Our Courses

Contact Us

+1-800-281-9192 Need Help? Call Us

Enquire Now

+1
1 + 8 =

Course Description

The HP data protector course will help you to get the minimum hardware requirements for setting up of HP Data Protector. Individuals may backup Exchange, SQL Server, File servers and more in Data Protector. The training course will not only support you to get the essentials of HP DP. Our setting up module covers the process of installation, several constituents of installation and components for troubleshooting.

The HP data protector training course offers a great level synopsis of and introduction to the HP Data Protector solution. It confers the tasks Big Data and Human Information brings to reserve and recovery in a modern spread business and the commercial gain bought about when it’s used to its complete potential. It covers the market movements and drivers, client circumstances and challenges, solution abilities, worth, client success examples and a modest synopsis.

The HP data protector training course delivers an important knowledge to assist storage administrators to arrange and success HP Data Protector Software. The applied practices highlight the theory sessions to confirm a complete understanding of reserve and recovery ideas, the functionality of the software and its application to classic storage operations.

Audience Profile

The intended profile for the particular training is

    • Storage and system administrators using the Software.
    • HP Data ProtectorBeginners who wish to study HP Data Protector.

Course Essentials

The course requires its audience to have

      • System and Network Administration or equal practice.

Course Objectives

        • Fix and allot HP Data Protector Software in your setting or execute an upgrade from an earlier HP Data Protector type.
        • Organize the HP Data Protector Software product.
        • Arrange your Tape and Disk built Backup solutions for use with HP Data Protector Software.
        • Use HP Data Protector Software products to the holdup, restore, and guide from the GUI and command line
        • Manage the HP Data Protector software
        • Identify the backup and recovery market demands and tasks related to Big Data and Human Information

Course Highlights

      • 30 hours of Instructor-Led HP ALM Training
      • Lifetime Access to Recorded Sessions
      • Various case studies have been conversed to attain practical experience and prepare for certain domains.
      • Candidates are offered access to quality study materials
      • Real World use cases and Scenarios
      • Practical Approach
      • 24*7 Support
      • Expert & Certified Trainers for teachings.

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • HP Adaptive Backup and Recovery Solutions
  • Chapter - 1.1
  • Data Protector 9.0
  • Chapter - 1.2
  • HP Backup Navigator
  • Chapter - 1.3
  • Data Protector Management pack
  • Chapter - 2
  • HP Data Protector Architecture
  • Chapter - 2.1
  • Backup and Replication Methods
  • Chapter - 2.2
  • The Cell Concept
  • Chapter - 2.3
  • Data Protector Architecture
  • Chapter - 2.4
  • Cell Manager and Installation Server
  • Chapter - 2.5
  • Disk, Media and Integration Agents
  • Chapter - 2.6
  • Internal Database
  • Chapter - 2.7
  • Typical Data Protector session
  • Chapter - 2.8
  • Data Protector tuning
  • Chapter - 3
  • Licensing and Product Structure
  • Chapter - 3.1
  • Data Protector licensing
  • Chapter - 3.2
  • Product Structure overview
  • Chapter - 3.3
  • License Reporting and checking
  • Chapter - 4
  • Quick Start
  • Chapter - 4.1
  • Concept Backup Specification
  • Chapter - 4.2
  • Configure Media Pool and Device
  • Chapter - 4.3
  • Configure and run a Backup
  • Chapter - 4.4
  • Monitor the Backup session
  • Chapter - 4.5
  • Start a Restore
  • Chapter - 4.6
  • Run a Single Session Report
  • Chapter - 5
  • HP Data Protector Software Installation
  • Chapter - 5.1
  • Installation Overview, Planning, and Methods
  • Chapter - 5.2
  • Cell Manager Installation on Windows
  • Chapter - 5.3
  • Cell Manager Installation on Unix
  • Chapter - 5.4
  • Client Push Installation
  • Chapter - 5.5
  • Export and Import of Clients
  • Chapter - 5.6
  • Adding Components to Clients
  • Chapter - 6
  • Upgrade
  • Chapter - 6.1
  • Upgrade Overview
  • Chapter - 6.2
  • Supported Upgrade Paths
  • Chapter - 6.3
  • Upgrading a Windows Cell Manager
  • Chapter - 6.4
  • Upgrading a Unix Cell Manager
  • Chapter - 6.5
  • Migrating the Cell Manager to an altered stage
  • Chapter - 7
  • Media Management
  • Chapter - 7.1
  • Media Pool concept
  • Chapter - 7.2
  • Media Pool Properties
  • Chapter - 7.3
  • Creating a Media Pool
  • Chapter - 7.4
  • Free Pool Concept and Implementation
  • Chapter - 7.5
  • Medium properties
  • Chapter - 7.6
  • Location Tracking and Priority
  • Chapter - 7.7
  • Formatting Tape Media
  • Chapter - 7.8
  • Vaulting with Media Pools
  • Chapter - 8
  • Backup Device
  • Chapter - 8.1
  • Overview
  • Chapter - 8.2
  • Logical Device concept
  • Chapter - 8.3
  • Data Protector Tape Format
  • Chapter - 8.4
  • Configure Tape based Storage Devices
  • Chapter - 8.5
  • Configure Disk-based Storage Devices
  • Chapter - 8.6
  • De-duplication Devices
  • Chapter - 8.7
  • Device and Library Tools
  • Chapter - 9
  • Backup
  • Chapter - 9.1
  • Backup Specification Types
  • Chapter - 9.2
  • Backup Features
  • Chapter - 9.3
  • Static and Dynamic Device Allocation
  • Chapter - 9.4
  • Load Balancing – Object Allocation
  • Chapter - 9.5
  • Backup Mirroring
  • Chapter - 9.6
  • Create and start a Backup Specification
  • Chapter - 9.7
  • The Backup Process Flow
  • Chapter - 9.8
  • Monitor the backup session
  • Chapter - 9.9
  • Restart failed Backups
  • Chapter - 10
  • Advanced Scheduler
  • Chapter - 10.1
  • Schedule a Backup
  • Chapter - 10.2
  • Manage missed Job Executions
  • Chapter - 11
  • Restore
  • Chapter - 11.1
  • Performing Restores
  • Chapter - 11.2
  • Restore Sequence
  • Chapter - 11.3
  • Object and Session Restore
  • Chapter - 11.4
  • Single or Parallel Restore
  • Chapter - 11.5
  • Checkpoint Restore
  • Chapter - 12
  • Monitoring, Reporting, and Notifications
  • Chapter - 12.1
  • Monitoring and Reporting
  • Chapter - 12.2
  • Session Monitoring
  • Chapter - 12.3
  • Report Categories and Delivery Methods
  • Chapter - 12.4
  • Configure and schedule Reports
  • Chapter - 12.5
  • Web Reporting Interface
  • Chapter - 12.6
  • Default Notification overview
  • Chapter - 12.7
  • Adding Notifications
  • Chapter - 13
  • Media and Object Replication
  • Chapter - 13.1
  • Interactive Media Copy
  • Chapter - 13.2
  • Automated Media Operation
  • Chapter - 14
  • Internal Database (IDB)
  • Chapter - 14.1
  • Concept Embedded database
  • Chapter - 14.2
  • Architecture
  • Chapter - 14.3
  • IDB Directory Structure
  • Chapter - 14.4
  • Internal Database Size Limits
  • Chapter - 14.5
  • Administration Tasks
  • Chapter - 14.6
  • Manage IDB Grow
  • Chapter - 14.7
  • IDB Maintenance
  • Chapter - 15
  • Security
  • Chapter - 15.1
  • Access control
  • Chapter - 15.2
  • User Groups and User Rights
  • Chapter - 15.3
  • Adding Users and Groups
  • Chapter - 15.4
  • User Restrictions
  • Chapter - 15.5
  • LDAP Integration
  • Chapter - 15.6
  • Client and Cell Security
  • Chapter - 15.7
  • Inet Impersonation
  • Chapter - 15.8
  • Changing the Web Interface Password
  • Chapter - 16
  • Auditing
  • Chapter - 16.1
  • Auditing Overview
  • Chapter - 16.2
  • Backup session auditing
  • Chapter - 16.3
  • Enhanced Event Logging
  • Chapter - 17
  • Disaster Recovery
  • Chapter - 17.1
  • Disaster Recovery methods
  • Chapter - 17.2
  • Disaster Recovery phases
  • Chapter - 17.3
  • Create a Disaster Recovery Image
  • Chapter - 17.4
  • Booting the Recovery Image
  • Chapter - 17.5
  • Using the Recovery Progress Monitor
  • Chapter - 17.6
  • Disaster Recovery on Dissimilar Hardware
  • Chapter - 18
  • Troubleshooting
  • Chapter - 18.1
  • Log and Trace Files
  • Chapter - 18.2
  • Debug Traces Generation
  • Chapter - 18.3
  • Debug Log Collector
  • Chapter - 18.4
  • Troubleshoot Network issues
  • Chapter - 18.5
  • Troubleshoot Devices issues
  • Chapter - 18.6
  • Typical Backup and Restore issues
  • Chapter - 18.7
  • omnihealthcheck
  • Chapter - 18.8
  • Object Copy
  • Chapter - 18.9
  • Interactive Object Copy
  • Chapter - 18.10
  • Post Backup and scheduled Object Copy
  • Chapter - 18.11
  • Object Copy and Library Filtering
  • Chapter - 18.12
  • Automatic Device Selection
  • Chapter - 18.13
  • Copy Specification options
  • Chapter - 19
  • Object Consolidation
  • Chapter - 19.1
  • Enhanced Incremental Backups
  • Chapter - 19.2
  • Synthetic Full Backups
  • Chapter - 19.3
  • Virtual Full Backups
  • Chapter - 19.4
  • Interactive Object Consolidation
  • Chapter - 19.5
  • Post Backup and scheduled Object Consolidation
  • Chapter - 19.6
  • Consolidation Specification options
  • Chapter - 19.7
  • Use case scenarios

FAQs