<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="30082" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/emc-ppcrda" lastchanged="2026-02-23T15:56:33+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Dell PowerProtect Cyber Recovery Design and Administration</title><productcode>PPCRDA</productcode><vendorcode>EM</vendorcode><vendorname>Dell EMC</vendorname><fullproductcode>EM-PPCRDA</fullproductcode><version>1.0</version><objective>&lt;p&gt;Upon successful completion of this course, participants should be able to:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the PowerProtect Cyber Recovery solution, its components, and processes.&lt;/li&gt;&lt;li&gt;Perform PowerProtect Cyber Recovery administrative tasks.&lt;/li&gt;&lt;li&gt;Run scheduled and on-demand backups for a variety of systems.&lt;/li&gt;&lt;li&gt;Restore files using PowerProtect Cyber Recovery.&lt;/li&gt;&lt;li&gt;Configure PowerProtect Cyber Recovery replication.&lt;/li&gt;&lt;li&gt;Use PowerProtect Cyber Recovery tools to perform system monitoring, maintenance, capacity management, and troubleshooting.&lt;/li&gt;&lt;li&gt;Identify software, server, network, storage, and physical environment design limitations and considerations.&lt;/li&gt;&lt;li&gt;Plan and size a PowerProtect Cyber Recovery environment.&lt;/li&gt;&lt;li&gt;Diagnose and troubleshoot login problems within Cyber Recovery.&lt;/li&gt;&lt;li&gt;Locate logs and use monitoring tools that can be used to validate proper process and data flow.&lt;/li&gt;&lt;li&gt;Identify alerts and alert status.&lt;/li&gt;&lt;li&gt;Locate CyberSense logs&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;This course requires a basic understanding of PowerProtect DD system, PPDM, NetWorker, and Avamar&lt;/p&gt;</essentials><audience>&lt;p&gt;This course is intended for individuals who require the skills needed to administrate a Cyber Recovery solution.&lt;/p&gt;</audience><contents>&lt;h5&gt;PowerProtect Cyber Recovery Concepts&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Importance of Cyber Security&lt;/li&gt;&lt;li&gt;PowerProtect Cyber Recovery Solution&lt;/li&gt;&lt;li&gt;Navigating Documentation&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;PowerProtect Cyber Recovery Features&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identifying Management Tools and Platforms&lt;/li&gt;&lt;li&gt;Identifying Storage and Applications&lt;/li&gt;&lt;li&gt;Capabilities of Policies and Copies&lt;/li&gt;&lt;li&gt;Identifying Components&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;PowerProtect Cyber Recovery Administration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Configure Storage and Applications&lt;/li&gt;&lt;li&gt;Manage Policies and Copies&lt;/li&gt;&lt;li&gt;Recover with PPDM in Cyber Recovery&lt;/li&gt;&lt;li&gt;Recover with NetWorker in Cyber Recovery&lt;/li&gt;&lt;li&gt;Recover with Avamar with Cyber Recovery&lt;/li&gt;&lt;li&gt;CyberSense Configuration&lt;/li&gt;&lt;li&gt;Perform Administrative Tasks&lt;/li&gt;&lt;li&gt;Protect Cyber Recovery with Disaster Recovery&lt;/li&gt;&lt;li&gt;Sheltered Harbor Configuration&lt;/li&gt;&lt;li&gt;Configure Unisys Stealth with Cyber Recovery&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;PowerProtect Cyber Recovery Design&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Design Considerations&lt;/li&gt;&lt;li&gt;Designing the Solution&lt;/li&gt;&lt;li&gt;Planning and Sizing the Environment&lt;/li&gt;&lt;li&gt;Hardening the Solution&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;PowerProtect Cyber Recovery Troubleshooting&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Diagram a Cyber Recovery Solution&lt;/li&gt;&lt;li&gt;Configure Services, Alerts, and Workflow&lt;/li&gt;&lt;li&gt;Troubleshooting Cyber Recovery&lt;/li&gt;&lt;li&gt;Troubleshooting Cyber Sense&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;PowerProtect Cyber Recovery Concepts&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Importance of Cyber Security&lt;/li&gt;&lt;li&gt;PowerProtect Cyber Recovery Solution&lt;/li&gt;&lt;li&gt;Navigating Documentation&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;PowerProtect Cyber Recovery Features&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identifying Management Tools and Platforms&lt;/li&gt;&lt;li&gt;Identifying Storage and Applications&lt;/li&gt;&lt;li&gt;Capabilities of Policies and Copies&lt;/li&gt;&lt;li&gt;Identifying Components&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;PowerProtect Cyber Recovery Administration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Configure Storage and Applications&lt;/li&gt;&lt;li&gt;Manage Policies and Copies&lt;/li&gt;&lt;li&gt;Recover with PPDM in Cyber Recovery&lt;/li&gt;&lt;li&gt;Recover with NetWorker in Cyber Recovery&lt;/li&gt;&lt;li&gt;Recover with Avamar with Cyber Recovery&lt;/li&gt;&lt;li&gt;CyberSense Configuration&lt;/li&gt;&lt;li&gt;Perform Administrative Tasks&lt;/li&gt;&lt;li&gt;Protect Cyber Recovery with Disaster Recovery&lt;/li&gt;&lt;li&gt;Sheltered Harbor Configuration&lt;/li&gt;&lt;li&gt;Configure Unisys Stealth with Cyber Recovery&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;PowerProtect Cyber Recovery Design&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Design Considerations&lt;/li&gt;&lt;li&gt;Designing the Solution&lt;/li&gt;&lt;li&gt;Planning and Sizing the Environment&lt;/li&gt;&lt;li&gt;Hardening the Solution&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;PowerProtect Cyber Recovery Troubleshooting&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Diagram a Cyber Recovery Solution&lt;/li&gt;&lt;li&gt;Configure Services, Alerts, and Workflow&lt;/li&gt;&lt;li&gt;Troubleshooting Cyber Recovery&lt;/li&gt;&lt;li&gt;Troubleshooting Cyber Sense&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>Upon successful completion of this course, participants should be able to:



- Describe the PowerProtect Cyber Recovery solution, its components, and processes.
- Perform PowerProtect Cyber Recovery administrative tasks.
- Run scheduled and on-demand backups for a variety of systems.
- Restore files using PowerProtect Cyber Recovery.
- Configure PowerProtect Cyber Recovery replication.
- Use PowerProtect Cyber Recovery tools to perform system monitoring, maintenance, capacity management, and troubleshooting.
- Identify software, server, network, storage, and physical environment design limitations and considerations.
- Plan and size a PowerProtect Cyber Recovery environment.
- Diagnose and troubleshoot login problems within Cyber Recovery.
- Locate logs and use monitoring tools that can be used to validate proper process and data flow.
- Identify alerts and alert status.
- Locate CyberSense logs</objective_plain><essentials_plain>This course requires a basic understanding of PowerProtect DD system, PPDM, NetWorker, and Avamar</essentials_plain><audience_plain>This course is intended for individuals who require the skills needed to administrate a Cyber Recovery solution.</audience_plain><contents_plain>PowerProtect Cyber Recovery Concepts


- Importance of Cyber Security
- PowerProtect Cyber Recovery Solution
- Navigating Documentation
PowerProtect Cyber Recovery Features


- Identifying Management Tools and Platforms
- Identifying Storage and Applications
- Capabilities of Policies and Copies
- Identifying Components
PowerProtect Cyber Recovery Administration


- Configure Storage and Applications
- Manage Policies and Copies
- Recover with PPDM in Cyber Recovery
- Recover with NetWorker in Cyber Recovery
- Recover with Avamar with Cyber Recovery
- CyberSense Configuration
- Perform Administrative Tasks
- Protect Cyber Recovery with Disaster Recovery
- Sheltered Harbor Configuration
- Configure Unisys Stealth with Cyber Recovery

PowerProtect Cyber Recovery Design


- Design Considerations
- Designing the Solution
- Planning and Sizing the Environment
- Hardening the Solution
PowerProtect Cyber Recovery Troubleshooting


- Diagram a Cyber Recovery Solution
- Configure Services, Alerts, and Workflow
- Troubleshooting Cyber Recovery
- Troubleshooting Cyber Sense</contents_plain><outline_plain>PowerProtect Cyber Recovery Concepts


- Importance of Cyber Security
- PowerProtect Cyber Recovery Solution
- Navigating Documentation
PowerProtect Cyber Recovery Features


- Identifying Management Tools and Platforms
- Identifying Storage and Applications
- Capabilities of Policies and Copies
- Identifying Components
PowerProtect Cyber Recovery Administration


- Configure Storage and Applications
- Manage Policies and Copies
- Recover with PPDM in Cyber Recovery
- Recover with NetWorker in Cyber Recovery
- Recover with Avamar with Cyber Recovery
- CyberSense Configuration
- Perform Administrative Tasks
- Protect Cyber Recovery with Disaster Recovery
- Sheltered Harbor Configuration
- Configure Unisys Stealth with Cyber Recovery

PowerProtect Cyber Recovery Design


- Design Considerations
- Designing the Solution
- Planning and Sizing the Environment
- Hardening the Solution
PowerProtect Cyber Recovery Troubleshooting


- Diagram a Cyber Recovery Solution
- Configure Services, Alerts, and Workflow
- Troubleshooting Cyber Recovery
- Troubleshooting Cyber Sense</outline_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="CH" currency="USD">2200.00</price><price country="AE" currency="USD">2200.00</price><price country="GB" currency="GBP">2720.00</price><price country="DE" currency="EUR">3120.00</price><price country="AT" currency="EUR">3120.00</price><price country="SI" currency="EUR">3120.00</price></pricelist><miles/></course>