Course description
Upon successful completion of this course, participants should be able to:
- Describe the PowerProtect Cyber Recovery solution, its components, and processes.
- Perform PowerProtect Cyber Recovery administrative tasks.
- Run scheduled and on-demand backups for a variety of systems.
- Restore files using PowerProtect Cyber Recovery.
- Configure PowerProtect Cyber Recovery replication.
- Use PowerProtect Cyber Recovery tools to perform system monitoring, maintenance, capacity management, and troubleshooting.
- Identify software, server, network, storage, and physical environment design limitations and considerations.
- Diagnose and troubleshoot login problems within Cyber Recovery.
- Locate logs and use monitoring tools that can be used to validate proper process and data flow.
- Identify alerts and alert status.
- Locate CyberSense logs.