Course Overview
Acquire the skills to make your data protection strategy successful with the Veritas Backup Exec 22: Administration course. The course is designed for the data protection professional tasked with deploying, configuring, maintaining, and managing a Backup Exec environment. The course covers Backup Exec concepts, how to back up and restore critical data, configure storage devices and media, and work with various Backup Exec agents and options, which protect applications like Microsoft Exchange, Microsoft SharePoint, Microsoft SQL, Microsoft 365, Active Directory, Cloud, Oracle, and Virtual environments.
Course Objectives
By the completion of this course, you will be able to:
• Describe the functionality and architecture of the Backup Exec.
• Install and upgrade to Backup Exec 22.
• Configure storage devices – Cloud-based storage and Network storage.
• Backup data to and restore data from disk, network, and the Cloud.
• Perform tape devices and tape management.
• Manage servers and jobs.
• Set backup and recovery settings and methods.
• Work with the Database Encryption Key.
• Perform online Disaster Recovery.
• Install the SDR disk creation wizard, create an SDR disk image, and recover a server with SDR.
• Back up a physical machine and convert to a virtual machine either simultaneously or on a schedule.
• Install, configure, and manage the Backup Exec Central Admin Server feature.
• Configure Backup Exec Deduplication Storage.
Prerequisites
You must have a basic working knowledge of administrating and configuring Windows Server 2016 and later platforms.
Basic working knowledge of the following applications is beneficial, but not required:
• Microsoft SQL Server
• Microsoft Exchange Server
• Microsoft SharePoint Portal Server
• Microsoft Hyper-V
• VMware virtual infrastructure.
• Oracle
• Cloud Technologies
• Microsoft 365
Target Audiance
- This course is designed for system administrators, system engineers, technical support personnel, consultants, backup administrators, backup operators, and others who are responsible for installing, configuring, managing, and monitoring Backup Exec 22.
Schedule Dates
Implementing Veritas Backup Exec 22: Administration Core Technologies
Implementing Veritas Backup Exec 22: Administration Core Technologies
Implementing Veritas Backup Exec 22: Administration Core Technologies
Implementing Veritas Backup Exec 22: Administration Core Technologies
Course Content
- Understanding the fundamentals and architecture of Backup Exec 22.
- Step-by-step guidance on installing and configuring Backup Exec 22 in Dubai environments.
- Designing efficient backup strategies tailored to Dubai's IT infrastructure and business requirements.
- Optimizing storage utilization and implementing best practices for data storage in Dubai.
- Developing robust disaster recovery plans specific to Dubai's business continuity needs.
- Utilizing Backup Exec 22's monitoring tools to ensure data protection and compliance in Dubai.
FAQs
Veritas Backup Exec 22 is a comprehensive data protection solution designed to safeguard critical business data. Dubai businesses must ensure data integrity, compliance, and continuity in the face of cyber threats, natural disasters, or human errors.
Veritas Backup Exec 22 employs robust encryption algorithms and compliance features to secure data during transmission and storage. It helps businesses in Dubai adhere to regional and international data protection regulations like GDPR and Dubai Data Law.
Key features include seamless integration with cloud platforms like Azure and AWS for offsite storage, flexible recovery options, automated backup scheduling, and advanced reporting capabilities tailored to meet the needs of Dubai businesses.
Yes, Veritas Backup Exec 22 offers customizable backup policies, support for various data types and storage environments, and scalable solutions suitable for small to enterprise-level businesses operating in Dubai across different industries.
Veritas Backup Exec 22 adapts to evolving IT infrastructures, supporting virtualization platforms like VMware and Hyper-V, as well as traditional physical servers, ensuring comprehensive data protection regardless of the infrastructure’s complexity.