Courses

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • HP Adaptive Backup and Recovery Solutions
  • Chapter - 1.1
  • Data Protector 9.0
  • Chapter - 1.2
  • HP Backup Navigator
  • Chapter - 1.3
  • Data Protector Management pack
  • Chapter - 2
  • HP Data Protector Architecture
  • Chapter - 2.1
  • Backup and Replication Methods
  • Chapter - 2.2
  • The Cell Concept
  • Chapter - 2.3
  • Data Protector Architecture
  • Chapter - 2.4
  • Cell Manager and Installation Server
  • Chapter - 2.5
  • Disk, Media and Integration Agents
  • Chapter - 2.6
  • Internal Database
  • Chapter - 2.7
  • Typical Data Protector session
  • Chapter - 2.8
  • Data Protector tuning
  • Chapter - 3
  • Licensing and Product Structure
  • Chapter - 3.1
  • Data Protector licensing
  • Chapter - 3.2
  • Product Structure overview
  • Chapter - 3.3
  • License Reporting and checking
  • Chapter - 4
  • Quick Start
  • Chapter - 4.1
  • Concept Backup Specification
  • Chapter - 4.2
  • Configure Media Pool and Device
  • Chapter - 4.3
  • Configure and run a Backup
  • Chapter - 4.4
  • Monitor the Backup session
  • Chapter - 4.5
  • Start a Restore
  • Chapter - 4.6
  • Run a Single Session Report
  • Chapter - 5
  • HP Data Protector Software Installation
  • Chapter - 5.1
  • Installation Overview, Planning, and Methods
  • Chapter - 5.2
  • Cell Manager Installation on Windows
  • Chapter - 5.3
  • Cell Manager Installation on Unix
  • Chapter - 5.4
  • Client Push Installation
  • Chapter - 5.5
  • Export and Import of Clients
  • Chapter - 5.6
  • Adding Components to Clients
  • Chapter - 6
  • Upgrade
  • Chapter - 6.1
  • Upgrade Overview
  • Chapter - 6.2
  • Supported Upgrade Paths
  • Chapter - 6.3
  • Upgrading a Windows Cell Manager
  • Chapter - 6.4
  • Upgrading a Unix Cell Manager
  • Chapter - 6.5
  • Migrating the Cell Manager to an altered stage
  • Chapter - 7
  • Media Management
  • Chapter - 7.1
  • Media Pool concept
  • Chapter - 7.2
  • Media Pool Properties
  • Chapter - 7.3
  • Creating a Media Pool
  • Chapter - 7.4
  • Free Pool Concept and Implementation
  • Chapter - 7.5
  • Medium properties
  • Chapter - 7.6
  • Location Tracking and Priority
  • Chapter - 7.7
  • Formatting Tape Media
  • Chapter - 7.8
  • Vaulting with Media Pools
  • Chapter - 8
  • Backup Device
  • Chapter - 8.1
  • Overview
  • Chapter - 8.2
  • Logical Device concept
  • Chapter - 8.3
  • Data Protector Tape Format
  • Chapter - 8.4
  • Configure Tape based Storage Devices
  • Chapter - 8.5
  • Configure Disk-based Storage Devices
  • Chapter - 8.6
  • De-duplication Devices
  • Chapter - 8.7
  • Device and Library Tools
  • Chapter - 9
  • Backup
  • Chapter - 9.1
  • Backup Specification Types
  • Chapter - 9.2
  • Backup Features
  • Chapter - 9.3
  • Static and Dynamic Device Allocation
  • Chapter - 9.4
  • Load Balancing – Object Allocation
  • Chapter - 9.5
  • Backup Mirroring
  • Chapter - 9.6
  • Create and start a Backup Specification
  • Chapter - 9.7
  • The Backup Process Flow
  • Chapter - 9.8
  • Monitor the backup session
  • Chapter - 9.9
  • Restart failed Backups
  • Chapter - 10
  • Advanced Scheduler
  • Chapter - 10.1
  • Schedule a Backup
  • Chapter - 10.2
  • Manage missed Job Executions
  • Chapter - 11
  • Restore
  • Chapter - 11.1
  • Performing Restores
  • Chapter - 11.2
  • Restore Sequence
  • Chapter - 11.3
  • Object and Session Restore
  • Chapter - 11.4
  • Single or Parallel Restore
  • Chapter - 11.5
  • Checkpoint Restore
  • Chapter - 12
  • Monitoring, Reporting, and Notifications
  • Chapter - 12.1
  • Monitoring and Reporting
  • Chapter - 12.2
  • Session Monitoring
  • Chapter - 12.3
  • Report Categories and Delivery Methods
  • Chapter - 12.4
  • Configure and schedule Reports
  • Chapter - 12.5
  • Web Reporting Interface
  • Chapter - 12.6
  • Default Notification overview
  • Chapter - 12.7
  • Adding Notifications
  • Chapter - 13
  • Media and Object Replication
  • Chapter - 13.1
  • Interactive Media Copy
  • Chapter - 13.2
  • Automated Media Operation
  • Chapter - 14
  • Internal Database (IDB)
  • Chapter - 14.1
  • Concept Embedded database
  • Chapter - 14.2
  • Architecture
  • Chapter - 14.3
  • IDB Directory Structure
  • Chapter - 14.4
  • Internal Database Size Limits
  • Chapter - 14.5
  • Administration Tasks
  • Chapter - 14.6
  • Manage IDB Grow
  • Chapter - 14.7
  • IDB Maintenance
  • Chapter - 15
  • Security
  • Chapter - 15.1
  • Access control
  • Chapter - 15.2
  • User Groups and User Rights
  • Chapter - 15.3
  • Adding Users and Groups
  • Chapter - 15.4
  • User Restrictions
  • Chapter - 15.5
  • LDAP Integration
  • Chapter - 15.6
  • Client and Cell Security
  • Chapter - 15.7
  • Inet Impersonation
  • Chapter - 15.8
  • Changing the Web Interface Password
  • Chapter - 16
  • Auditing
  • Chapter - 16.1
  • Auditing Overview
  • Chapter - 16.2
  • Backup session auditing
  • Chapter - 16.3
  • Enhanced Event Logging
  • Chapter - 17
  • Disaster Recovery
  • Chapter - 17.1
  • Disaster Recovery methods
  • Chapter - 17.2
  • Disaster Recovery phases
  • Chapter - 17.3
  • Create a Disaster Recovery Image
  • Chapter - 17.4
  • Booting the Recovery Image
  • Chapter - 17.5
  • Using the Recovery Progress Monitor
  • Chapter - 17.6
  • Disaster Recovery on Dissimilar Hardware
  • Chapter - 18
  • Troubleshooting
  • Chapter - 18.1
  • Log and Trace Files
  • Chapter - 18.2
  • Debug Traces Generation
  • Chapter - 18.3
  • Debug Log Collector
  • Chapter - 18.4
  • Troubleshoot Network issues
  • Chapter - 18.5
  • Troubleshoot Devices issues
  • Chapter - 18.6
  • Typical Backup and Restore issues
  • Chapter - 18.7
  • omnihealthcheck
  • Chapter - 18.8
  • Object Copy
  • Chapter - 18.9
  • Interactive Object Copy
  • Chapter - 18.10
  • Post Backup and scheduled Object Copy
  • Chapter - 18.11
  • Object Copy and Library Filtering
  • Chapter - 18.12
  • Automatic Device Selection
  • Chapter - 18.13
  • Copy Specification options
  • Chapter - 19
  • Object Consolidation
  • Chapter - 19.1
  • Enhanced Incremental Backups
  • Chapter - 19.2
  • Synthetic Full Backups
  • Chapter - 19.3
  • Virtual Full Backups
  • Chapter - 19.4
  • Interactive Object Consolidation
  • Chapter - 19.5
  • Post Backup and scheduled Object Consolidation
  • Chapter - 19.6
  • Consolidation Specification options
  • Chapter - 19.7
  • Use case scenarios

Contact Us

HP Data Protector Training, this Course and batch also available in other locations View

Top