For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation Veeam Backup and Replication v12

The Veeam Backup and Replication v12 training equips participants with the skills and knowledge necessary to configure, manage, and support a Veeam Backup & Replication v12 solution. Through hands-on exercises, administrators and engineers learn to effectively protect and manage data in an ever-evolving technical and business environment, delivering tangible benefits to organizations in the digital world.

Détails
Objectifs pédagogiques de la formation Veeam Backup and Replication v12
  • Describe Veeam's security concepts Configure backup jobs and backup copy jobs from a given scenario
  • Explain backups and network-attached storage (NAS) configuration
  • Describe Veeam's replication capabilities
  • Determine the appropriate use case for backups-replicas and/or continuous data protection
  • Configure backup infrastructure components-including proxy and repository servers
  • Evaluate when and how to apply immutability settings in a given scenario Recover data from backups in a given scenario

Qui devrait suivre cette formation Veeam Backup and Replication v12 ?

Public visé par la formation Veeam Backup and Replication v12

This Veeam course (VMCE) is designed for individuals responsible for configuring, managing, or supporting a Veeam v12 environment.  

Prérequis de la formation Veeam Backup and Replication v12

Participants should have fundamental IT experience in areas such as networking, servers, storage, cloud, virtualization, and operating systems.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation Veeam Backup and Replication v12


Module 1: Securing Your Backup Server

Describing strategies and tools to secure the Veeam backup server to prevent unauthorized access and data leaks.


Module 2: Application Consistency with Secure Authentication

Achieving consistent backups of virtual machines with applications while maintaining secure operating system authentication.


Module 3: Workload Protection

Effectively protecting VMware and Hyper-V virtual machines based on well-defined SLAs through the creation of backup jobs.


Module 4: Agent Deployment

Identifying the use of protection groups to automate the installation of Veeam agents and protect workloads with agent backup jobs.


Module 5: NAS Protection

Listing required components and available features to protect NAS solutions.


Module 6: Backup Optimization

Analyzing features and settings to optimize backup storage, accelerate backups, and ensure data consistency.


Module 7: Immutability

Describing mechanisms to protect backup data from premature deletions and unwanted modifications.


Module 8: Hardened Linux Repository

Identifying features and deployment steps of hardened Linux repositories to achieve backup data immutability.


Module 9: Object Storage Repositories

Describing use cases, benefits, and considerations for implementing object storage solutions as Veeam backup repositories.


Module 10: Backup Infrastructure Optimization

Listing deployment options and additional settings to improve overall backup solution performance.


Module 11: Replication

Describing use cases, architectures, and features of replication tasks and continuous data protection policies.


Module 12: Backup Copy Jobs

Ensuring recoverability and adhering to the 3-2-1 rule with backup copy job tasks.


Module 13: Long-Term Retention

Enumerating different data archiving mechanisms, including grandfather-father-son data retention policies.


Module 14: Scalable Backup Repository

Describing the architecture, placement policies, data tiers, and management of Scale-out Backup Repositories (SOBR).


Module 15: Moving and Copying Backups with VeeaMover

Identifying use cases for virtual machine and backup migrations with VeeaMover.


Module 16: Recovery Verification

Creating automated tests to ensure the recovery of backups and replicas.


Module 17: Veeam Backup Enterprise Manager

Describing use cases for Veeam Backup Enterprise Manager.


Module 18: Recovery Scenario - Virtual Machine Failure

Choosing from different methods to recover a virtual machine from backup.


Module 19: Recovery Scenario - Ransomware Attack

Safely restoring a server after a ransomware incident by analyzing volumes directly from backup.


Module 20: Recovery Scenario - Agent Restore

Exploring available options to restore data from agent backups.


Module 21: Recovery Scenario - Explorer Restore

Using Veeam Explorers to recover application items directly from image-level backups.


Module 22: Recovery Scenario - Guest File Recovery

Restoring guest OS files directly from image-level backups and various guest file systems.


Module 23: Recovery Scenario - Recovery from Replica

Listing steps and considerations for instantly recovering an entire file share from its backup.

 

Formations Similaires
CISA – Certified Information Systems Auditor Détails
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click