Data Protection and Management (DPM) – Perfil

Esquema Detallado del Curso

Introduction to Data Protection
  • Data Protection Primer
  • Data Center
  • Data Protection and Availability Solutions
Data Protection Architecture
  • Data Source – Application and Hypervisor
  • Data Source – Primary Storage
  • Protection Application and Storage
  • Data Security and Management
Fault-Tolerance Techniques
  • Fault-Tolerance Overview
  • Fault Tolerance Techniques – Compute and Network
  • Fault Tolerance Techniques – Storage
  • Fault Tolerance Techniques – Application and Availability Zone
Data Backup
  • Introduction to Backup
  • Backup Topologies
  • Backup Methods
Data Deduplication
  • Data Deduplication Overview
  • Deduplication Granularity and Methods
Replication
  • Data Replication Overview
  • Local Replication
  • Remote Replication
Data Archiving
  • Data Archiving Overview
  • Archiving Operation and Storage
Data Migration
  • SAN-Based Data Migration
  • NAS-Based Data Migration
  • Host-Based Data Migration
  • Application-Based Data Migration
Data Protection in Software-Defined Data Center
  • Software-Defined Data Center Overview
  • Software-Defined Compute, Storage, and Networking
  • Data Protection Process in SDDC
Cloud-based Data Protection
  • Cloud Computing Overview
  • Cloud-Based Data Protection
  • Cloud-Based Data Archiving
Protecting Big Data and Mobile Device Data
  • Big Data Overview
  • Protecting Big Data
  • Protecting Mobile Device
Securing Data Protection Environment
  • Overview of Data Security
  • Security Threats in Data Protection Environment
  • Security Controls in Data Protection Environment – 1
  • Security Controls in Data Protection Environment – 2
  • Cyber Recovery
Managing the Data Protection Environment
  • Introduction to Data Protection Management
  • Operations Management – 1
  • Operations Management – 2