Detailed Course Outline
Introduction to Data Protection
- Data Protection Primer
 - Data Center
 - Data Protection and Availability Solutions
 
Data Protection Architecture
- Data Source – Application and Hypervisor
 - Data Source – Primary Storage
 - Protection Application and Storage
 - Data Security and Management
 
Fault-Tolerance Techniques
- Fault-Tolerance Overview
 - Fault Tolerance Techniques – Compute and Network
 - Fault Tolerance Techniques – Storage
 - Fault Tolerance Techniques – Application and Availability Zone
 
Data Backup
- Introduction to Backup
 - Backup Topologies
 - Backup Methods
 
Data Deduplication
- Data Deduplication Overview
 - Deduplication Granularity and Methods
 
Replication
- Data Replication Overview
 - Local Replication
 - Remote Replication
 
Data Archiving
- Data Archiving Overview
 - Archiving Operation and Storage
 
Data Migration
- SAN-Based Data Migration
 - NAS-Based Data Migration
 - Host-Based Data Migration
 - Application-Based Data Migration
 
Data Protection in Software-Defined Data Center
- Software-Defined Data Center Overview
 - Software-Defined Compute, Storage, and Networking
 - Data Protection Process in SDDC
 
Cloud-based Data Protection
- Cloud Computing Overview
 - Cloud-Based Data Protection
 - Cloud-Based Data Archiving
 
Protecting Big Data and Mobile Device Data
- Big Data Overview
 - Protecting Big Data
 - Protecting Mobile Device
 
Securing Data Protection Environment
- Overview of Data Security
 - Security Threats in Data Protection Environment
 - Security Controls in Data Protection Environment – 1
 - Security Controls in Data Protection Environment – 2
 - Cyber Recovery
 
Managing the Data Protection Environment
- Introduction to Data Protection Management
 - Operations Management – 1
 - Operations Management – 2