Data Protection and Management (DPM)

 

Resumen del Curso

Data Protection and Management (DPM) is a unique course that provides a comprehensive understanding of various data protection and availability solutions for modern data protection wherever data lives including Cloud, data center or edge devices. It enables participants to make informed decisions on data protection architecture and technologies in an increasingly complex IT environment, which is fast changing with the adoption of software-defined data center (SDDC) and Cloud, Big Data, Social, and Edge. This course provides a strong understanding of faulttolerant IT infrastructure, data backup, data deduplication, data replication, data archiving, and data migration and prepares participants for advanced data protection concepts, technologies, and processes. Participants will learn cloud-based data protection techniques, SDDC-specific data protection, and solutions for protecting Big Data, cloud and mobile device data. Moreover, the course covers the highly critical areas of data security including ransomware protection, cyber recovery as well as the emerging need for data management and data governance. This course takes an open approach to describe all the concepts and technologies, which are further illustrated and reinforced with Dell EMC related product examples.

Quién debería asistir

This course is intended for all audiences.

Prerrequisitos

  • To understand the content and successfully complete this course, a participant must have a basic knowledge of computer architecture, operating systems, networking, and databases.
  • Participants with experience in data protection management would also be able to assimilate the course material.

Objetivos del curso

Upon successful completion of this course, participants should be able to:

  • Explain data protection architecture and its building blocks
  • Evaluate fault-tolerance techniques in a data center
  • Describe data backup methods and data deduplication
  • Describe data replication, data archiving and data migration methods
  • Describe the data protection process in a software-defined data center
  • Articulate cloud-based data protection techniques
  • Describe various solutions for protecting Big Data, cloud and mobile device data
  • Describe security controls and management processes in a data protection environment

Contenido del curso

Introduction to Data Protection
  • Data Protection Primer
  • Data Center
  • Data Protection and Availability Solutions
Data Protection Architecture
  • Data Source – Application and Hypervisor
  • Data Source – Primary Storage
  • Protection Application and Storage
  • Data Security and Management
Fault-Tolerance Techniques
  • Fault-Tolerance Overview
  • Fault Tolerance Techniques – Compute and Network
  • Fault Tolerance Techniques – Storage
  • Fault Tolerance Techniques – Application and Availability Zone
Data Backup
  • Introduction to Backup
  • Backup Topologies
  • Backup Methods
Data Deduplication
  • Data Deduplication Overview
  • Deduplication Granularity and Methods
Replication
  • Data Replication Overview
  • Local Replication
  • Remote Replication
Data Archiving
  • Data Archiving Overview
  • Archiving Operation and Storage
Data Migration
  • SAN-Based Data Migration
  • NAS-Based Data Migration
  • Host-Based Data Migration
  • Application-Based Data Migration
Data Protection in Software-Defined Data Center
  • Software-Defined Data Center Overview
  • Software-Defined Compute, Storage, and Networking
  • Data Protection Process in SDDC
Cloud-based Data Protection
  • Cloud Computing Overview
  • Cloud-Based Data Protection
  • Cloud-Based Data Archiving
Protecting Big Data and Mobile Device Data
  • Big Data Overview
  • Protecting Big Data
  • Protecting Mobile Device
Securing Data Protection Environment
  • Overview of Data Security
  • Security Threats in Data Protection Environment
  • Security Controls in Data Protection Environment – 1
  • Security Controls in Data Protection Environment – 2
  • Cyber Recovery
Managing the Data Protection Environment
  • Introduction to Data Protection Management
  • Operations Management – 1
  • Operations Management – 2

Precios & Delivery methods

Entrenamiento en línea

Duración
4 días

Precio
  • Consulta precio y disponibilidad
Classroom training

Duración
4 días

Precio
  • Consulta precio y disponibilidad

Calendario

Por el momento no hay fechas programadas para este curso