PowerProtect Data Manager Implementation and Administration
About the Course
This intensive, five-day technical course provides a comprehensive roadmap for deploying, configuring, and managing next-generation data protection software. As organizations modernize their data centers, this program explores how to transition from traditional backup methods to an automated, software-defined approach. Participants will learn to protect and manage critical data across on-premises, virtualized, and cloud-native environments, including complex workloads like Kubernetes and SAP HANA.
The curriculum focuses on the integration of data protection as a service, empowering organizations to balance centralized governance with self-service agility. Throughout the course, students will engage in hands-on laboratories to master the orchestration of protection policies, SLA compliance, and disaster recovery workflows. The training provides the deep-dive expertise required to ensure that enterprise-level databases and applications—including Oracle, Microsoft SQL, and Exchange—remain secure, resilient, and highly available.
By the end of this program, administrators will be proficient in performing full-stack lifecycle operations, from initial implementation and automated asset discovery to complex system upgrades and troubleshooting. Attendees will emerge with the skills necessary to optimize storage efficiency through advanced deduplication and to leverage cloud-based snapshots for long-term retention and cybersecurity resilience.
Audience Profile
This course is intended for:
-
System Administrators responsible for managing enterprise data protection and recovery.
-
Implementation Engineers tasked with deploying and configuring software-defined protection solutions.
-
Database and Cloud Architects seeking to integrate application-aware backup workflows.
-
Technical Partners and support staff providing managed services for modern data centers.
Learning Objectives
Domain 1: System Concepts and Implementation
-
Analyze core software-defined protection concepts and the integrated component architecture.
-
Execute the deployment and initial configuration of the management engine in various environments.
-
Manage system upgrades, licensing, and role-based access control (RBAC).
Domain 2: Application and Database Integration
-
Implement application-aware protection for Microsoft SQL, Exchange, and Oracle databases.
-
Configure specialized integration for SAP HANA and Kubernetes namespace protection.
-
Orchestrate backup and restore workflows for file systems and network-attached storage (NAS).
Domain 3: Virtualization and Cloud Orchestration
-
Master VMware virtual machine integration, including instant access and image-level recovery.
-
Utilize cloud snapshot management for protecting in-cloud workloads and long-term retention.
-
Configure disaster recovery (DR) and replication policies to meet organizational RPO/RTO goals.
Domain 4: Governance and Troubleshooting
-
Define and monitor Service Level Agreements (SLAs) and protection rules to ensure compliance.
-
Utilize integrated reporting and search engines for audit readiness and rapid data discovery.
-
Diagnose and remediate failed protection jobs and system-level performance bottlenecks.
Certification Exam
This course is the primary training for the D-PDM-DY-23 (Dell PowerProtect Data Manager Deploy 2023) exam. This certification validates the specialist-level skills required to deploy, configure, integrate, and upgrade a software-defined protection solution in diverse enterprise environments.
Prerequisites
To ensure success in this course, students should possess the following foundational knowledge:
-
Basic concepts of enterprise application backup and recovery.
-
Fundamental administration of Microsoft Exchange, SQL, and Oracle databases.
-
Familiarity with SAP HANA database structures and Kubernetes cluster concepts.
-
Practical experience with VMware vSphere administration and virtual machine management.
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 12/8/2025 | 12/12/2025 | ||||
| 12/29/2025 | 1/2/2026 | ||||
| 1/19/2026 | 1/23/2026 | ||||
| 2/9/2026 | 2/13/2026 | ||||
| 3/2/2026 | 3/6/2026 | ||||
| 3/23/2026 | 3/27/2026 | ||||
| 4/13/2026 | 4/17/2026 | ||||
| 5/4/2026 | 5/8/2026 | ||||
| 5/25/2026 | 5/29/2026 | ||||
| 6/15/2026 | 6/19/2026 | ||||
| 7/6/2026 | 7/10/2026 | ||||
| 7/27/2026 | 7/31/2026 | ||||
| 8/17/2026 | 8/21/2026 | ||||
| 9/7/2026 | 9/11/2026 | ||||
| 9/28/2026 | 10/2/2026 | ||||
| 10/19/2026 | 10/23/2026 | ||||
| 11/9/2026 | 11/13/2026 | ||||
| 11/30/2026 | 12/4/2026 | ||||
| 12/21/2026 | 12/25/2026 | ||||
| 1/11/2027 | 1/15/2027 |
Curriculum
Module 1: Protection Platform Fundamentals
-
Introduction to software-defined data management and architecture.
-
Reviewing key features: Automated discovery, deduplication, and operational agility.
-
Deployment methods (OVA/Machine Image) and resource requirements.
Module 2: Implementation and Initial Setup
-
Installation and post-deployment configuration tasks.
-
Configuring storage targets (Protection Storage) and identity providers.
-
User roles, privileges, and credential security.
Module 3: Virtualization and File System Protection
-
Integrating with VMware vCenter and VM Direct Engines.
-
Configuring transparent snapshots and image-level protection policies.
-
Protecting Windows, Linux, and AIX file systems and NAS shares.
Module 4: Enterprise Application Integration
-
Protecting Microsoft SQL and Exchange: Application-consistent workflows.
-
Advanced Oracle and SAP HANA database protection strategies.
-
Managing self-service vs. centralized protection models.
Module 5: Kubernetes and Cloud Integration
-
Container-native protection: Kubernetes namespaces and persistent volumes.
-
Integrating with Cloud Snapshot Manager for multi-cloud visibility.
-
Orchestrating data movement to the cloud for extended retention.
Module 6: Governance, Maintenance, and Troubleshooting
-
Creating SLA Compliance reports and utilizing the Search Engine.
-
Performing system health checks and monitoring audit logs.
-
Advanced troubleshooting: Log collection, failed workflows, and upgrade remediation.
