Detailed Course Outline
Module 1: Compliance Solutions
- Data Compliance
- Challenges - High availability
- Backup and archive
- Disaster recovery
- Compliance
- Cloud integration
 
- Data compliance types - Data retention
- Data encryption
 
- Data protection solutions
- Compliance features
Module 2: ONTAP Data Retention
- SnapLock compliance software - SnapLock Compliance
- SnapLock Enterprise
 
- SnapLock architecture - Compliance clock
- Clock architecture
 
- SnapLock compliance volume
- SnapLock enterprise volume
- File types - Regular
- WORM
- WORM appendable
 
- SnapLock settings verification
- Protecting SnapLock volumes - Snapshot copies
- Replication
- SnapVault
 
- Advanced SnapLock features - Privileged delete feature
- Audit log
- Compliance administrator account
- SnapLock APIs
 
Module 3: ONTAP Key Management
- Key management - Centralized key management
- Compliance with mandates
- Investment protection
- OKM
- External Key Server (KMIP)
- Setup wizard
 
Module 4: ONTAP Data Encryption
- Storage encryption solutions
- ONTAP 9.1 - NetApp storage encryption (NSE)
- NetApp volume encryption (NVE)
- NetApp SANtricity full disk encryption (FDE)
 
- FIPS security levels
- Volume encryption demonstration - License
- OKM setup
- OKM backup
- Node keys
- Create encrypted volume
- SVM key
- Volume key
- Encrypt existing volume
- Decrypt volume
- Move encrypted volume
- Re-key encrypted volume
- Delete
 
LABS:
- Configure SnapLock for file retention
- Create aggregates that are compatible with SnapLock software
- Create SnapLock volumes
- Create SnapLock volume shares
- Manage a SnapLock enterprise volume
- Manage a SnapLock compliance volume
- Create a cluster peer relationship
- Create an SVM on cluster2
- Create an SVM peer relationship
- Create a SnapLock for SnapVault protection relationship
- Manage source and destination volumes
- Manage a SnapLock for SnapVault relationship
- Create an audit log
- Create a compliance administrator account
- Enable the privileged delete feature
- Delete WORM files by using the privileged delete feature
- Configure the onboard key manager
- Display the key management backup information
- Verify the creation of encryption keys for each node
