Dell – PowerProtect Cyber Recovery Design and Administration
Course Overview
This course covers the concepts, features, management, design and troubleshooting of PowerProtect Cyber Recovery solutions. The course contains security considerations as well as the steps to manage storage, applications and policies, copies, sandboxes, and the Cyber Recovery operations with Dell PowerProtect Data Manager, Dell NetWorker, and Dell Avamar. This course also contains important considerations and limitations when designing, sizing, and hardening a PowerProtect Cyber Recovery solution. Common troubleshooting techniques and learning experiences covering Cyber Recovery problem identification, collecting log files, alerts, main system components issues, cause identification and possible resolutions are also covered in this course.
Course Objectives
- Describe the PowerProtect Cyber Recovery solution, its components, and processes.
- Perform PowerProtect Cyber Recovery administrative tasks.
- Run scheduled and on-demand backups for a variety of systems.
- Restore files using PowerProtect Cyber Recovery.
- Configure PowerProtect Cyber Recovery replication.
- Use PowerProtect Cyber Recovery tools to perform system monitoring, maintenance, capacity management, and troubleshooting.
- Identify software, server, network, storage, and physical environment design limitations and considerations.
- Plan and size a PowerProtect Cyber Recovery environment.
- Diagnose and troubleshoot login problems within Cyber Recovery.
- Locate logs and use monitoring tools that can be used to validate proper process and data flow.
- Identify alerts and alert status.
- Locate CyberSense logs
Who Should Attend?
This course is intended for individuals who require the skills needed to administrate a Cyber Recovery solution.
Course Prerequisites
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 12/8/2025 | 12/12/2025 | ||||
| 12/29/2025 | 1/2/2026 | ||||
| 1/19/2026 | 1/23/2026 | ||||
| 2/9/2026 | 2/13/2026 | ||||
| 3/2/2026 | 3/6/2026 | ||||
| 3/23/2026 | 3/27/2026 | ||||
| 4/13/2026 | 4/17/2026 | ||||
| 5/4/2026 | 5/8/2026 | ||||
| 5/25/2026 | 5/29/2026 | ||||
| 6/15/2026 | 6/19/2026 | ||||
| 7/6/2026 | 7/10/2026 | ||||
| 7/27/2026 | 7/31/2026 | ||||
| 8/17/2026 | 8/21/2026 | ||||
| 9/7/2026 | 9/11/2026 | ||||
| 9/28/2026 | 10/2/2026 | ||||
| 10/19/2026 | 10/23/2026 | ||||
| 11/9/2026 | 11/13/2026 | ||||
| 11/30/2026 | 12/4/2026 | ||||
| 12/21/2026 | 12/25/2026 | ||||
| 1/11/2027 | 1/15/2027 |
Agenda
PowerProtect Cyber Recovery Concepts
- Importance of Cyber Security
- PowerProtect Cyber Recovery Solution
- Navigating Documentation
PowerProtect Cyber Recovery Features
- Identifying Management Tools and Platforms
- Identifying Storage and Applications
- Capabilities of Policies and Copies
- Identifying Components
PowerProtect Cyber Recovery Administration
- Configure Storage and Applications
- Manage Policies and Copies
- Recover with PPDM in Cyber Recovery
- Recover with NetWorker in Cyber Recovery
- Recover with Avamar with Cyber Recovery
- CyberSense Configuration
- Perform Administrative Tasks
- Protect Cyber Recovery with Disaster Recovery
- Sheltered Harbor Configuration
- Configure Unisys Stealth with Cyber Recovery
PowerProtect Cyber Recovery Design
- Design Considerations
- Designing the Solution
- Planning and Sizing the Environment
- Hardening the Solution
PowerProtect Cyber Recovery Troubleshooting
- Diagram a Cyber Recovery Solution
- Configure Services, Alerts, and Workflow
- Troubleshooting Cyber Recovery
- Troubleshooting Cyber Sense
