HP Data Protector Training

Enquire Now

+1
4 + 4 =

Course Description

The HP data protector course will help you to get the minimum hardware requirements for setting up of HP Data Protector. Individuals may backup Exchange, SQL Server, File servers and more in Data Protector. The training course will not only support you to get the essentials of HP DP. Our setting up module covers the process of installation, several constituents of installation and components for troubleshooting.

The HP data protector training course offers a great level synopsis of and introduction to the HP Data Protector solution. It confers the tasks Big Data and Human Information brings to reserve and recovery in a modern spread business and the commercial gain bought about when it’s used to its complete potential. It covers the market movements and drivers, client circumstances and challenges, solution abilities, worth, client success examples and a modest synopsis.

The HP data protector training course delivers an important knowledge to assist storage administrators to arrange and success HP Data Protector Software. The applied practices highlight the theory sessions to confirm a complete understanding of reserve and recovery ideas, the functionality of the software and its application to classic storage operations.

Audience Profile

The intended profile for the particular training is

    • Storage and system administrators using the Software.
    • HP Data ProtectorBeginners who wish to study HP Data Protector.

Course Essentials

The course requires its audience to have

      • System and Network Administration or equal practice.

Course Objectives

        • Fix and allot HP Data Protector Software in your setting or execute an upgrade from an earlier HP Data Protector type.
        • Organize the HP Data Protector Software product.
        • Arrange your Tape and Disk built Backup solutions for use with HP Data Protector Software.
        • Use HP Data Protector Software products to the holdup, restore, and guide from the GUI and command line
        • Manage the HP Data Protector software
        • Identify the backup and recovery market demands and tasks related to Big Data and Human Information

Course Highlights

      • 30 hours of Instructor-Led HP ALM Training
      • Lifetime Access to Recorded Sessions
      • Various case studies have been conversed to attain practical experience and prepare for certain domains.
      • Candidates are offered access to quality study materials
      • Real World use cases and Scenarios
      • Practical Approach
      • 24*7 Support
      • Expert & Certified Trainers for teachings.
The certification advances your skill in certain fields. The professionals in the course get profits in several ways Job opportunities Salary upsurge The certification which overall makes you stand out among the common.
The tools required for you to attend the training are: Windows: Windows XP SP3 or higher Mac: OSX 10.6 or higher Internet speed: Preferably 512 Kbps or higher Headset, speakers and microphone: You’ll need headphones or speakers to catch training clearly, as well as a microphone to chat with the needed. You may practice a headphone with a built-in microphone, or distinct speakers and microphone.
The training is provided by highly capable and certified mentors with appropriate industry experience
Individuals from several domains with no past understanding of this technology have got positively skilled with us and are currently working in the industry. Though, information on the basics is an additional benefit. Careerera ensures to train every individual in a manner to make them qualified and expert in their field.
Sl. No. Chapter
Chapter - 1 HP Adaptive Backup and Recovery Solutions
Chapter - 1.1 Data Protector 9.0
Chapter - 1.2 HP Backup Navigator
Chapter - 1.3 Data Protector Management pack
Chapter - 2 HP Data Protector Architecture
Chapter - 2.1 Backup and Replication Methods
Chapter - 2.2 The Cell Concept
Chapter - 2.3 Data Protector Architecture
Chapter - 2.4 Cell Manager and Installation Server
Chapter - 2.5 Disk, Media and Integration Agents
Chapter - 2.6 Internal Database
Chapter - 2.7 Typical Data Protector session
Chapter - 2.8 Data Protector tuning
Chapter - 3 Licensing and Product Structure
Chapter - 3.1 Data Protector licensing
Chapter - 3.2 Product Structure overview
Chapter - 3.3 License Reporting and checking
Chapter - 4 Quick Start
Chapter - 4.1 Concept Backup Specification
Chapter - 4.2 Configure Media Pool and Device
Chapter - 4.3 Configure and run a Backup
Chapter - 4.4 Monitor the Backup session
Chapter - 4.5 Start a Restore
Chapter - 4.6 Run a Single Session Report
Chapter - 5 HP Data Protector Software Installation
Chapter - 5.1 Installation Overview, Planning, and Methods
Chapter - 5.2 Cell Manager Installation on Windows
Chapter - 5.3 Cell Manager Installation on Unix
Chapter - 5.4 Client Push Installation
Chapter - 5.5 Export and Import of Clients
Chapter - 5.6 Adding Components to Clients
Chapter - 6 Upgrade
Chapter - 6.1 Upgrade Overview
Chapter - 6.2 Supported Upgrade Paths
Chapter - 6.3 Upgrading a Windows Cell Manager
Chapter - 6.4 Upgrading a Unix Cell Manager
Chapter - 6.5 Migrating the Cell Manager to an altered stage
Chapter - 7 Media Management
Chapter - 7.1 Media Pool concept
Chapter - 7.2 Media Pool Properties
Chapter - 7.3 Creating a Media Pool
Chapter - 7.4 Free Pool Concept and Implementation
Chapter - 7.5 Medium properties
Chapter - 7.6 Location Tracking and Priority
Chapter - 7.7 Formatting Tape Media
Chapter - 7.8 Vaulting with Media Pools
Chapter - 8 Backup Device
Chapter - 8.1 Overview
Chapter - 8.2 Logical Device concept
Chapter - 8.3 Data Protector Tape Format
Chapter - 8.4 Configure Tape based Storage Devices
Chapter - 8.5 Configure Disk-based Storage Devices
Chapter - 8.6 De-duplication Devices
Chapter - 8.7 Device and Library Tools
Chapter - 9 Backup
Chapter - 9.1 Backup Specification Types
Chapter - 9.2 Backup Features
Chapter - 9.3 Static and Dynamic Device Allocation
Chapter - 9.4 Load Balancing – Object Allocation
Chapter - 9.5 Backup Mirroring
Chapter - 9.6 Create and start a Backup Specification
Chapter - 9.7 The Backup Process Flow
Chapter - 9.8 Monitor the backup session
Chapter - 9.9 Restart failed Backups
Chapter - 10 Advanced Scheduler
Chapter - 10.1 Schedule a Backup
Chapter - 10.2 Manage missed Job Executions
Chapter - 11 Restore
Chapter - 11.1 Performing Restores
Chapter - 11.2 Restore Sequence
Chapter - 11.3 Object and Session Restore
Chapter - 11.4 Single or Parallel Restore
Chapter - 11.5 Checkpoint Restore
Chapter - 12 Monitoring, Reporting, and Notifications
Chapter - 12.1 Monitoring and Reporting
Chapter - 12.2 Session Monitoring
Chapter - 12.3 Report Categories and Delivery Methods
Chapter - 12.4 Configure and schedule Reports
Chapter - 12.5 Web Reporting Interface
Chapter - 12.6 Default Notification overview
Chapter - 12.7 Adding Notifications
Chapter - 13 Media and Object Replication
Chapter - 13.1 Interactive Media Copy
Chapter - 13.2 Automated Media Operation
Chapter - 14 Internal Database (IDB)
Chapter - 14.1 Concept Embedded database
Chapter - 14.2 Architecture
Chapter - 14.3 IDB Directory Structure
Chapter - 14.4 Internal Database Size Limits
Chapter - 14.5 Administration Tasks
Chapter - 14.6 Manage IDB Grow
Chapter - 14.7 IDB Maintenance
Chapter - 15 Security
Chapter - 15.1 Access control
Chapter - 15.2 User Groups and User Rights
Chapter - 15.3 Adding Users and Groups
Chapter - 15.4 User Restrictions
Chapter - 15.5 LDAP Integration
Chapter - 15.6 Client and Cell Security
Chapter - 15.7 Inet Impersonation
Chapter - 15.8 Changing the Web Interface Password
Chapter - 16 Auditing
Chapter - 16.1 Auditing Overview
Chapter - 16.2 Backup session auditing
Chapter - 16.3 Enhanced Event Logging
Chapter - 17 Disaster Recovery
Chapter - 17.1 Disaster Recovery methods
Chapter - 17.2 Disaster Recovery phases
Chapter - 17.3 Create a Disaster Recovery Image
Chapter - 17.4 Booting the Recovery Image
Chapter - 17.5 Using the Recovery Progress Monitor
Chapter - 17.6 Disaster Recovery on Dissimilar Hardware
Chapter - 18 Troubleshooting
Chapter - 18.1 Log and Trace Files
Chapter - 18.2 Debug Traces Generation
Chapter - 18.3 Debug Log Collector
Chapter - 18.4 Troubleshoot Network issues
Chapter - 18.5 Troubleshoot Devices issues
Chapter - 18.6 Typical Backup and Restore issues
Chapter - 18.7 omnihealthcheck
Chapter - 18.8 Object Copy
Chapter - 18.9 Interactive Object Copy
Chapter - 18.10 Post Backup and scheduled Object Copy
Chapter - 18.11 Object Copy and Library Filtering
Chapter - 18.12 Automatic Device Selection
Chapter - 18.13 Copy Specification options
Chapter - 19 Object Consolidation
Chapter - 19.1 Enhanced Incremental Backups
Chapter - 19.2 Synthetic Full Backups
Chapter - 19.3 Virtual Full Backups
Chapter - 19.4 Interactive Object Consolidation
Chapter - 19.5 Post Backup and scheduled Object Consolidation
Chapter - 19.6 Consolidation Specification options
Chapter - 19.7 Use case scenarios


StudentS' Review & Feedback

No Review & Feedback