When does class start/end?
Classes begin promptly at 9:00 am, and typically end at 5:00 pm.
Acquire the skills to make your data protection strategy successful with the Veritas Backup Exec 22: Administration course. The course is designed for the data protection professional tasked with...
Read MoreAcquire the skills to make your data protection strategy successful with the Veritas Backup Exec 22: Administration course. The course is designed for the data protection professional tasked with deploying, configuring, maintaining, and managing a Backup Exec environment. The course covers Backup Exec concepts, how to back up and restore critical data, configure storage devices and media, and work with various Backup Exec agents and options, which protect applications like Microsoft Exchange, Microsoft SharePoint, Microsoft SQL, Microsoft 365, Active Directory, Cloud, Oracle, and Virtual environments.
By the completion of this course, you will be able to:
This course is designed for system administrators, system engineers, technical support personnel, consultants, backup administrators, backup operators, and others who are responsible for installing, configuring, managing, and monitoring Backup Exec 22.
You must have a basic working knowledge of administrating and configuring Windows Server 2016 and later platforms. Basic working knowledge of the following applications is beneficial, but not required:
Backup Exec Fundamentals
Licensing Backup Exec
Installing Backup Exec
Working with the Backup Exec Administration Console
Disk Storage Devices
Cloud-based Storage Devices
Network Storage Devices
Disk and Network Data Management
Tape Devices and Tape Management
Backing Up Data
Managing Servers and Jobs
Restoring Data
Working with the Database Encryption Key
Simplified Disaster Recovery
Upgrading Backup Exec
Central Admin Server Feature
Deduplication Feature
Security and Compliance Features
Remote Agent, Applications, and Databases
Protecting Microsoft Exchange Server
Protecting Microsoft SQL Server
Protecting Microsoft SharePoint Server
Protecting Microsoft Active Directory
Protecting Microsoft 365
Protecting Virtual Environments – Part 1
Protecting Virtual Environments – Part 2
Performing Virtual Machine Conversions
Agent for Linux and UNIX
Agent for Oracle