Training Micro Focus

Training goals dlearning

code: DP120-10 | version: 10

Data Protector 10 is the first major release for 3 years, and marks a huge moment in the Data Protector history with the introduction of the first phase of the new web user interface, along with huge changes to the underlying security model and many more improvements detailed in the product announcements and release notes.  

Data Protector 10.x course provides the essential knowledge to enable storage administrators to configure and manage Data Protector software. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations.

Upon successful completion of this course, you should be able to:

  • Install and distribute Data Protector Software in your environment
  • Configure the Data Protector Software product
  • Configure your tape and disk-based backup solutions for use with Data Protector Software
  • Use Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command line
  • Manage the Data Protector software Internal Database (IDB)
  • Create custom reports and notification procedures
  • Secure your installation with secure communication
  • Prepare your client to recover from a disaster situation
  • Prepare your backup environment for disaster situation
  • Understand the Data Protector processes and perform basic troubleshooting of your installation 

Audience/Job Roles

Storage and system administrators using Data Protector software, System Engineers, Consultants, Project Managers, Professional Services, and Sales.

Conspect Show list

  1. Course Overview
    • Identify the contents and objectives of the course
    • Define the class schedule and class logistics
    • Identify the related courses
    • Discuss the lab environment details
  2. daptive Backup and Recovery Solutions
    • Understand and explain Adaptive Backup and Recovery strategy
  3. Data Protector Architecture
    • Explain the Data Protector architecture
    • Explain the Data Protector cell concept
    • Explain the Data Protector client server architecture
    • Plan the layout for a Data Protector installation
  4. Data Protector Installation
    • Plan for the installation of Data Protector
    • Explain the installation sequence
    • Install the Data Protector Cell Manager
    • Explain the client installation concept
    • Distribute Data Protector agent components to client systems
    • Export and import Data Protector clients
    • Discuss the Data Protector upgrade process
  5. Licensing and Product Structure
    • Explain the two Data Protector licensing models
    • Describe the Data Protector Product structure
    • Configure and use the Data Protector license reporting
  6. Backup Devices
    • Name and describe the configurable backup devices
    • Describe the concepts of logical devices
    • Configure and manage disk-based backup devices
    • Configure and manage tape-based backup devices
    • Use the Data Protector CLI to check the devices
  7. Media Management
    • Describe the concepts of Media Management in Data Protector
    • Configure Media Pools and assign media to it
    • Exchange media with different Data Protector cells using Media Export/Import
    • Implement Vaulting using multiple Media Pools
  8. Backup Specification
    • Create and generate backup specifications
    • Adjust all the options that control the execution of a backup job
    • Explore advanced backup capabilities, such as Load Balancing or Device Mirroring
    • Schedule backup specification using the new web-based scheduler
    • Explain the backup processing flow
  9. Restoring Capabilities
    • Use the restore capabilities in Data Protector
    • Perform the session and object restores
    • Perform the single or parallel restores
    • Use the restore context in Data Protector GUI
  10. Sessions, Reports, and Notifications
    • Monitor the running sessions through DP GUI or CLI
    • Browse for sessions that are performed in the past
    • Explain the Data Protectors Reporting features
    • Configure the reports within a report group and execute it
    • Configure and modify the Data Protector notifications
  11. Copying and Verifying Media and Objects
    • Create copies of the backup media through Media Copy
    • Create copies of the selected objects through Object Copy
    • Verify your data using the Media and Object Verification sessions
  12. Internal Database
    • Explain the concept of an Internal Database (IDB)
    • Describe the architecture of an IDB
    • Perform maintenance and administration tasks on the IDB
    • Backup and restore the IDB
    • Configure IDB-related reports and notifications
    • Run a disaster recovery (DR) of IDB
  13. Deduplication
    • Explain the deduplication technology
    • Describe the different Data Protector deduplication configurations
    • Configure a B2D device for hardware and software deduplication in Data Protector
    • Configure a backup specification with deduplication
    • Configure an Object Replication between the deduplication devices
  14. Access Control and Security
    • Control user access to the cell
    • Manage user groups in the cell
    • Configure user restrictions
    • Manage network access to the cell
    • Secure the Data Protector cell
  15. Disaster Recovery
    • List the Data Protector methods to perform a Disaster Recovery
    • Explain the four phases to recover a system from a disaster
    • Perform a Disaster Recovery using Enhanced Automated Disaster Recovery (EADR)
  16. Auto Replication Sync
    • Explain the concept of Auto Replication Sync
    • Explain the foreign Cell Manager import method
    • Describe the Automated Replication Synchronization (ARS) device and the replication job configuration
  17. Data Protector Patch Installation
    • Explain the Data Protector strategies to address the product issues and limitations
    • Download and install the Data Protector General Release (GR) patches
    • Query the Data Protector clients to view a list of installed Data Protector fixes
  18. Troubleshooting
    • Identify various Data Protector log files
    • Enable the debug option
    • Explain the process to collect and pack the debug files
    • Configure and run the Data Protector health check
    • Perform a basic troubleshooting
Download conspect training as PDF

Additional information

Prerequisites

To be successful in this course, you should have the following prerequisites or knowledge:

  • System and Network Administration or equivalent experience
Difficulty level
Duration 4 days
Certificate

The participants will obtain certificates signed by Micro Focus (course completion). 

This course prepares you also for such related Micro Focus certification exam: ATP - Data Protector v10 EXAM 

Trainer

Authorized Micro Focus Trainer

Other training Micro Focus | Data Protector

Training thematically related

IT Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

2880 USD

FORM OF TRAINING ?

 

TRAINING MATERIALS ?

 

SELECT TERM TRAINING

    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment
close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit dlearning.eu site

close

Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.