<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="30081" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/emc-dpm" lastchanged="2026-02-23T15:46:34+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Data Protection and Management</title><productcode>DPM</productcode><vendorcode>EM</vendorcode><vendorname>Dell EMC</vendorname><fullproductcode>EM-DPM</fullproductcode><version>1.0</version><objective>&lt;p&gt;Upon successful completion of this course, participants should be able to:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain data protection architecture and its building blocks&lt;/li&gt;&lt;li&gt;Evaluate fault-tolerance techniques in a data center&lt;/li&gt;&lt;li&gt;Describe data backup methods and data deduplication&lt;/li&gt;&lt;li&gt;Describe data replication, data archiving and data migration methods&lt;/li&gt;&lt;li&gt;Describe the data protection process in a software-defined data center&lt;/li&gt;&lt;li&gt;Articulate cloud-based data protection techniques&lt;/li&gt;&lt;li&gt;Describe various solutions for protecting Big Data, cloud and mobile device data&lt;/li&gt;&lt;li&gt;Describe security controls and management processes in a data protection environment&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;To understand the content and successfully complete this course, a participant must have a basic knowledge of computer architecture, operating systems, networking, and databases.&lt;/li&gt;&lt;li&gt;Participants with experience in data protection management would also be able to assimilate the course material.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is intended for all audiences.&lt;/p&gt;</audience><contents>&lt;h5&gt;Introduction to Data Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Protection Primer&lt;/li&gt;&lt;li&gt;Data Center&lt;/li&gt;&lt;li&gt;Data Protection and Availability Solutions&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Protection Architecture&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Source &amp;ndash; Application and Hypervisor&lt;/li&gt;&lt;li&gt;Data Source &amp;ndash; Primary Storage&lt;/li&gt;&lt;li&gt;Protection Application and Storage&lt;/li&gt;&lt;li&gt;Data Security and Management&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Fault-Tolerance Techniques&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Fault-Tolerance Overview&lt;/li&gt;&lt;li&gt;Fault Tolerance Techniques &amp;ndash; Compute and Network&lt;/li&gt;&lt;li&gt;Fault Tolerance Techniques &amp;ndash; Storage&lt;/li&gt;&lt;li&gt;Fault Tolerance Techniques &amp;ndash; Application and Availability Zone&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Backup&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to Backup&lt;/li&gt;&lt;li&gt;Backup Topologies&lt;/li&gt;&lt;li&gt;Backup Methods&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Deduplication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Deduplication Overview&lt;/li&gt;&lt;li&gt;Deduplication Granularity and Methods&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Replication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Replication Overview&lt;/li&gt;&lt;li&gt;Local Replication&lt;/li&gt;&lt;li&gt;Remote Replication&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Archiving&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Archiving Overview&lt;/li&gt;&lt;li&gt;Archiving Operation and Storage&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Migration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;SAN-Based Data Migration&lt;/li&gt;&lt;li&gt;NAS-Based Data Migration&lt;/li&gt;&lt;li&gt;Host-Based Data Migration&lt;/li&gt;&lt;li&gt;Application-Based Data Migration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Protection in Software-Defined Data Center&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Software-Defined Data Center Overview&lt;/li&gt;&lt;li&gt;Software-Defined Compute, Storage, and Networking&lt;/li&gt;&lt;li&gt;Data Protection Process in SDDC&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Cloud-based Data Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cloud Computing Overview&lt;/li&gt;&lt;li&gt;Cloud-Based Data Protection&lt;/li&gt;&lt;li&gt;Cloud-Based Data Archiving&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Protecting Big Data and Mobile Device Data&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Big Data Overview&lt;/li&gt;&lt;li&gt;Protecting Big Data&lt;/li&gt;&lt;li&gt;Protecting Mobile Device&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Securing Data Protection Environment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Data Security&lt;/li&gt;&lt;li&gt;Security Threats in Data Protection Environment&lt;/li&gt;&lt;li&gt;Security Controls in Data Protection Environment &amp;ndash; 1&lt;/li&gt;&lt;li&gt;Security Controls in Data Protection Environment &amp;ndash; 2&lt;/li&gt;&lt;li&gt;Cyber Recovery&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Managing the Data Protection Environment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to Data Protection Management&lt;/li&gt;&lt;li&gt;Operations Management &amp;ndash; 1&lt;/li&gt;&lt;li&gt;Operations Management &amp;ndash; 2&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Introduction to Data Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Protection Primer&lt;/li&gt;&lt;li&gt;Data Center&lt;/li&gt;&lt;li&gt;Data Protection and Availability Solutions&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Protection Architecture&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Source &amp;ndash; Application and Hypervisor&lt;/li&gt;&lt;li&gt;Data Source &amp;ndash; Primary Storage&lt;/li&gt;&lt;li&gt;Protection Application and Storage&lt;/li&gt;&lt;li&gt;Data Security and Management&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Fault-Tolerance Techniques&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Fault-Tolerance Overview&lt;/li&gt;&lt;li&gt;Fault Tolerance Techniques &amp;ndash; Compute and Network&lt;/li&gt;&lt;li&gt;Fault Tolerance Techniques &amp;ndash; Storage&lt;/li&gt;&lt;li&gt;Fault Tolerance Techniques &amp;ndash; Application and Availability Zone&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Backup&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to Backup&lt;/li&gt;&lt;li&gt;Backup Topologies&lt;/li&gt;&lt;li&gt;Backup Methods&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Deduplication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Deduplication Overview&lt;/li&gt;&lt;li&gt;Deduplication Granularity and Methods&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Replication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Replication Overview&lt;/li&gt;&lt;li&gt;Local Replication&lt;/li&gt;&lt;li&gt;Remote Replication&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Archiving&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Data Archiving Overview&lt;/li&gt;&lt;li&gt;Archiving Operation and Storage&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Migration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;SAN-Based Data Migration&lt;/li&gt;&lt;li&gt;NAS-Based Data Migration&lt;/li&gt;&lt;li&gt;Host-Based Data Migration&lt;/li&gt;&lt;li&gt;Application-Based Data Migration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Data Protection in Software-Defined Data Center&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Software-Defined Data Center Overview&lt;/li&gt;&lt;li&gt;Software-Defined Compute, Storage, and Networking&lt;/li&gt;&lt;li&gt;Data Protection Process in SDDC&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Cloud-based Data Protection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Cloud Computing Overview&lt;/li&gt;&lt;li&gt;Cloud-Based Data Protection&lt;/li&gt;&lt;li&gt;Cloud-Based Data Archiving&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Protecting Big Data and Mobile Device Data&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Big Data Overview&lt;/li&gt;&lt;li&gt;Protecting Big Data&lt;/li&gt;&lt;li&gt;Protecting Mobile Device&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Securing Data Protection Environment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Data Security&lt;/li&gt;&lt;li&gt;Security Threats in Data Protection Environment&lt;/li&gt;&lt;li&gt;Security Controls in Data Protection Environment &amp;ndash; 1&lt;/li&gt;&lt;li&gt;Security Controls in Data Protection Environment &amp;ndash; 2&lt;/li&gt;&lt;li&gt;Cyber Recovery&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Managing the Data Protection Environment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to Data Protection Management&lt;/li&gt;&lt;li&gt;Operations Management &amp;ndash; 1&lt;/li&gt;&lt;li&gt;Operations Management &amp;ndash; 2&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>Upon successful completion of this course, participants should be able to:



- Explain data protection architecture and its building blocks
- Evaluate fault-tolerance techniques in a data center
- Describe data backup methods and data deduplication
- Describe data replication, data archiving and data migration methods
- Describe the data protection process in a software-defined data center
- Articulate cloud-based data protection techniques
- Describe various solutions for protecting Big Data, cloud and mobile device data
- Describe security controls and management processes in a data protection environment</objective_plain><essentials_plain>- To understand the content and successfully complete this course, a participant must have a basic knowledge of computer architecture, operating systems, networking, and databases.
- Participants with experience in data protection management would also be able to assimilate the course material.</essentials_plain><audience_plain>This course is intended for all audiences.</audience_plain><contents_plain>Introduction to Data Protection


- Data Protection Primer
- Data Center
- Data Protection and Availability Solutions
Data Protection Architecture


- Data Source – Application and Hypervisor
- Data Source – Primary Storage
- Protection Application and Storage
- Data Security and Management
Fault-Tolerance Techniques


- Fault-Tolerance Overview
- Fault Tolerance Techniques – Compute and Network
- Fault Tolerance Techniques – Storage
- Fault Tolerance Techniques – Application and Availability Zone
Data Backup


- Introduction to Backup
- Backup Topologies
- Backup Methods
Data Deduplication


- Data Deduplication Overview
- Deduplication Granularity and Methods
Replication


- Data Replication Overview
- Local Replication
- Remote Replication
Data Archiving


- Data Archiving Overview
- Archiving Operation and Storage
Data Migration


- SAN-Based Data Migration
- NAS-Based Data Migration
- Host-Based Data Migration
- Application-Based Data Migration
Data Protection in Software-Defined Data Center


- Software-Defined Data Center Overview
- Software-Defined Compute, Storage, and Networking
- Data Protection Process in SDDC
Cloud-based Data Protection


- Cloud Computing Overview
- Cloud-Based Data Protection
- Cloud-Based Data Archiving
Protecting Big Data and Mobile Device Data


- Big Data Overview
- Protecting Big Data
- Protecting Mobile Device
Securing Data Protection Environment


- Overview of Data Security
- Security Threats in Data Protection Environment
- Security Controls in Data Protection Environment – 1
- Security Controls in Data Protection Environment – 2
- Cyber Recovery
Managing the Data Protection Environment


- Introduction to Data Protection Management
- Operations Management – 1
- Operations Management – 2</contents_plain><outline_plain>Introduction to Data Protection


- Data Protection Primer
- Data Center
- Data Protection and Availability Solutions
Data Protection Architecture


- Data Source – Application and Hypervisor
- Data Source – Primary Storage
- Protection Application and Storage
- Data Security and Management
Fault-Tolerance Techniques


- Fault-Tolerance Overview
- Fault Tolerance Techniques – Compute and Network
- Fault Tolerance Techniques – Storage
- Fault Tolerance Techniques – Application and Availability Zone
Data Backup


- Introduction to Backup
- Backup Topologies
- Backup Methods
Data Deduplication


- Data Deduplication Overview
- Deduplication Granularity and Methods
Replication


- Data Replication Overview
- Local Replication
- Remote Replication
Data Archiving


- Data Archiving Overview
- Archiving Operation and Storage
Data Migration


- SAN-Based Data Migration
- NAS-Based Data Migration
- Host-Based Data Migration
- Application-Based Data Migration
Data Protection in Software-Defined Data Center


- Software-Defined Data Center Overview
- Software-Defined Compute, Storage, and Networking
- Data Protection Process in SDDC
Cloud-based Data Protection


- Cloud Computing Overview
- Cloud-Based Data Protection
- Cloud-Based Data Archiving
Protecting Big Data and Mobile Device Data


- Big Data Overview
- Protecting Big Data
- Protecting Mobile Device
Securing Data Protection Environment


- Overview of Data Security
- Security Threats in Data Protection Environment
- Security Controls in Data Protection Environment – 1
- Security Controls in Data Protection Environment – 2
- Cyber Recovery
Managing the Data Protection Environment


- Introduction to Data Protection Management
- Operations Management – 1
- Operations Management – 2</outline_plain><duration unit="d" days="4">4 jours</duration><pricelist><price country="DE" currency="USD">2400.00</price><price country="CH" currency="USD">2400.00</price><price country="AE" currency="USD">2400.00</price><price country="AT" currency="USD">2400.00</price><price country="FR" currency="EUR">2040.00</price><price country="SI" currency="USD">2400.00</price></pricelist><miles/></course>