Veritas Backup Exec 22: Administration

Training Summary
Acquire the skills to make your data protection strategy successful with the Veritas Backup Exec 22: Administration course. The course is designed for the data protection professional tasked with deploying, configuring, maintaining, and managing a Backup Exec environment. The course covers Backup Exec concepts, how to back up and restore critical data, configure storage devices and media, and work with various Backup Exec agents and options, which protect applications like Microsoft Exchange, Microsoft SharePoint, Microsoft SQL, Microsoft 365, Active Directory, Cloud, Oracle, and Virtual environments.
You must have a basic working knowledge of administrating and configuring Windows Server 2016 and later platforms. Basic working knowledge of the following applications is beneficial, but not required:
  • Microsoft SQL Server
  • Microsoft Exchange Server
  • Microsoft SharePoint Portal Server
  • Microsoft Hyper-V
  • VMware virtual infrastructure.
  • Oracle
  • Cloud Technologies
  • Microsoft 365
5 Days/Lecture & Lab
This course is designed for system administrators, system engineers, technical support personnel, consultants, backup administrators, backup operators, and others who are responsible for installing, configuring, managing, and monitoring Backup Exec 22.
Course Topics
  • Backup Exec Fundamentals
  • Licensing Backup Exec
  • Installing Backup Exec
  • Working with the Backup Exec Administration Console
  • Disk Storage Devices
  • Cloud-based Storage Devices
  • Network Storage Devices
  • Disk and Network Data Management
  • Tape Devices and Tape Management
  • Backing Up Data
  • Managing Servers and Jobs
  • Restoring Data
  • Working with the Database Encryption Key
  • Simplified Disaster Recovery
  • Upgrading Backup Exec
  • Central Admin Server Feature
  • Deduplication Feature
  • Security and Compliance Features
  • Remote Agent, Applications, and Databases
  • Protecting Microsoft Exchange Server
  • Protecting Microsoft SQL Server
  • Protecting Microsoft SharePoint Server
  • Protecting Microsoft Active Directory
  • Protecting Virtual Environments – Part 1
  • Protecting Virtual Environments – Part 2
  • Performing Virtual Machine Conversions
  • Agent for Linux and UNIX
  • Agent for Oracle

Related Scheduled Courses