Arrow Electronics, Inc.

Introduction to Rubrik Security Cloud

CODE: TPL_RUB-IRSC

LENGTH: 32 Hours (4 days)

PRICE: €2 950,00

Description

This course is designed for new Rubrik backup administrators or users who
want to learn how Rubrik Security Cloud can protect Data Center workloads.

High Level Overview
● Day 1 – Onboarding, Security, Upgrades, Organizations, SLA Domains
● Day 2 – Replication, Archival, Workload Foundations, Filesets, Microsoft SQL
● Day 3 – Oracle, SAP HANA, Managed Volumes, VMware vSphere, Nutanix AHV, Microsoft Hyper-V
● Day 4 – Reporting, Ransomware Monitoring, Rubrik Support, Elective Content

Programme

Course Agenda

Day 1
Interfaces
● Rubrik Security Cloud GUI
● API Overview
● CLI Overview
Security
● Cloud Access Controls
● Encryption
● Certificate Management
● User Authentication & Role-Based Access
o Local Users & TOTP
o Single Sign-on
● Auditing
● Tenant Organizations
Upgrades
● Options + Workflows
● Recommendations
● Non-CDM components
SLA Domains
● Configuration & Workflow
● Logic
● On-Demand Snapshots
● Changing Protection
● Additional Features
● Data Availability
Replication
● Configuration & Workflow
● Recovery (Local & Remote)
● Replication Pause

Day 2
Archival
● Configuration & Workflow
● Reader-Writer Model
● Cascading Archival
● Consolidation & Tiering
Workload
Foundations
● Host Management
● Snappable Protection & Hierarchies
● Snapshot Process
● Recovery Basics
● Basic Internal Concepts
Filesets
● Windows / Linux / NAS Filesets
● Backup & Recovery Workflows
● Volume Groups Overview
Microsoft SQL
● Configuration & Workflow
● Protection of Database & Transaction Logs
● Additional Features
● Recovery Options
● Monitoring
Day 3
Oracle
● Discovery Process
● Database & Log Protection
● Recovery & Cloning Options
SAP HANA ● Configuration & Workflow
● Version 2 Backup & Recovery
Managed Volumes ● Configuration & Connect
● Snapshot Operations
● Protection & Automation
● Recovery
VMware vSphere
● Configuration & Discovery
● Continuous Data Protection (CDP)
● VMware Tools vs Rubrik Backup Service
● Protection & Backup
● Recovery Options
Nutanix AHV ● Terminology & Configuration
● Protection & Recovery Workflows
Microsoft Hyper-V
● Terminology & Configuration
● Protection and Recovery Workflows
● Discovery and Protection via SCVMM


Day 4
Reporting
● Pre-configured Reports
● Report Customization
● Scheduling and Distribution
Ransomware
Monitoring
● Configure and Monitor Workloads
● Investigate and React to Anomalies
Rubrik Support
● Support Portal Overview
● How To Engage Support
● RSC User Impersonation
● Support Tunnel Access

Further Information

Technology Requirements
● Computer with stable internet connectivity
o Best experienced with a monitor resolution of 1080p or more
● Typically, hands-on labs are provided per person. However, in some
situations, students may be asked to share lab resources

Elective Content
As time permits, additional content may be covered to enhance or customize training
events. The Elective Content list below is not exhaustive and may be modified over time
and without notice.

Elective Content
Threat Hunting & Quarantine
● Indicators of Compromise
● Create and run Threat Hunt
● Review Results and Quarantine Snapshots
Sensitive
Data Discovery
● Configure Monitoring & Exclusions
● Track Changes Over Time
● Determine Exposure of Sensitive Data
Orchestrated
Application Recovery
● Create A Recovery Plan
● Test & Run Recovery Plans

Notes
Rubrik Security Cloud is an ever-evolving product offering and as such this document is
intended to provide a general guideline of the content to be expected during a training
event. The exact content may differ from event to event as Rubrik continually updates our
product line and available features.

Session Dates