{"course":{"productid":30081,"modality":6,"active":true,"language":"fr","title":"Data Protection and Management","productcode":"DPM","vendorcode":"EM","vendorname":"Dell EMC","fullproductcode":"EM-DPM","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/emc-dpm","objective":"<p>Upon successful completion of this course, participants should be able to:\n<\/p>\n<ul>\n<li>Explain data protection architecture and its building blocks<\/li><li>Evaluate fault-tolerance techniques in a data center<\/li><li>Describe data backup methods and data deduplication<\/li><li>Describe data replication, data archiving and data migration methods<\/li><li>Describe the data protection process in a software-defined data center<\/li><li>Articulate cloud-based data protection techniques<\/li><li>Describe various solutions for protecting Big Data, cloud and mobile device data<\/li><li>Describe security controls and management processes in a data protection environment<\/li><\/ul>","essentials":"<ul>\n<li>To understand the content and successfully complete this course, a participant must have a basic knowledge of computer architecture, operating systems, networking, and databases.<\/li><li>Participants with experience in data protection management would also be able to assimilate the course material.<\/li><\/ul>","audience":"<p>This course is intended for all audiences.<\/p>","contents":"<h5>Introduction to Data Protection<\/h5><ul>\n<li>Data Protection Primer<\/li><li>Data Center<\/li><li>Data Protection and Availability Solutions<\/li><\/ul><h5>Data Protection Architecture<\/h5><ul>\n<li>Data Source &ndash; Application and Hypervisor<\/li><li>Data Source &ndash; Primary Storage<\/li><li>Protection Application and Storage<\/li><li>Data Security and Management<\/li><\/ul><h5>Fault-Tolerance Techniques<\/h5><ul>\n<li>Fault-Tolerance Overview<\/li><li>Fault Tolerance Techniques &ndash; Compute and Network<\/li><li>Fault Tolerance Techniques &ndash; Storage<\/li><li>Fault Tolerance Techniques &ndash; Application and Availability Zone<\/li><\/ul><h5>Data Backup<\/h5><ul>\n<li>Introduction to Backup<\/li><li>Backup Topologies<\/li><li>Backup Methods<\/li><\/ul><h5>Data Deduplication<\/h5><ul>\n<li>Data Deduplication Overview<\/li><li>Deduplication Granularity and Methods<\/li><\/ul><h5>Replication<\/h5><ul>\n<li>Data Replication Overview<\/li><li>Local Replication<\/li><li>Remote Replication<\/li><\/ul><h5>Data Archiving<\/h5><ul>\n<li>Data Archiving Overview<\/li><li>Archiving Operation and Storage<\/li><\/ul><h5>Data Migration<\/h5><ul>\n<li>SAN-Based Data Migration<\/li><li>NAS-Based Data Migration<\/li><li>Host-Based Data Migration<\/li><li>Application-Based Data Migration<\/li><\/ul><h5>Data Protection in Software-Defined Data Center<\/h5><ul>\n<li>Software-Defined Data Center Overview<\/li><li>Software-Defined Compute, Storage, and Networking<\/li><li>Data Protection Process in SDDC<\/li><\/ul><h5>Cloud-based Data Protection<\/h5><ul>\n<li>Cloud Computing Overview<\/li><li>Cloud-Based Data Protection<\/li><li>Cloud-Based Data Archiving<\/li><\/ul><h5>Protecting Big Data and Mobile Device Data<\/h5><ul>\n<li>Big Data Overview<\/li><li>Protecting Big Data<\/li><li>Protecting Mobile Device<\/li><\/ul><h5>Securing Data Protection Environment<\/h5><ul>\n<li>Overview of Data Security<\/li><li>Security Threats in Data Protection Environment<\/li><li>Security Controls in Data Protection Environment &ndash; 1<\/li><li>Security Controls in Data Protection Environment &ndash; 2<\/li><li>Cyber Recovery<\/li><\/ul><h5>Managing the Data Protection Environment<\/h5><ul>\n<li>Introduction to Data Protection Management<\/li><li>Operations Management &ndash; 1<\/li><li>Operations Management &ndash; 2<\/li><\/ul>","outline":"<h5>Introduction to Data Protection<\/h5><ul>\n<li>Data Protection Primer<\/li><li>Data Center<\/li><li>Data Protection and Availability Solutions<\/li><\/ul><h5>Data Protection Architecture<\/h5><ul>\n<li>Data Source &ndash; Application and Hypervisor<\/li><li>Data Source &ndash; Primary Storage<\/li><li>Protection Application and Storage<\/li><li>Data Security and Management<\/li><\/ul><h5>Fault-Tolerance Techniques<\/h5><ul>\n<li>Fault-Tolerance Overview<\/li><li>Fault Tolerance Techniques &ndash; Compute and Network<\/li><li>Fault Tolerance Techniques &ndash; Storage<\/li><li>Fault Tolerance Techniques &ndash; Application and Availability Zone<\/li><\/ul><h5>Data Backup<\/h5><ul>\n<li>Introduction to Backup<\/li><li>Backup Topologies<\/li><li>Backup Methods<\/li><\/ul><h5>Data Deduplication<\/h5><ul>\n<li>Data Deduplication Overview<\/li><li>Deduplication Granularity and Methods<\/li><\/ul><h5>Replication<\/h5><ul>\n<li>Data Replication Overview<\/li><li>Local Replication<\/li><li>Remote Replication<\/li><\/ul><h5>Data Archiving<\/h5><ul>\n<li>Data Archiving Overview<\/li><li>Archiving Operation and Storage<\/li><\/ul><h5>Data Migration<\/h5><ul>\n<li>SAN-Based Data Migration<\/li><li>NAS-Based Data Migration<\/li><li>Host-Based Data Migration<\/li><li>Application-Based Data Migration<\/li><\/ul><h5>Data Protection in Software-Defined Data Center<\/h5><ul>\n<li>Software-Defined Data Center Overview<\/li><li>Software-Defined Compute, Storage, and Networking<\/li><li>Data Protection Process in SDDC<\/li><\/ul><h5>Cloud-based Data Protection<\/h5><ul>\n<li>Cloud Computing Overview<\/li><li>Cloud-Based Data Protection<\/li><li>Cloud-Based Data Archiving<\/li><\/ul><h5>Protecting Big Data and Mobile Device Data<\/h5><ul>\n<li>Big Data Overview<\/li><li>Protecting Big Data<\/li><li>Protecting Mobile Device<\/li><\/ul><h5>Securing Data Protection Environment<\/h5><ul>\n<li>Overview of Data Security<\/li><li>Security Threats in Data Protection Environment<\/li><li>Security Controls in Data Protection Environment &ndash; 1<\/li><li>Security Controls in Data Protection Environment &ndash; 2<\/li><li>Cyber Recovery<\/li><\/ul><h5>Managing the Data Protection Environment<\/h5><ul>\n<li>Introduction to Data Protection Management<\/li><li>Operations Management &ndash; 1<\/li><li>Operations Management &ndash; 2<\/li><\/ul>","summary":"<p>Data Protection and Management (DPM) is a unique course that provides a comprehensive understanding of various data protection and availability solutions for modern data protection wherever data lives including Cloud, data center or edge devices. It enables participants to make informed decisions on data protection architecture and technologies in an increasingly complex IT environment, which is fast changing with the adoption of software-defined data center (SDDC) and Cloud, Big Data, Social, and Edge. This course provides a strong understanding of faulttolerant IT infrastructure, data backup, data deduplication, data replication, data archiving, and data migration and prepares participants for advanced data protection concepts, technologies, and processes. Participants will learn cloud-based data protection techniques, SDDC-specific data protection, and solutions for protecting Big Data, cloud and mobile device data. Moreover, the course covers the highly critical areas of data security including ransomware protection, cyber recovery as well as the emerging need for data management and data governance. This course takes an open approach to describe all the concepts and technologies, which are further illustrated and reinforced with Dell EMC related product examples.<\/p>","objective_plain":"Upon successful completion of this course, participants should be able to:\n\n\n\n- Explain data protection architecture and its building blocks\n- Evaluate fault-tolerance techniques in a data center\n- Describe data backup methods and data deduplication\n- Describe data replication, data archiving and data migration methods\n- Describe the data protection process in a software-defined data center\n- Articulate cloud-based data protection techniques\n- Describe various solutions for protecting Big Data, cloud and mobile device data\n- Describe security controls and management processes in a data protection environment","essentials_plain":"- To understand the content and successfully complete this course, a participant must have a basic knowledge of computer architecture, operating systems, networking, and databases.\n- Participants with experience in data protection management would also be able to assimilate the course material.","audience_plain":"This course is intended for all audiences.","contents_plain":"Introduction to Data Protection\n\n\n- Data Protection Primer\n- Data Center\n- Data Protection and Availability Solutions\nData Protection Architecture\n\n\n- Data Source \u2013 Application and Hypervisor\n- Data Source \u2013 Primary Storage\n- Protection Application and Storage\n- Data Security and Management\nFault-Tolerance Techniques\n\n\n- Fault-Tolerance Overview\n- Fault Tolerance Techniques \u2013 Compute and Network\n- Fault Tolerance Techniques \u2013 Storage\n- Fault Tolerance Techniques \u2013 Application and Availability Zone\nData Backup\n\n\n- Introduction to Backup\n- Backup Topologies\n- Backup Methods\nData Deduplication\n\n\n- Data Deduplication Overview\n- Deduplication Granularity and Methods\nReplication\n\n\n- Data Replication Overview\n- Local Replication\n- Remote Replication\nData Archiving\n\n\n- Data Archiving Overview\n- Archiving Operation and Storage\nData Migration\n\n\n- SAN-Based Data Migration\n- NAS-Based Data Migration\n- Host-Based Data Migration\n- Application-Based Data Migration\nData Protection in Software-Defined Data Center\n\n\n- Software-Defined Data Center Overview\n- Software-Defined Compute, Storage, and Networking\n- Data Protection Process in SDDC\nCloud-based Data Protection\n\n\n- Cloud Computing Overview\n- Cloud-Based Data Protection\n- Cloud-Based Data Archiving\nProtecting Big Data and Mobile Device Data\n\n\n- Big Data Overview\n- Protecting Big Data\n- Protecting Mobile Device\nSecuring Data Protection Environment\n\n\n- Overview of Data Security\n- Security Threats in Data Protection Environment\n- Security Controls in Data Protection Environment \u2013 1\n- Security Controls in Data Protection Environment \u2013 2\n- Cyber Recovery\nManaging the Data Protection Environment\n\n\n- Introduction to Data Protection Management\n- Operations Management \u2013 1\n- Operations Management \u2013 2","outline_plain":"Introduction to Data Protection\n\n\n- Data Protection Primer\n- Data Center\n- Data Protection and Availability Solutions\nData Protection Architecture\n\n\n- Data Source \u2013 Application and Hypervisor\n- Data Source \u2013 Primary Storage\n- Protection Application and Storage\n- Data Security and Management\nFault-Tolerance Techniques\n\n\n- Fault-Tolerance Overview\n- Fault Tolerance Techniques \u2013 Compute and Network\n- Fault Tolerance Techniques \u2013 Storage\n- Fault Tolerance Techniques \u2013 Application and Availability Zone\nData Backup\n\n\n- Introduction to Backup\n- Backup Topologies\n- Backup Methods\nData Deduplication\n\n\n- Data Deduplication Overview\n- Deduplication Granularity and Methods\nReplication\n\n\n- Data Replication Overview\n- Local Replication\n- Remote Replication\nData Archiving\n\n\n- Data Archiving Overview\n- Archiving Operation and Storage\nData Migration\n\n\n- SAN-Based Data Migration\n- NAS-Based Data Migration\n- Host-Based Data Migration\n- Application-Based Data Migration\nData Protection in Software-Defined Data Center\n\n\n- Software-Defined Data Center Overview\n- Software-Defined Compute, Storage, and Networking\n- Data Protection Process in SDDC\nCloud-based Data Protection\n\n\n- Cloud Computing Overview\n- Cloud-Based Data Protection\n- Cloud-Based Data Archiving\nProtecting Big Data and Mobile Device Data\n\n\n- Big Data Overview\n- Protecting Big Data\n- Protecting Mobile Device\nSecuring Data Protection Environment\n\n\n- Overview of Data Security\n- Security Threats in Data Protection Environment\n- Security Controls in Data Protection Environment \u2013 1\n- Security Controls in Data Protection Environment \u2013 2\n- Cyber Recovery\nManaging the Data Protection Environment\n\n\n- Introduction to Data Protection Management\n- Operations Management \u2013 1\n- Operations Management \u2013 2","summary_plain":"Data Protection and Management (DPM) is a unique course that provides a comprehensive understanding of various data protection and availability solutions for modern data protection wherever data lives including Cloud, data center or edge devices. It enables participants to make informed decisions on data protection architecture and technologies in an increasingly complex IT environment, which is fast changing with the adoption of software-defined data center (SDDC) and Cloud, Big Data, Social, and Edge. This course provides a strong understanding of faulttolerant IT infrastructure, data backup, data deduplication, data replication, data archiving, and data migration and prepares participants for advanced data protection concepts, technologies, and processes. Participants will learn cloud-based data protection techniques, SDDC-specific data protection, and solutions for protecting Big Data, cloud and mobile device data. Moreover, the course covers the highly critical areas of data security including ransomware protection, cyber recovery as well as the emerging need for data management and data governance. This course takes an open approach to describe all the concepts and technologies, which are further illustrated and reinforced with Dell EMC related product examples.","skill_level":"Intermediate","version":"1.0","duration":{"unit":"d","value":4,"formatted":"4 jours"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"USD","taxrate":19,"price":2400},"CH":{"country":"CH","currency":"USD","taxrate":8.1,"price":2400},"AE":{"country":"AE","currency":"USD","taxrate":5,"price":2400},"AT":{"country":"AT","currency":"USD","taxrate":20,"price":2400},"FR":{"country":"FR","currency":"EUR","taxrate":19.6,"price":2040},"SI":{"country":"SI","currency":"USD","taxrate":20,"price":2400}}},"lastchanged":"2026-02-23T15:46:34+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/30081","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/emc-dpm"}}