Data Protection and Management (DPM) – Perfil
Esquema Detallado del Curso
Introduction to Data Protection
- Data Protection Primer
- Data Center
- Data Protection and Availability Solutions
Data Protection Architecture
- Data Source – Application and Hypervisor
- Data Source – Primary Storage
- Protection Application and Storage
- Data Security and Management
Fault-Tolerance Techniques
- Fault-Tolerance Overview
- Fault Tolerance Techniques – Compute and Network
- Fault Tolerance Techniques – Storage
- Fault Tolerance Techniques – Application and Availability Zone
Data Backup
- Introduction to Backup
- Backup Topologies
- Backup Methods
Data Deduplication
- Data Deduplication Overview
- Deduplication Granularity and Methods
Replication
- Data Replication Overview
- Local Replication
- Remote Replication
Data Archiving
- Data Archiving Overview
- Archiving Operation and Storage
Data Migration
- SAN-Based Data Migration
- NAS-Based Data Migration
- Host-Based Data Migration
- Application-Based Data Migration
Data Protection in Software-Defined Data Center
- Software-Defined Data Center Overview
- Software-Defined Compute, Storage, and Networking
- Data Protection Process in SDDC
Cloud-based Data Protection
- Cloud Computing Overview
- Cloud-Based Data Protection
- Cloud-Based Data Archiving
Protecting Big Data and Mobile Device Data
- Big Data Overview
- Protecting Big Data
- Protecting Mobile Device
Securing Data Protection Environment
- Overview of Data Security
- Security Threats in Data Protection Environment
- Security Controls in Data Protection Environment – 1
- Security Controls in Data Protection Environment – 2
- Cyber Recovery
Managing the Data Protection Environment
- Introduction to Data Protection Management
- Operations Management – 1
- Operations Management – 2