Detailed Course Outline
Module 1: Compliance Solutions
- Data Compliance
 - Challenges 
- High availability
 - Backup and archive
 - Disaster recovery
 - Compliance
 - Cloud integration
 
 - Data compliance types 
- Data retention
 - Data encryption
 
 - Data protection solutions
 - Compliance features
 
Module 2: ONTAP Data Retention
- SnapLock compliance software 
- SnapLock Compliance
 - SnapLock Enterprise
 
 - SnapLock architecture 
- Compliance clock
 - Clock architecture
 
 - SnapLock compliance volume
 - SnapLock enterprise volume
 - File types 
- Regular
 - WORM
 - WORM appendable
 
 - SnapLock settings verification
 - Protecting SnapLock volumes 
- Snapshot copies
 - Replication
 - SnapVault
 
 - Advanced SnapLock features 
- Privileged delete feature
 - Audit log
 - Compliance administrator account
 - SnapLock APIs
 
 
Module 3: ONTAP Key Management
- Key management 
- Centralized key management
 - Compliance with mandates
 - Investment protection
 - OKM
 - External Key Server (KMIP)
 - Setup wizard
 
 
Module 4: ONTAP Data Encryption
- Storage encryption solutions
 - ONTAP 9.1 
- NetApp storage encryption (NSE)
 - NetApp volume encryption (NVE)
 - NetApp SANtricity full disk encryption (FDE)
 
 - FIPS security levels
 - Volume encryption demonstration 
- License
 - OKM setup
 - OKM backup
 - Node keys
 - Create encrypted volume
 - SVM key
 - Volume key
 - Encrypt existing volume
 - Decrypt volume
 - Move encrypted volume
 - Re-key encrypted volume
 - Delete
 
 
LABS:
- Configure SnapLock for file retention
 - Create aggregates that are compatible with SnapLock software
 - Create SnapLock volumes
 - Create SnapLock volume shares
 - Manage a SnapLock enterprise volume
 - Manage a SnapLock compliance volume
 - Create a cluster peer relationship
 - Create an SVM on cluster2
 - Create an SVM peer relationship
 - Create a SnapLock for SnapVault protection relationship
 - Manage source and destination volumes
 - Manage a SnapLock for SnapVault relationship
 - Create an audit log
 - Create a compliance administrator account
 - Enable the privileged delete feature
 - Delete WORM files by using the privileged delete feature
 - Configure the onboard key manager
 - Display the key management backup information
 - Verify the creation of encryption keys for each node