ requirements.
                                                                                            Knowledge of essential components, protocols, and topologies enable IT
           Discuss FC SAN and IP SAN deployments for applications
   6       accessing storage using block level requests.
                                                                                            teams and administrators to deploy, consolidate, and run a storage area
                                                                                            network (SAN) that meets service levels required by applications.
                                                                                            Organizations need file sharing environments for sharing of data among
           Discuss NAS deployment for file and data sharing
                                                                                            different users and platforms. Understanding of NAS components, operations,
   7       for a collaborative development environment of
                                                                                            and implementation helps to deploy suitable file sharing infrastructure within
           organizations.
                                                                                            the organization.

                                                                                            Business continuity enables reduced downtime and performance impact on
           Perform high-level business continuity planning and
                                                                                            business applications. Having an appropriate business continuity strategy and
   8       decide on a suitable strategy to meet information
                                                                                            solution helps business to mitigate loss of millions of dollars and reputation in
           availability needs.
                                                                                            the market.

           Discuss backup, recovery, and archival requirements                              Shrinking backup windows, faster recovery requirements, and longer retention of
   9       and solutions for business- critical data.                                       data to meet business and regulatory requirements drive optimization of backups
                                                                                            using deduplication and proper archival strategy.

           Explain various replication solutions to meet                                     Formulate and deploy necessary local and remote replication solutions to
  10       different business continuity needs.                                              ensure business continuity during anticipated/unforeseen disasters.

                                                                                            Needs and benefits of cloud computing must be clear and consistent to the business
           Discuss benefits of cloud computing and deploy
                                                                                            and IT. Depending on the business requirement, IT teams must propose a balanced
  11       effective cloud computing deployment model and
                                                                                            approach in terms of various deployment models (private, public, and hybrid) and
           service offerings for businesses /IT organizations.
                                                                                            services offerings (SaaS, PaaS, and IaaS).

           Understand and address security concerns and                                      Security is a prominent concern in IT overall. Further virtualization and cloud
  12       solution for information infrastructure.                                          computing introduces unique security challenges that need to be identified
                                                                                             and addressed.
           Perform monitoring and management of
 13        information infrastructure.
                                                                                             Managing infrastructure is key to achieving business goals and service levels.

    2
EMC , EMC, EMC Proven, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are
the property of their respective owners. © Copyright 2012 EMC Corporation. All rights reserved. Published in the USA. 01/12


 EMC Corporation
 Hopkinton, Massachusetts 01748-9103
 1-508-435-1000 In North America 1-866-464-7381
 www.EMC.com

Information Storage and Management

  • 1.
    INFORMATION STORAGE ANDMANAGEMENT (ISM) COURSE OVERVIEW Information Storage and Management (ISM) is the only course of its kind to fill the knowledge gap in understanding varied components of modern information storage infrastructure, including virtual environments. It provides comprehensive learning of storage technology, which will enable you to make more informed decisions in an increasingly complex IT environment. ISM builds a strong understanding of underlying storage technologies and prepares you to learn advanced concepts, technologies, and products. You will learn about the architectures, features, and benefits of Intelligent Storage Systems; storage networking technologies such as FC-SAN, IP-SAN, NAS, Object-based and unified storage; business continuity solutions such as backup, replication, and archive; the increasingly critical area of information security; and the emerging field of cloud computing. This unique, open course focuses on concepts and principles which are further illustrated and reinforced with EMC examples. SECTION1: STORAGE SYSTEM Chapter 1: Introduction to Information Storage This chapter introduces evolution of storage architecture, key data center elements, virtualization, and cloud computing. Chapter 2: Data center environment This chapter details key data center elements – Host (or compute), connectivity, storage, and application in both classic and virtual environments. It also focuses on components, addressing scheme, and performance of mechanical and solid-state drives. This chapter also introduces host access to storage via direct attached and network-based options. Chapter 3: RAID This chapter focuses on RAID implementations, techniques, and levels along with the impact of RAID on application performance. Chapter 4: Intelligent Storage system This chapter details components of intelligent storage systems. It also covers virtual storage provisioning and intelligent storage system implementations. SECTION 2: STORAGE NETWORKING TECHNOLOGIES Chapter 5: Fibre Channel Storage Area Network (FC SAN) This chapter focuses on FC SAN components, connectivity options, and topologies including access protection mechanism ‘zoning’. It also elaborates on FC protocol stack, addressing, and other fabric services. SAN-based virtualization and VSAN technology is also covered here. Chapter 6: IP SAN and Fibre Channel over Ethernet (FCoE) This chapter covers iSCSI and FCIP protocols for storage access over IP network. Converged protocol FCoE and its components are also detailed. Chapter 7: Network Attached Storage (NAS) This chapter focuses on file sharing technology using NAS and covers its benefits, components, and implementations. File level storage virtualization is also discussed. Chapter 8: Object based and Unified Storage This chapter focuses on emerging areas of object-based storage and unified storage solutions. Content addressed storage (CAS) as an implementation of object-based solution is also covered. EDUCATION SERVICES
  • 2.
    SECTION 3: BACKUP.REPLICATION AND ARCHIVE Chapter 9: Introduction to Business Continuity This chapter focuses on information availability and business continuity solutions in both virtualized and non-virtualized environments. Chapter 10: Backup and Archive This chapter focuses on backup and recovery in both virtualized and non-virtualized environments. It also covers deduplication technology to optimize data backups along with archival solutions to address the fixed content storage requirements. Chapter 11: Local Replication This chapter focuses on local replication of data along with data restore and restart considerations. Chapter 12: Remote Replication This chapter focuses on remote replication technologies in virtualized and non-virtualized environments. It also covers three-site replication and continuous data replication options. SECTION 4: CLOUD COMPUTING Chapter 13: Cloud Computing This chapter focuses on cloud computing, its benefits, characteristics, deployment models, and services. It also covers cloud challenges and migration considerations. SECTION 5: SECURING AND MANAGING STORAGE INFRASTRUCTURE Chapter 14: Securing the Information Infrastructure This chapter focuses on framework and domains of storage security along with covering security implementation at storage networking. It also covers security in virtualized and cloud environments. Chapter 15: Managing the Information Infrastructure This chapter focuses on storage infrastructure monitoring and management. It covers storage tiering, information lifecycle management (ILM), and cloud service management activities. Faculty profile for success Faculty who have been teaching courses on the following topics will have an added advantage in successfully teaching the ISM course. 1. Computer architecture 2. Network administration 3. Operating systems, file systems, and data structures 4. Computer systems administration and integration 5. File systems and data structures Student profile for success Students who have completed courses on the following topics will have an added advantage in comprehending the content of the ISM course. 1. Computer systems and architectures 2. Networking technologies 3. Operating system 4. Database Management Systems Recommended year to offer the course Senior year of undergraduate program in Computer Science, engineering, and Information Technology Senior year of postgraduate program – Computer Application, and computer management
  • 3.
    The knowledge yougain through the Information Storage and Management (ISM) ‘open’ course can be applied to impact business decisions in a variety of ways Key activities Business Impact Explain the decisive role of information storage and Motivate business stakeholders and IT teams on the critical role of ‘information’ 1 management to the business. infrastructure. Business can strategically gain competitive advantage by successfully managing the rapid growth of information. Understand key components of classic and virtualized Establish effective and efficient information storage and management 2 information infrastructure and their requirements. infrastructure, which can play a critical role for the success of business. Explain intelligent storage systems architecture and Understanding various physical and logical components of storage subsystems 3 working principles. and their behavior is critical for successful design of information infrastructure. Explain storage provisioning and RAID level Efficient storage provisioning and RAID implementation to meet applications 4 implementations based on application requirements. capacity, availability, and performance requirements guarantee high returns from the information infrastructure. With the globalization of business, data centers need to provide services Differentiate and deploy various storage networking 24x7x365 to a variety of business applications and users. Implementing the 5 solutions based on application requirements. correct storage networking option such as FC SAN, IP SAN, NAS, and unified storage solution is the most crucial part of meeting customers’ requirements. Knowledge of essential components, protocols, and topologies enable IT Discuss FC SAN and IP SAN deployments for applications 6 accessing storage using block level requests. teams and administrators to deploy, consolidate, and run a storage area network (SAN) that meets service levels required by applications. Organizations need file sharing environments for sharing of data among Discuss NAS deployment for file and data sharing different users and platforms. Understanding of NAS components, operations, 7 for a collaborative development environment of and implementation helps to deploy suitable file sharing infrastructure within organizations. the organization. Business continuity enables reduced downtime and performance impact on Perform high-level business continuity planning and business applications. Having an appropriate business continuity strategy and 8 decide on a suitable strategy to meet information solution helps business to mitigate loss of millions of dollars and reputation in availability needs. the market. Discuss backup, recovery, and archival requirements Shrinking backup windows, faster recovery requirements, and longer retention of 9 and solutions for business- critical data. data to meet business and regulatory requirements drive optimization of backups using deduplication and proper archival strategy. Explain various replication solutions to meet Formulate and deploy necessary local and remote replication solutions to 10 different business continuity needs. ensure business continuity during anticipated/unforeseen disasters. Needs and benefits of cloud computing must be clear and consistent to the business Discuss benefits of cloud computing and deploy and IT. Depending on the business requirement, IT teams must propose a balanced 11 effective cloud computing deployment model and approach in terms of various deployment models (private, public, and hybrid) and service offerings for businesses /IT organizations. services offerings (SaaS, PaaS, and IaaS). Understand and address security concerns and Security is a prominent concern in IT overall. Further virtualization and cloud 12 solution for information infrastructure. computing introduces unique security challenges that need to be identified and addressed. Perform monitoring and management of 13 information infrastructure. Managing infrastructure is key to achieving business goals and service levels. 2 EMC , EMC, EMC Proven, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2012 EMC Corporation. All rights reserved. Published in the USA. 01/12 EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com