Veritas Backup Exec Administration and Configuration Training Course
Veritas Backup Exec is a unified data protection solution for virtual, physical, and cloud environments.
This instructor-led, live training (online or onsite) is aimed at intermediate-level IT infrastructure professionals who wish to configure and manage Veritas Backup Exec to ensure secure, streamlined, and effective backup and recovery.
By the end of this training, participants will be able to:
- Understand Veritas Backup Exec architecture and features.
- Install and configure a backup solution using Backup Exec.
- Create and manage backup and restore jobs.
- Develop basic backup and recovery strategies.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction to Data Protection
- Understanding the need for backup and recovery
- Types of backups and retention models
- Challenges in backup strategy implementation
Veritas Backup Exec Overview
- Product architecture and components
- Supported platforms and workloads
- Licensing and installation considerations
Installation and Configuration
- Preparing the system for installation
- Installing Backup Exec server and agents
- Initial configuration and licensing
Storage and Device Management
- Adding storage devices and media sets
- Configuring disk, tape, and cloud storage
- Managing storage lifecycles
Backup Job Creation
- Creating backup jobs for different workloads
- Scheduling and automation
- Monitoring and verifying backup jobs
Data Recovery and Restore Operations
- Restoring files, folders, and virtual machines
- Granular recovery options
- Disaster recovery scenarios
Monitoring, Reporting, and Maintenance
- Using logs and alerts
- Generating reports
- Maintaining the backup environment
Summary and Next Steps
Requirements
- An understanding of data backup concepts
- Experience with Windows Server administration
- Familiarity with basic IT infrastructure tools
Audience
- System administrators responsible for backup operations
- IT infrastructure professionals
- Technical support staff managing server environments
Open Training Courses require 5+ participants.
Veritas Backup Exec Administration and Configuration Training Course - Booking
Veritas Backup Exec Administration and Configuration Training Course - Enquiry
Veritas Backup Exec Administration and Configuration - Consultancy Enquiry
Consultancy Enquiry
Testimonials (2)
I generally enjoyed the knowledge of the trainer.
Eddyfi Technologies
Course - GDPR Workshop
I enjoyed the interaction and facts gained / learn.
Monna Liza Mengullo
Course - Data Protection
Upcoming Courses
Related Courses
CDP - Certificate in Data Protection
35 HoursThere is a need to provide adequate training on the Data Protection Act 1998 "the Act" and its implications for both organisations and individuals. There are important differences between the Act and its predecessor, the Data Protection Act 1984. In particular, the Act contains important new obligations in relation to manual records and transborder data flows, a new notification system and amended principles. It is important to understand the Act in the European context.
Those experienced in data protection issues, as well as those new to the subject, need to be trained so that their organisations are confident that legal compliance is continually addressed. It is necessary to identify issues requiring expert data protection advice in good time in order that organisational reputation and credibility are enhanced through relevant data protection policies and procedures.
Objectives
The aim of the syllabus is to promote an understanding of how the data protection principles work rather than simply focusing on the mechanics of regulation. The syllabus places the Act in the context of human rights and promotes good practice within organisations. On attaining the certificate, award holders will possess:
- appreciation of the broader context of the Act
- understanding of the way in which the Act and the Privacy and Electronic Communications (EC Directive) Regulations 2003 work a broad understanding of the way associated legislation relates to the Act an understanding of what has to be done to achieve compliance a recognised qualification in data protection
Course Synopsis
The syllabus comprises three main parts, each with many sub-sections!
Context - this will address the origins of and reasons for the Act together with consideration of privacy in general. Law – Data Protection Act - this will address the main concepts and elements of the Act and subordinate legislation. Application - this will consider how compliance is achieved and how the Act works in practice.
Data Breach Management
14 HoursThis instructor-led, live training in Austria (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
Data Protection
35 HoursThis is an Instructor led course, and is the non-certification version of the "CDP - Certificate in Data Protection" course
Those experienced in data protection issues, as well as those new to the subject, need to be trained so that their organisations are confident that legal compliance is continually addressed. It is necessary to identify issues requiring expert data protection advice in good time in order that organisational reputation and credibility are enhanced through relevant data protection policies and procedures.
Objectives:
The aim of the syllabus is to promote an understanding of how the data protection principles work rather than simply focusing on the mechanics of regulation. The syllabus places the Act in the context of human rights and promotes good practice within organisations. On completion, you will have:
- an appreciation of the broader context of the Act.
- an understanding of the way in which the Act and the Privacy and Electronic Communications (EC Directive) Regulations 2003 work
- a broad understanding of the way associated legislation relates to the Act
- an understanding of what has to be done to achieve compliance
Course Synopsis:
The syllabus comprises three main parts, each sub-sections.
- Context - this will address the origins of and reasons for the Act together with consideration of privacy in general.
- Law – Data Protection Act - this will address the main concepts and elements of the Act and subordinate legislation.
- Application - this will consider how compliance is achieved and how the Act works in practice.
Data Protection Impact Assessment (DPIA)
7 HoursData Protection Impact Assessment (DPIA) is a mandatory risk assessment process under GDPR and other data protection laws, aimed at identifying and mitigating risks to individuals' personal data in high-risk processing activities.
This instructor-led, live training (online or onsite) is aimed at intermediate-level professionals who wish to understand and conduct DPIAs to ensure data privacy compliance and mitigate risks in data processing projects.
By the end of this training, participants will be able to:
- Understand the legal and regulatory context of DPIAs.
- Determine when a DPIA is required and how to scope it effectively.
- Conduct a full DPIA lifecycle from initiation to documentation and review.
- Integrate DPIA practices into broader data governance frameworks.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation using real-world scenarios.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
GDPR Workshop
7 HoursThis one-day course is for people looking for a brief outline of the GDPR – General Data Protection Regulations coming out May 25, 2018. This is ideal for managers, department heads, and employees who need to understand the basics of the GDPR.
How to Audit GDPR Compliance
14 HoursThis course is developed primarily with focus on auditors and other administrative roles who are
tasked to ensure compliance of their control systems and IT environment with prevailing laws and
regulations. The course will begin by giving understanding of key GDPR concepts as well as how it is
going to affect the work performed by auditors. Participants will also explore data subjects rights,
data controllers and processors obligations, and enforcement and compliance notions in the
context of the Regulation. The training will also cover the audit program provided by ISACA that will
enable auditors to review GDPR governance and response mechanisms as well as supporting
processes which can help manage the risk associated with noncompliance.
GDPR Advanced
21 HoursThis is more in-depth and would be for those working a great deal with the GDPR and who may be appointed to the GDPR team. This would be ideal for IT, human resources and marketing employees, and they will deal extensively with the GDPR.
Personal Data Protection Officer - Basic Level
21 HoursPurpose of the Training
- Acquainting the audience with systematized, comprehensive issues of the functioning of personal data protection on the basis of Polish and European law
- Providing practical knowledge about the new rules for the processing of personal data
- Presentation of the areas of the greatest legal risks in connection with the entry into force of the GDPR
- Practical preparation for independent performance of the duties of a Personal Data Protection Officer
Personal Data Protection Officer - Advanced Level
14 HoursPurpose of the Training
- Gaining practical knowledge on how to perform the tasks of the Inspector
- Gaining practical knowledge of how to audit and how to assess risk
- Providing practical knowledge about the new rules for the processing of personal data
Subject Access Requests (SARs)
7 HoursThis instructor-led, live training in Austria (online or onsite) is aimed at intermediate-level to advanced-level compliance officers, legal teams, and data protection professionals who wish to ensure their organization’s SAR process is efficient, compliant, and risk-free.
By the end of this training, participants will be able to:
- Understand the legal framework governing SARs.
- Process SARs efficiently while maintaining compliance.
- Identify exemptions and limitations under data protection laws.
- Handle complex SAR scenarios, including third-party data.
- Implement best practices for SAR documentation and response.