Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.
At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.
Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.
Data Protection and Management (DPM) is a unique course that provides a comprehensive understanding of various data protection and availability solutions for traditional and modern data centers. It enables participants to make informed decisions on data protection architecture and technologies in an increasingly complex IT environment, which is fast changing with the adoption of software-defined data center (SDDC) and third platform technologies (Cloud, Big Data, Social, and Mobile Technologies). This course provides a strong understanding of fault-tolerant IT infrastructure, data backup, data deduplication, data replication, data archiving, and data migration and prepares participants for advanced data protection concepts, technologies, and processes. Participants will learn cloud-based data protection techniques, SDDC-specific data protection, and solutions for protecting Big data and mobile device data. Moreover, it covers the highly-critical areas of data security and data protection management. This course takes an open-approach to describe all the concepts and technologies, which are further illustrated and reinforced with EMC-related product examples.
This course is intended for:
Upon successful completion of this course, participants should be able to:
Available upon request