Payment for 

Facilities rental at Iverson Associates, Bandar Utama

Date: 24-25 May 2022

Fees: RM 4680 



The Veritas InfoScale Availability 7.4.1 for Unix/Linux: Administration course is designed for the IT professional tasked with installing, configuring, and maintaining Veritas Cluster Server (VCS) clusters.


This class discusses how to use InfoScale Availability to manage applications in a high availability environment. After gaining the necessary fundamental skills that are required to manage a highly available application in a cluster, the course enables you to deploy InfoScale Availability in the lab environment to practically implement a sample cluster design and deployment.

Additional Info

  • Certification Course only
  • Course Code 00004930
  • Price RM10375
  • Exam Price Exclude
  • Duration 5 Days
  • Principals Veritas
  • Schedule

    Available upon request

  • Audience

    This course is for UNIX/Linux system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration/development staff, who will be installing, operating, or integrating InfoScale Availability.

  • Prerequisities

    Knowledge of and hands-on experience with UNIX/Linux systems administration is required.


  • At Course Completion

    By the completion of this course, you will be able to:

    • Describe how clustering is used to implement high availability in the data center environment.
    • Describe VCS and cluster communication mechanisms.
    • Create a cluster, and configure service groups and resources.
    • Implement and verify failover and failback capability for application, storage, and network services.
    • Configure and optimize cluster behavior.
    • Protect data in a shared storage environment.
    • Describe I/O fencing operations, and its implementation.
    • Configure VCS to manage an Oracle database and other applications.
    • Configure and manage VCS clusters on virtual machines in VMware environment.
    • Implement Just in Time Availability for single node VCS cluster on virtual machine in a VMware environment.
  • Module 1 Title Cluster Server Basics
  • Module 1 Content

    High Availability Concepts

    • High availability concepts
    • Clustering concepts
    • High availability application services
    • Clustering prerequisites


    VCS Building Blocks

    • VCS terminology
    • Cluster communication
    • VCS architecture


    • Exercise A: Installing InfoScale Enterprise using the Common Product Installer (CPI)]
    • Exercise B: Running a post-installation check
    • Exercise C: Adding cluster systems to VIOM as managed hosts


    VCS Operations

    • Common VCS tools and operations
    • Service group operations
    • Resource operations


    • Exercise A: Displaying cluster information
    • Exercise B: Displaying status and attributes
    • Exercise C: Performing service group operations
    • Exercise D: Manipulating resources


    VCS Configuration Methods

    • Starting and stopping VCS
    • Overview of configuration methods
    • Online configuration
    • Controlling access to VCS


    • Exercise A: VCS configuration state and stopping VCS
    • Exercise B: Configuring automatic backup of the VCS configuration
    • Exercise C: Setting non default VCS stop options


    Preparing Services for VCS

    • Preparing applications for VCS
    • Performing one-time configuration tasks
    • Testing the application service
    • Stopping and migrating an application service
    • Collecting configuration information


    • Exercise A: Configuring and examining storage for the service
    • Exercise B: Examining the application
    • Exercise C: Manually starting and stopping the application


    Online Configuration

    • Online service group configuration
    • Adding resources
    • Solving common configuration errors
    • Testing the service group


    • Exercise A: Creating a service group for the loopy application
    • Exercise B: Configuring resources for the loopy application
    • Exercise C: Performing a virtual fire drill on the service group
    • Exercise D: Testing the service group
    • Exercise E: Setting resources to critical
    • Exercise F: (Optional) Examining Veritas File System locking by VCS


    Offline Configuration

    • Offline configuration examples
    • Offline configuration procedures
    • Solving offline configuration problems
    • Testing the service group


    • Exercise A: Editing a copy of the main.cf file using a system editor
    • Exercise B: Stopping VCS
    • Exercise C: Restarting VCS using the edited main.cf file


    Configuring Notification

    • Notification overview
    • Configuring notification
    • Overview of triggers


    • Exercise A: Configuring and testing the notifier using VIOM
    • Exercise B: Configuring trigger scripts
  • Module 2 Title Cluster Server Additions
  • Module 2 Content

    Handling Resource Faults

    • VCS response to resource faults
    • Determining failover duration
    • Controlling fault behavior
    • Recovering from resource faults
    • Fault notification and event handling


    Intelligent Monitoring Framework

    • IMF overview
    • IMF configuration
    • Faults and failover with intelligent monitoring


    • Exercise A: Examining IMF monitoring on a resource
    • Exercise B: (Optional) Examining the IMF default configuration


    Cluster Communications

    • VCS communications review
    • Cluster interconnect configuration
    • Joining the cluster membership
    • Changing the interconnect configuration


    • Exercise A: Reconfiguring LLT
    • Exercise B: Observing jeopardy membership
  • Module 3 Title Cluster Server Applications
  • Module 3 Content

    Using I/O Fencing for Application Data Integrity

    • Data protection requirements
    • I/O fencing concepts
    • I/O fencing operations
    • I/O fencing implementation
    • Fencing configuration


    • Exercise A: Fencing configuration pre-checks
    • Exercise B: Configuring VCS for I/O fencing
    • Exercise C: I/O fencing configuration verification
    • Exercise D: Verifying data disks for I/O fencing


    Clustering Applications

    • Application service overview
    • VCS agents for managing applications
    • The Application agent
    • IMF support and prevention of concurrency violation


    • Exercise A: Adding a resource of type Application
    • Exercise B: Testing the resource
    • Exercise C: IMF and Application agent monitoring options


    Clustering Databases

    • VCS database agents
    • Database preparation
    • The database agent for Oracle
    • Database failover behavior
    • Additional Oracle agent functions


    • Exercise A: Verifying the Oracle configuration
    • Exercise B: Preparing storage and network resources for the Oracle service group
    • Exercise C: Testing the Oracle database manually
    • Exercise D: Configuring Oracle under VCS control
    • Exercise E: Running a virtual fire drill and switching the Oracle service group
    • Exercise F: (Optional) Oracle monitoring
  • Module 4 Title In-Guest Clustering
  • Module 4 Content

    VMware vSphere Data Center Architecture

    • VMware vSphere high availability architecture
    • VMware administration
    • VMware storage architecture
    • Server and storage migration


    • Exercise A: Verifying the VMware vSphere lab environment
    • Exercise B: Connecting to the nested virtual machines
    • Exercise C: Testing vMotion


    Veritas High Availability Deployment in VMware

    • Veritas high availability architecture in VMware
    • Deploying Veritas InfoScale on VMs
    • Configuring VIOM to manage InfoScale on VMs
    • Configuring the vSphere Web Client for Veritas HA


    • Exercise A: Preparing the nested virtual machine lab environment
    • Exercise B: Deploying a Veritas cluster on nested virtual machines
    • Exercise C: Adding cluster systems as managed hosts to VIOM
    • Exercise D: Installing the VIOM Control Host add-on on mgt
    • Exercise E: Adding virtualization information to the VIOM management server
    • Exercise F: Installing and registering the Veritas HA Plug-in for vSphere Web Client


    Veritas High Availability Configuration and Administration

    • Configuring storage for VCS failover clusters
    • Configuring shared storage for CFS clusters
    • Configuring availability
    • Just In Time Availability solution


    • Exercise A: Preparing the nested virtual machine lab environment
    • Exercise B: Using the vSphere Web Client to monitor Veritas high availability
    • Exercise C: Setting EnableUUID parameter for virtual machine disks
    • Exercise D: Configuring a VCS service group with the VMwareDisks resource to manage virtual machine storage
    • Exercise E: Managing the VCS service group from the vSphere Web Client
    • Exercise F: Testing vMotion with Veritas in-guest clustering
    • Exercise G: (Optional) Completing the Oracle service group configuration
RM10,375.00(+RM622.50 Tax)

The Veritas InfoScale Storage 8.0 for UNIX/Linux: Administration course is designed for IT professionals tasked with installing, configuring, and maintaining Veritas InfoScale Storage environments, including Volume Manager (VxVM), File System (VxFS), Cluster File System (CFS), and InfoScale for Cloud environments.

This course covers how to use InfoScale Storage to manage disks, disk groups, and volumes using a variety of InfoScale Storage user interfaces, including the Veritas InfoScale Operations Manager (VIOM) Web console. It also discussed the basics of online file system administration and recovery from disk failures. In addition, the course covers data replication using Veritas File Replicator and Veritas Volume Replicator. The course also describes how to configure Veritas Cluster Volume Manager and Veritas Cluster File System and support for cloud environments


Additional Info

  • Certification Course only
  • Course Code 00007956
  • Price RM10375
  • Exam Price Exclude
  • Duration 5 Days
  • Principals Veritas
  • Schedule

    Available upon request

  • Audience

    This course is designed for UNIX/Linux system administrators, system engineers, technical support personnel, network/SAN administrators, and systems integration/development staff, who will install, configure, manage, and integrate InfoScale Storage.

  • Prerequisities

    Knowledge of and hands-on experience with UNIX/Linux systems administration is required.

  • At Course Completion

    After completing this course, you will be able to:

    • Install and configure the InfoScale Storage environment.
    • Create, configure, and manage disks, disk groups, and volumes.
    • Administer file systems and manage components in the VxVM architecture.
    • Manage multiple paths to disk devices.
    • Identify types of disk failures and how to resolve them.
    • Describe concepts and components specific to Veritas Volume Replicator and Veritas File Replicator.
    • Configure a CFS cluster according to a specified sample design.
    • Configure shared disk groups, shared volumes, and shared file systems.
    • Share local disks among systems in a cluster (FSS type storage support).
    • Describe InfoScale support for Cloud Environments.
    • Describe SmartIO support for FSS type storage in Cloud deployments.
  • Module 1 Title Installing and Licensing InfoScale
  • Module 2 Title Virtual Objects
  • Module 3 Title Creating a Volume and File System
  • Module 4 Title Working with Volumes with Different Layouts
  • Module 5 Title Making Configuration Changes
  • Module 6 Title Administering File Systems
  • Module 7 Title SmartIO
  • Module 8 Title Dynamic Multi-Pathing
  • Module 9 Title Resolving Hardware Problems
  • Module 10 Title Storage Foundation Cluster File System Architecture
  • Module 11 Title Cluster Volume Manager
  • Module 12 Title Cluster File System
  • Module 13 Title Flexible Storage Sharing
  • Module 14 Title Disaster Recovery and Replication Overview
  • Module 15 Title Veritas File Replicator
  • Module 16 Title Veritas Volume Replicator Components
  • Module 17 Title Veritas Volume Replicator Operations
  • Module 18 Title InfoScale Support for Cloud Environments
RM10,375.00(+RM622.50 Tax)

Acquire the skills to make your data protection strategy successful with the Veritas NetBackup 9.1: Advanced Administration course. You will learn advanced NetBackup topics, including NetBackup performance, disaster recovery, application backups on physical and virtual machines, virtual machine accelerator backups, and security. This course also covers using NetBackup to manage Oracle, Microsoft Exchange, Microsoft SQL, Microsoft SharePoint database backups and restores along with other modern workloads. 

Additional Info

  • Certification Course only
  • Course Code 00007263
  • Price RM6750
  • Exam Price Exclude
  • Duration 5 Days
  • Principals Veritas
  • Schedule

    18-22 Jul 2022

    14-18 Nov 2022

  • Audience

    This course is intended for NetBackup system administrators, system engineers, technical support personnel, and system integration and development staff who are responsible for implementing new and advanced NetBackup 8.3 features and functions. 

  • Prerequisities

    Students should be familiar with general network and storage concepts, and the administration and configuration of Windows or Linux operating systems. Students must also have one to three years of experience with basic NetBackup administration, configuration, and operation. These prerequisites can be met by attending any version of the NetBackup Administration course plus additional on-the-job experience. 

    Hands-On This course includes practical hands-on lab exercises to apply your new skills in a virtual NetBackup domain. At the start of class students will choose between Windows-based or Linux-based NetBackup servers to perform lab exercises.

  • At Course Completion

    By the completion of this course, you will be able to:


    •  Improve NetBackup performance by addressing bottlenecks and becoming familiar with NetBackup performance enhancing features. 
    •  Ensure your NetBackup environment and data is secure using security certificates, authentication, authorization, auditing, and encryption. 
    •  Prepare for common disasters and plan for disaster recovery using optimized duplication and Auto Image Replication. 
    •  Optimize NetBackup deduplication storage and use by understanding and managing performance enhancing features for backups and restores, and configuring MSDP catalog protection policies. 
    •  Describe requirements for backing up third-party applications and databases. 
    •  Configure NetBackup to back up and restore Oracle, Microsoft Exchange, Microsoft SQL, and Microsoft SharePoint databases. 
    •  Discuss strategies for Oracle, Microsoft Exchange, Microsoft SQL, and Microsoft SharePoint database recovery. 
    •  Configure, run, and manage backups for applications running in virtual machines. 
    •  Configure accelerator for VMware virtual machines. 
    •  Use NetBackup to protect modern workloads. 
    •  Configure, run, and manage backups using NDMP filers with NetBackup. 
  • Module 1 Title Improving NetBackup Performance
  • Module 1 Content


    • NetBackup performance overview
    • Addressing performance issues
    • Managing True Image Restore and synthetic backups
    • Managing FlashBackup backups
    • Using Network Resiliency


    • Exercise A: Calculating buffer wait percentages for backup jobs
    • Exercise B: Optimizing backups using synthetic backups
    • Exercise C: Configuring for and using FlashBackup
  • Module 2 Title Securing the NetBackup Environment
  • Module 2 Content
    • Understanding security concerns in a backup environment
    • Securing NetBackup port communication
    • Understanding security certificates
    • Configuring NetBackup security certificates
    • Configuring NetBackup with access control
    • Auditing NetBackup


    • Exercise A: Observing Security Events and Host Management behavior Linux
    • Exercise B: Managing Host ID certificates and tokens Linux
    • Exercise C: Configuring the auth conf file Linux
    • Exercise D: Configuring enhanced auditing linux
    • Exercise E: View security events and audit logs
    • Exercise F: Managing host ID certificates and tokens
  • Module 3 Title Securing Backup Data
  • Module 3 Content
    • Understanding security concerns in a backup environment
    • Encrypting NetBackup deduplication data
    • Using NetBackup client encryption
    • Using NetBackup Key Management Services


    • Exercise A: Configuring MSDP encryption
    • Exercise B: Performing a MSDP encrypted backup
  • Module 4 Title Introduction to Auto Image Replication
  • Module 4 Content
    • Introduction to Auto Image Replication
    • Configuring trusted master servers
    • Configuring Auto Image Replication
    • Monitoring Auto Image Replication
    • Restoring from a replicated and imported image
    • Managing and maintaining Auto Image Replication


    • Exercise A: Configuring the replication source and target
    • Exercise B: Configuring an SLP in the target domain
    • Exercise C: Configuring an SLP and policy in the source domain
    • Exercise D: Configuring other settings that affect SLP behavior
    • Exercise E: Performing and monitoring replication jobs
    • Exercise F: Viewing the status of replication jobs
    • Exercise G: Restoring data from a replicated and imported image
  • Module 5 Title Optimizing NetBackup Deduplication
  • Module 5 Content
    • Understanding MSDP architecture
    • Improving deduplication backup performance
    • Optimizing deduplication restores and rehydration
    • Protecting the MSDP backup data and catalog


    • Exercise A: Configuring client direct restores
    • Exercise B: Performing a client direct restore
    • Exercise C: Configuring and performing MSDP catalog backups
    • Exercise D: Simulating a MSDP catalog corruption
    • Exercise E: Performing a recovery of a MSDP catalog
  • Module 6 Title Implementing NetBackup Cloud Solutions
  • Module 6 Content
    • Using the cloud with NetBackup
    • Configure NetBackup cloud storage
    • Managing NetBackup cloud storage and cloud backups
    • NetBackup CloudCatalyst overview


    • Exercise A: Performing preliminary tasks
    • Exercise B: Configuring NetBackup for backups to the cloud
    • Exercise C: Performing backups to the cloud
    • Exercise D: Viewing cloud-based storage
    • Exercise E: Restoring client data from cloud-based storage
  • Module 7 Title Understanding Application Backup Concepts
  • Module 7 Content
    • Application protection concepts
    • Database backup and restore concepts
    • Customizing generic application backups


    • Exercise A: Copying the NetBackup notify scripts
    • Exercise B: Configuring a policy to run a cold Oracle backup
    • Exercise C: Performing a cold Oracle backup
  • Module 8 Title Managing Oracle Backups
  • Module 8 Content
    • Introduction to the Oracle database
    • Configuring Oracle database backups
    • Monitoring and maintaining Oracle database backups
    • Oracle database disaster recovery considerations


    • Exercise A: Viewing the initial configuration of Oracle
    • Exercise B: Registering the Oracle instance with NetBackup
    • Exercise C: Creating an Oracle Intelligent Policy
    • Exercise D: Performing a backup using an Oracle Intelligent Policy
    • Exercise E: Simulating a failure of an Oracle database
    • Exercise F: Restoring an Oracle database
  • Module 9 Title Managing Microsoft SQL Backups
  • Module 9 Content
    • Introduction to Microsoft SQL Server
    • Configuring NetBackup for SQL Server Intelligent Policies
    • Monitoring SQL Server database backups
    • SQL Server disaster recovery considerations


    • Exercise A: Introduction to the SQL Server environment
    • Exercise B: Registering the SQL instance with NetBackup
    • Exercise C: Creating a NetBackup SQL Intelligent Policy
    • Exercise D: Performing a manual SQL Server backup using an Intelligent Policy
    • Exercise E: Deleting a SQL database
    • Exercise F: Restoring a SQL database
  • Module 10 Title Managing Microsoft SharePoint Backups
  • Module 10 Content
    • Introduction to Microsoft SharePoint Server
    • Configuring NetBackup for SharePoint policies
    • SharePoint disaster recovery considerations


    • Exercise A: Configuring a Microsoft SharePoint policy in NetBackup
    • Exercise B: Performing non-NetBackup tasks to enable SharePoint Granular Recovery
    • Exercise C: Performing NetBackup tasks to enable SharePoint Granular Recovery
    • Exercise D: Performing a manual backup using a SharePoint policy
    • Exercise E: Deleting a document from a SharePoint site
    • Exercise F: Performing a SharePoint document restore


  • Module 11 Title Managing Microsoft Exchange Backups
  • Module 11 Content
    • Introduction to Microsoft Exchange Server
    • Configuring NetBackup for Exchange
    • Exchange and high availability environments
    • Monitoring and maintaining Exchange database backups
    • Exchange disaster recovery considerations


    • Exercise A: Configuring a Microsoft Exchange backup policy
    • Exercise B: Performing non-NetBackup pre-requisite tasks for Exchange GRT (Required, but pre-configured)
    • Exercise C: Performing NetBackup tasks to enable Exchange Granular Recovery (GRT)
    • Exercise D: Performing a Microsoft Exchange database backup
    • Exercise E: Performing a Roll-Forward recovery
    • Exercise F: Performing an Exchange GRT database backup
    • Exercise G: Recovering a deleted e-mail message
    • Exercise H: (Optional) Performing Point-in-Time recovery
    • Exercise I: (Optional) Performing full and differential backups of an Exchange database
    • Exercise J: (Optional) Restoring the Exchange database from full and differential backup images
  • Module 12 Title Enhancing Virtual Machine Protection
  • Module 12 Content
    • Protecting virtual machines with applications
    • Using NetBackup Accelerator for virtual machine backups
    • Restoring individual VDMK files


    • Exercise A: Verifying the Exchange Server is powered on
    • Exercise B: Performing prerequisite tasks to enable VMware Application Protection backups of Exchange (Required, but pre-performed)
    • Exercise C: Configuring a VMware policy for MS Exchange application protection
    • Exercise D: Viewing application protection backup for MS Exchange information
    • Exercise E: Performing a GRT restore from an application protection backup image
  • Module 13 Title Disaster Recovery and NetBackup
  • Module 13 Content
    • Disaster recovery strategies
    • Controlling media servers used for restores


    • Exercise A: Configuring and running a NetBackup catalog backup
    • Exercise B: Recovering the NetBackup catalogs with a missing DR file Managing NDMP Backups
  • Module 14 Title Managing NDMP backups
  • Module 14 Content
    • Introduction to NetBackup for NDMP
    • Preparing for NDMP backups
    • Configuring local NDMP backup
    • Configuring remote NDMP backups
    • Accelerator for NDMP filers
    • Protecting a NetApp cDOT NDMP filer
  • Module 15 Title Modern workload protection
  • Module 15 Content
    • Parallel Streaming Framework 
    • Protecting Big Data 
    • Protecting Hyper Converged Infrastructures 
    • Protecting Open Source Data 


    •  Exercise A: Starting Hadoop services 
    •  Exercise B: Configuring Credentials for Hadoop in NetBackup 
    •  Exercise C: Configuring the NetBackup policy 
    •  Exercise D: Performing Hadoop backup 
    •  Exercise E: Restoring Hadoop data 
RM6,750.00(+RM405.00 Tax)
* Training Dates:

Acquire the skills to make your data protection strategy successful with the Veritas NetBackup 9.1: Administration course. You will learn the general principles, configuration, and management of NetBackup, including how to best utilize the NetBackup tools and interfaces, effectively monitor backup operations, and ensure data recovery objectives are met

Additional Info

  • Certification Course only
  • Course Code 00006942
  • Price RM6750
  • Exam Price Exclude
  • Duration 5 Days
  • Principals Veritas
  • Schedule

    4-8 Apr 2022

    16-17 May 2022

    8-12 Aug 2022

    5-9 Dec 2022

  • Audience

    This course is intended for technical professionals responsible for the design, configuration, operation, monitoring, or support of NetBackup.

  • Prerequisities

    Students should be familiar with general network and storage concepts, and the administration and configuration of Windows or Linux operating systems.

  • At Course Completion

    By the completion of this course, you will be able to:

    • • Discuss the challenges of performing backups in today’s enterprise computing environments.
    • • Describe the functions of the master server, media servers, and clients.
    • • Diagram the NetBackup product architecture.
    • • Define common terms used in the NetBackup product.
    • • Describe how NetBackup backs up and restores data.
    • • Identify NetBackup options and agents.
    • • Use the NetBackup Administration Console, Web Interface, and OpsCenter.
    • • Configure and manage basic disk storage units and storage unit groups.
    • • Configure file system backup policies and schedules.
    • • Perform manual backups and user-directed backups.
    • • Restore files using the Java or Windows BAR interface and OpsCenter Operational Restore.
    • • Monitor NetBackup backup and restore jobs and perform basic troubleshooting and information-gathering steps
    • related to failing jobs.
    • • Configure and manage AdvancedDisk storage units and disk pools.
    • • Configure tape-based devices and volume pools; perform a robot inventory.
    • • Manage robot and tape drive settings, including media sharing.
    • • Monitor and manage media and media states.
    • • Configure, run, and manage virtual machine backups using VMware.
    • • Recover virtual machines, including using VMware Instant Recovery.
    • • Use the integrated NetBackup vSphere Web Client Plugin for VMware.
    • • Configure, run, and manage virtual machine backups using Hyper-V.
    • • Describe the various methods of backup image duplication.
    • • Configure Storage Lifecycle Policies (SLPs) and initiate jobs that use SLPs.
    • • Manage the NetBackup catalog to search for, verify, duplicate, import, and expire backup images.
    • • Back up and recover the NetBackup catalogs.
    • • Optimize file system backups using incremental backups, True Image Restore, synthetic backups, NetBackup Accelerator, multiple data streams, and multiplexing.
    • • Identify and use resources for troubleshooting NetBackup, including the support information gathering tools related
  • Module 1 Title Introducing NetBackup
  • Module 1 Content

    • Data protection and the NetBackup environment
    • NetBackup concepts
    • NetBackup Appliance Overview
    • Using the NetBackup Administration Console
    • Using the NetBackup web interface
    • Using NetBackup OpsCenter
    • NetBackup Installation


  • Module 2 Title Configuring NetBackup Storage
  • Module 2 Content

    • NetBackup storage device concepts
    • Configuring and managing a basic disk storage unit
    • Configuring storage unit groups

  • Module 3 Title Configuring Policies
  • Module 3 Content

    • Introduction to backup policies
    • Creating and configuring policy attributes
    • Creating a policy schedule
    • Adding client to a policy
    • Creating backup selections
    • Managing policies

  • Module 4 Title Performing File System Backups
  • Module 4 Content

    • Using and customizing the NetBackup Activity Monitor
    • Performing manual backup operations
    • Performing user-directed backups
    • Backup job-related tips

  • Module 5 Title Performing File System Restores
  • Module 5 Content

    • Introduction to restores
    • Performing restore operations using the BAR interface
    • Performing restore operations using OpsCenter Operational Restore
    • Restore job-related tips

  • Module 6 Title Configuring Disk Pools
  • Module 6 Content

    • Understanding disk pools and AdvancedDisk
    • Configuring AdvancedDisk
    • Managing AdvancedDisk storage

  • Module 7 Title Configuring Media Server Deduplication
  • Module 7 Content

    • Introduction to NetBackup deduplication
    • Configuring NetBackup media server deduplication
    • Configuring client-side deduplication
    • Managing NetBackup deduplication

  • Module 8 Title Configuring Tape Storage
  • Module 8 Content

    • Understanding Media Manager storage units
    • Configuring tape devices
    • Verifying tape storage
    • NetBackup media concepts
    • Configuring media
    • Managing robots and tape drives
    • Monitoring media and media states
    • Managing tapes
    • Media- and device-related tips


  • Module 9 Title Performing VMware Backups
  • Module 9 Content

    •      Introduction to virtual machine backups

    •      Configuring VMware backups

    •      Protecting VMware Assets using the web UI

    •      Performing and Monitoring VM Backups

  • Module 10 Title Performing VMware Restores
  • Module 10 Content

    •      Managing virtual machine restores

    •      Managing VMware restores

    •      Using VMware Instant Recovery

    •      VMware Agentless Restore

  • Module 11 Title Protecting and Recovering Hyper-V Virtual Machines
  • Module 11 Content
    • • Introduction to NetBackup for Hyper-V
    • • Configuring Hyper-V backups
    • • Performing and Monitoring Hyper-V backups
    • • Performing Hyper-V restores
    • • Performing Hyper-V restores with the NetBackup Add-in for SCVMM
  • Module 12 Title Duplicating Backups Using Storage Lifecycle Policies
  • Module 12 Content
    • • Backup duplication concepts
    • • Storage lifecycle policy concepts
    • • Using storage lifecycle policies
    • • Additional Storage Lifecycle Policy features and benefits
  • Module 13 Title Managing and Protecting the NetBackup Catalog
  • Module 13 Content
    • • Introduction to NetBackup catalogs
    • • Managing images
    • • Configuring a catalog backup policy
    • • Disaster recovery strategies
  • Module 14 Title Optimizing File System Backups
  • Module 14 Content
    • • File system backup challenges
    • • Optimizing file system backups
    • • Optimizing file system backups with NetBackup Accelerator
    • • Using multiple data streams
    • • Optimizing tape drive performance using multiplexing
    • • Handling busy files on UNIX and Windows file systems
  • Module 15 Title Collecting Logs and Diagnostic Information
  • Module 15 Content
    • • Performing basic NetBackup troubleshooting
    • • Identifying NetBackup processes, services, and daemons
    • • NetBackup logging overview
    • • Using the support utilities
    • • Using NetBackup support resources
RM6,750.00(+RM405.00 Tax)
* Training Dates:


This Java SE 11 Programming training covers the core language features and Application Programming Interfaces (API) you will use to design object-oriented applications with Java Standard Edition 8 (Java SE 11) Platform.

Learn To:

  • Create Java technology applications with the latest JDK Technology
  • Develop your object-oriented skills
  • Identify good practices in the use of the language to create robust Java application
  • Use Lambda expressions in Java applications
  • Store and manipulate data using collections
  • Manipulate files, directories and file systems
  • Connect to databases using standard SQL queries through JDBC
  • Create high-performance multi-threaded applications

Benefits to You

You can use this course to further develop your skills with the Java language and prepare for the Oracle Certified Professional, Java SE 8 Programmer Exam!



  • Java EE Developers
  • Developer
  • Java Developers


Course Objectives

  • Creating high-performing multi-threaded applications
  • Creating Java technology applications that leverage the object-oriented features of the Java language, such as encapsulation, inheritance, and polymorphism
  • Implementing input/output (I/O) functionality to read from and write to data and text files and understand advanced I/O streams
  • Executing a Java technology application from the command line
  • Manipulating files, directories and file systems using the JDK NIO.2 specification
  • Creating applications that use the Java Collections framework
  • Performing multiple operations on database tables, including creating, reading, updating, and deleting using both JDBC and JPA technology
  • Searching and filter collections using Lambda Expressions
  • Implementing error-handling techniques using exception handling
  • Using Lambda Expression concurrency features


Course Outline

Java Platform Overview
• Defining how the Java language achieves platform independence
• Differentiating between the Java ME, Java SE, and Java EE Platforms
• Evaluating Java libraries, middle-ware, and database options
• Defining how the Java language continues to evolve

Java Syntax and Class Review
• Creating simple Java classes
• Creating primitive variables
• Using operators
• Creating and manipulate strings
• Using if-else and switch statements
• Iterating with loops: while,do-while,for,enhanced for
• Creating arrays
• Using Java fields, constructors, and methods

Encapsulation and Subclassing
• Using encapsulation in Java class design
• Modeling business problems using Java classes
• Making classes immutable
• Creating and use Java subclasses
• Overloading methods

Overriding Methods, Polymorphism, and Static Classes
• Using access levels: private, protected, default, and public.
• Overriding methods
• Using virtual method invocation
• Using varargs to specify variable arguments
• Using the instanceof operator to compare object types
• Using upward and downward casts
• Modeling business problems by using the static keyword
• Implementing the singleton design pattern

Abstract and Nested Classes
• Designing general-purpose base classes by using abstract classes
• Constructing abstract Java classes and subclasses
• Applying final keyword in Java
• Distinguish between top-level and nested classes

Interfaces and Lambda Expressions
• Defining a Java interface
• Choosing between interface inheritance and class inheritance
• Extending an interface
• Defaulting methods
• Anonymous inner classes
• Defining a Lambda Expression

Collections and Generics
• Creating a custom generic class
• Using the type inference diamond to create an object
• Creating a collection by using generics
• Implementing an ArrayList
• Implementing a TreeSet
• Implementing a HashMap
• Implementing a Deque
• Ordering collections

Collections Streams, and Filters
• Describing the Builder pattern
• Iterating through a collection using lambda syntax
• Describing the Stream interface
• Filtering a collection using lambda expressions
• Calling an existing method using a method reference
• Chaining multiple methods together
• Defining pipelines in terms of lambdas and collections

Lambda Built-in Functional Interfaces
• Listing the built-in interfaces included in java.util.function
• Core interfaces - Predicate, Consumer, Function, Supplier
• Using primitive versions of base interfaces
• Using binary versions of base interfaces

Lambda Operations
• Extracting data from an object using map
• Describing the types of stream operations
• Describing the Optional class
• Describing lazy processing
• Sorting a stream
• Saving results to a collection using the collect method
• Grouping and partition data using the Collectors class

Exceptions and Assertions
• Defining the purpose of Java exceptions
• Using the try and throw statements
• Using the catch, multi-catch, and finally clauses
• Autoclose resources with a try-with-resources statement
• Recognizing common exception classes and categories
• Creating custom exceptions
• Testing invariants by using assertions

Java Date/Time API
• Creating and manage date-based events
• Creating and manage time-based events
• Combining date and time into a single object
• Working with dates and times across time zones
• Managing changes resulting from daylight savings
• Defining and create timestamps, periods and durations
• Applying formatting to local and zoned dates and times

I/O Fundamentals
• Describing the basics of input and output in Java
• Read and write data from the console
• Using streams to read and write files
• Writing and read objects using serialization

File I/O (NIO.2)
• Using the Path interface to operate on file and directory paths
• Using the Files class to check, delete, copy, or move a file or directory
• Using Stream API with NIO2

• Describing operating system task scheduling
• Creating worker threads using Runnable and Callable
• Using an ExecutorService to concurrently execute tasks
• Identifying potential threading problems
• Using synchronized and concurrent atomic to manage atomicity
• Using monitor locks to control the order of thread execution
• Using the java.util.concurrent collections

The Fork-Join Framework
• Parallelism
• The need for Fork-Join
• Work stealing
• RecursiveTask
• RecursiveTask

Parallel Streams
• Reviewing the key characteristics of streams
• Describing how to make a stream pipeline execute in parallel
• List the key assumptions needed to use a parallel pipeline
• Defining reduction
• Describing why reduction requires an associative function
• Calculating a value using reduce
• Describing the process for decomposing and then merging work
• Listing the key performance considerations for parallel streams

Database Applications with JDBC
• Defining the layout of the JDBC API
• Connecting to a database by using a JDBC driver
• Submitting queries and get results from the database
• Specifying JDBC driver information externally
• Performing CRUD operations using the JDBC API

• Describing the advantages of localizing an application
• Defining what a locale represents
• Read and set the locale by using the Locale object
• Building a resource bundle for each locale
• Calling a resource bundle from an application
• Changing the locale for a resource bundle

Additional Info

  • Certification Course only
  • Course Code JAVA
  • Exam Price Exclude
RM5,500.00(+RM330.00 Tax)

AWS Training and Certification Complete Bundle 

(Fundamental + Associates) AWS Training Courses + Exam Promotion!

AWS Certification validates cloud expertise to help professionals highlight in-demand skills and organizations build effective, innovative teams for cloud initiatives using AWS. Get certified with this complete bundle, even if you are new in cloud computing. 


AWS Solutions Architect Pathway - RM 5,400 (Inclusive Associate Exam)

Training Dates: 20, 23-25 May 2022/ 13 June & 5-7 July 2022

Inclusive Training Courses Below:

  • AWS Technical Essentials (AWS-TE)
  • Architecting on AWS (AWS-ARC)


AWS Systems Operations Pathway - RM 5,400 (Inclusive Associate Exam)

Training Dates: 27 May&14-16 June 2022/ 13 June & 18-20 July 2022

Inclusive Training Courses Below:

  • AWS Technical Essentials (AWS-TE)
  • System operations on AWS (AWS-SO)


AWS Developer Pathway - RM 5,400 (Inclusive Associate Exam)

Training Dates: 13-16 June 2022

Inclusive Training Courses Below:

  • AWS Technical Essentials (AWS-TE)
  • Developing on AWS (AWS-DEV)


Terms & Conditions

1. The above promotion price is exclusive of SST.

2. The above promotion price is inclusive of an associate exam.

3. Iverson reserves the right to amend the terms & conditions without giving prior notice.



For further information, please contact us at:

Iverson Associates Sdn Bhd (303330-M)
Tel: +603 7726 2678 / +6012 602 6277
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.


Skills measured

  • The content of this exam was updated on September 24, 2021. Please download the exam skills outline below to see what changed.
  • Manage Azure identities and governance (15-20%)
  • Implement and manage storage (15-20%)
  • Deploy and manage Azure compute resources (20-25%)
  • Configure and manage virtual networking (25-30%)
  • Monitor and back up Azure resources (10-15%)


Training Date: 10-13 May 2022


Have you updated your Microsoft Azure skills recently? Join the Surface Your Creds challenge and stand a chance to win Surface devices and other fantastic prizes to help you on your journey in IT.

Surface Your Creds & Swag Giveaway


Prize include

Grand Prize - 1 x Surface Go 3

Special Prize - 2 x Xbox Wireless Stereo Headset

How to participate 

Challenge ends 24 June 2022, 9:00 PM SGT. 

The top 3 winners will be determined based on the total sum of reactions, comments, and direct shares of your post!


Submit my Surface Your Creds & Swag Giveaway Contest

*Which certification exam have you completed:
Please choose one
*Certification ID:
Please insert the certification ID
*Is your region Malaysia:
Invalid Input
*Full Name:
Please insert your full name
*Company Name:
Please insert your company name
*Business Email:
Please insert your business email
*Mobile Number:
Please insert your mobile no.
*LinkedIn URL:
Please insert the LinkedIn URL
*Linkedin posting screenshot:
Please upload the LinkedIn posting screenshot
*Transcript screenshot:
Please upload the transcript screenshot
(Please ensure your file is in PDF, JPG, JPEG or PNG format and not more than 3MB.)

By submitting this entry:

  • I agree with Iverson privacy policy.
  • I have completed posting digital badge and added Microsoft azure skillset in LinkedIn
Verification is required

For more details, please read the Terms & Conditions


For further information, please contact us at:

Iverson Associates Sdn Bhd (303330-M)
Tel: +603 7726 2678 // +6012 602 6277
E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Payment for 

1. Item:  AZ-900: Azure Fundamentals With Labs - VILT

Training Date: 9-10May 2022

Fees: RM 2300


2. Item: Microsoft Excel 2019 Intermediate - VILT

Training Date: 1st June 2022

Fees: RM390


3. Microsoft Excel 2019 Advanced VILT

Training Date: 2nd June 2022

Fees: RM390

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline