Kód: VEE_ VMCE_12_3
DÉLKA: 32 Hours (4 DENNÍ)
CENA: Kč bez DPH 49 000,00
Kurz The Veeam® Backup & Replication™ v12.3: Configure, Manage and Recover je čtyřdenní technický kurz určený pro IT profesionály k načerpání znalostí jak konfigurovat, řídit a spravovat architekturu Veeam Backup & Replication. S využitím propracovaných praktických labů tento kurz rozvíjí schopnost pružně reagovat na různé krizové situace a scénáře obnovy a umožňuje administrátorům a inženýrům efektivně chránit a udržovat data v neustále se měnícím technickém a obchodním prostředí, což přináší konkrétní přínosy pro podniky v digitálním světě. Kurz popisuje produkt Veeam Backup & Replication v12.3, součást řešení ochrany Veeam Data Platform.
Theory/labs: 60/40
After completing this course, students will be able to:
• Describe Veeam security concepts
• Given a scenario, configure a backup job and a backup copy job
• Explain network-attached storage (NAS) backups and configuration
• Describe Veeam’s replication capabilities
• Determine appropriate use case for backups, replicas and/or continuous data protection
• Configure backup infrastructure components, including proxy and repository servers
• Given a scenario, evaluate when and how to apply immutability settings
• Given a scenario, recover data from backups
This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Backup & Replication v12.3 environment.
Students should have fundamental IT experience working with networking, servers, storage, cloud, virtualization and operating systems. To get the most out of this course, students should be familiar with the core fundamental concepts of Veeam Backup & Replication through handson experience.
Data protection strategies
Review of key data protection strategies that ensure the safety of your data.
Analysis of risks to data
Explore different risk scenarios, what risks do we face daily within our environment?
What is protected?
Review of Veeam Data Platform and introduction to the class scenario.
Security and protection considerations
Describe strategies and tools to secure the Veeam backup server to avoid unauthorized access and data leaks.
Protecting workloads
Efficiently protect VMware and Hyper-V virtual machines based on well-defined SLAs through the creation of backup jobs.
Deploying agents
Identify the use of protection groups to automate the installation of Veeam Agents and protecting workloads with agent backup jobs.
Unstructured data backup
List required components and features available to protect unstructured data.
Optimizing your backups
Analyze features and settings that allow backup storage optimization, faster backups and data consistency.
Immutability and hardened repositories
Describe backup data protection mechanisms to avoid premature deletion and unwanted modifications. Identify characteristics and deployment steps of Linux Hardened Repositories to achieve backup data immutability.
Backup infrastructure optimization
List deployment options and additional settings to improve general backup solution performance.
Replication
Describe use cases, architectures and features of replication jobs and continuous data protection (CDP) policies.
Backup copy jobs
Ensure recoverability and adhere to the 3-2-1 Rule with backup copy jobs.
Long-term retention
List different mechanisms for data archiving, including grandfather-father-son retention policies.
Scale-out Backup Repository™
Describe architecture, placement policies, data tiers and management of Scale-out Backup Repositories.
Move and copy backups with VeeaMover
Identify use cases for virtual machine and backup migrations with VeeaMover.
Recovery verification
Create automated tests to ensure recoverability from backups and replicas.Veeam Backup Enterprise Manager
Describe the use cases for Veeam Backup Enterprise Manager.
Incident Response Planning
Integrating Veeam Backup and Replication into your incident response plan.
Advanced recovery features
Explore some more in-depth recovery features of Veeam Backup and Replication.
Selecting the ideal recovery method
What are the implications of different recovery methods and selecting the correct recovery method.
Enacting a recovery
Get practice in recovering different recovery types with a variety of data types.
Malware Detection
Using Veeam’s malware detection capabilities.
Post-incident processes
Investigate post-incident activities.
Completion of this course satisfies the prerequisite for taking Veeam Certified Engineer (VMCE™) v12 exam.