fbpx

Training with Iverson classes

Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.

At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.

Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.

Data Protection and Management (DPM) is a unique course that provides a comprehensive understanding of various data protection and availability solutions for modern data protection wherever data lives including Cloud, data center or edge devices. It enables participants to make informed decisions on data protection architecture and technologies in an increasingly complex IT environment, which is fast changing with the adoption of software-defined data center (SDDC) and Cloud, Big Data, Social, and Edge. This course provides a strong understanding of fault tolerant IT infrastructure, data backup, data deduplication, data replication, data archiving, and data migration and prepares participants for advanced data protection concepts, technologies, and processes. Participants will learn cloud-based data protection techniques, SDDC-specific data protection, and solutions for protecting Big Data, cloud and mobile device data. Moreover, the course covers the highly critical areas of data security including ransomware protection, cyber recovery as well as the emerging need for data management and data governance. This course takes an open approach to describe all the concepts and technologies, which are further illustrated and reinforced with Dell EMC related product examples.

Additional Info

  • Certification Course & Certificate
  • Course Code DPM
  • Price RM9800
  • Exam Price Exclude
  • Exam Code DEA-3TT2
  • Duration 4 Days
  • CertificationInfo Associate - Data Protection and Management (DCA-DPM)
  • Principals Dell-EMC
  • Schedule

    8-11 Jan 2024

    22-25 Apr 2024

    15-18 Jul 2024

    7-10 Oct 2024

  • Audience

    This course is intended for all audiences.

  • Prerequisities
    • To understand the content and successfully complete this course, a participant must have a basic knowledge of computer architecture, operating systems, networking, and databases.
    • Participants with experience in data protection management would also be able to assimilate the course material.
  • At Course Completion

    Upon successful completion of this course, participants should be able to:

    • Explain data protection architecture and its building blocks
    • Evaluate fault-tolerance techniques in a data center
    • Describe data backup methods and data deduplication
    • Describe data replication, data archiving and data migration methods
    • Describe the data protection process in a software-defined data center
    • Articulate cloud-based data protection techniques
    • Describe various solutions for protecting Big Data, cloud and mobile device data
    • Describe security controls and management processes in a data protection environment
  • Module 1 Title Introduction to Data Protection
  • Module 1 Content
    • Lesson 1: Data Protection Primer
    • Lesson 2: Data Center
    • Lesson 3: Data Protection and Availability Solutions
  • Module 2 Title Data Protection Architecture
  • Module 2 Content
    • Lesson 1: Data Source – Application and Hypervisor
    • Lesson 2: Data Source – Primary Storage
    • Lesson 3: Protection Application and Storage
    • Lesson 4: Data Security and Management
  • Module 3 Title Fault-Tolerance Techniques
  • Module 3 Content
    • Lesson 1: Fault-Tolerance Overview
    • Lesson 2: Fault Tolerance Techniques – Compute and Network
    • Lesson 3: Fault Tolerance Techniques – Storage
    • Lesson 4: Fault Tolerance Techniques – Application and Availability Zone
  • Module 4 Title Data Backup
  • Module 4 Content
    • Lesson 1: Introduction to Backup
    • Lesson 2: Backup Topologies
    • Lesson 3: Backup Methods
  • Module 5 Title Data Deduplication
  • Module 5 Content
    • Lesson 1: Data Deduplication Overview
    • Lesson 2: Deduplication Granularity and Methods
  • Module 6 Title Replication
  • Module 6 Content
    • Lesson 1: Data Replication Overview
    • Lesson 2: Local Replication
    • Lesson 3: Remote Replication
  • Module 7 Title Data Archiving
  • Module 7 Content
    • Lesson 1: Data Archiving Overview
    • Lesson 2: Archiving Operation and Storage
  • Module 8 Title Data Migration
  • Module 8 Content
    • Lesson 1: SAN -Based Data Migration
    • Lesson 2: NAS-Based Data Migration
    • Lesson 3: Host-Based Data Migration
    • Lesson 4: Application-Based Data Migration
  • Module 9 Title Data Protection in Software-Defined Data Center
  • Module 9 Content
    • Lesson 1: Software-Defined Data Center Overview
    • Lesson 2: Software-Defined Compute, Storage, and Networking
    • Lesson 3: Data Protection Process in SDDC
  • Module 10 Title Cloud-based Data Protection
  • Module 10 Content
    • Lesson 1: Cloud Computing Overview
    • Lesson 2: Cloud-Based Data Protection
    • Lesson 3: Cloud-Based Data Archiving
  • Module 11 Title Protecting Big Data and Mobile Device Data
  • Module 11 Content
    • Lesson 1: Big Data Overview
    • Lesson 2: Protecting Big Data
    • Lesson 3: Protecting Mobile Device
  • Module 12 Title Securing Data Protection Environment
  • Module 12 Content
    • Lesson 1: Overview of Data Security
    • Lesson 2: Security Threats in Data Protection Environment
    • Lesson 3: Security Controls in Data Protection Environment – I
    • Lesson 4: Security Controls in Data Protection Environment – II
    • Cyber Recovery
  • Module 13 Title Managing the Data Protection Environment
  • Module 13 Content
    • Lesson 1: Introduction to Data Protection Management
    • Lesson 2: Operations Management – I
    • Lesson 3: Operations Management – II
  • Module 14 Content
  • Module 15 Content
  • Module 16 Content
  • Module 17 Content
  • Module 18 Content
  • Module 19 Content
  • Module 20 Content
  • Module 21 Content
  • Module 22 Content
  • Module 23 Content
  • Module 24 Content
  • Module 25 Content
  • Module 26 Content
  • Module 27 Content
  • Module 28 Content
  • Module 29 Content
  • Module 30 Content
  • Module 31 Content
  • Module 32 Content
  • Module 33 Content
  • Module 34 Content
  • Module 35 Content
  • Module 36 Content
  • Module 37 Content
  • Module 38 Content
  • Module 39 Content
  • Module 40 Content
  • Module 41 Content
  • Module 42 Content
  • Module 43 Content
  • Module 44 Content
  • Module 45 Content
  • Module 46 Content
  • Module 47 Content
  • Module 48 Content
  • Module 49 Content
  • Module 50 Content
RM9,800.00(+RM784.00 Tax)
* Training Dates:

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline