Dell - PowerProtect Cyber Recovery Design and Administration

$3,300.00 USD

3 Days


Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

This course covers the concepts, features, management, design and troubleshooting of PowerProtect Cyber Recovery solutions. The course contains security considerations as well as the steps to manage storage, applications and policies, copies, sandboxes, and the Cyber Recovery operations with Dell PowerProtect Data Manager, Dell NetWorker, and Dell Avamar. This course also contains important considerations and limitations when designing, sizing, and hardening a PowerProtect Cyber Recovery solution. Common troubleshooting techniques and learning experiences covering Cyber Recovery problem identification, collecting log files, alerts, main system components issues, cause identification and possible resolutions are also covered in this course.

Course Objectives

  • Describe the PowerProtect Cyber Recovery solution, its components, and processes.
  • Perform PowerProtect Cyber Recovery administrative tasks.
  • Run scheduled and on-demand backups for a variety of systems.
  • Restore files using PowerProtect Cyber Recovery.
  • Configure PowerProtect Cyber Recovery replication.
  • Use PowerProtect Cyber Recovery tools to perform system monitoring, maintenance, capacity management, and troubleshooting.
  • Identify software, server, network, storage, and physical environment design limitations and considerations.
  • Plan and size a PowerProtect Cyber Recovery environment.
  • Diagnose and troubleshoot login problems within Cyber Recovery.
  • Locate logs and use monitoring tools that can be used to validate proper process and data flow.
  • Identify alerts and alert status.
  • Locate CyberSense logs

Who Should Attend?

This course is intended for individuals who require the skills needed to administrate a Cyber Recovery solution.
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Course Prerequisites

This course requires a basic understanding of PowerProtect DD system, PPDM, NetWorker, and Avamar.


PowerProtect Cyber Recovery Concepts

  • Importance of Cyber Security
  • PowerProtect Cyber Recovery Solution
  • Navigating Documentation

PowerProtect Cyber Recovery Features

  • Identifying Management Tools and Platforms
  • Identifying Storage and Applications
  • Capabilities of Policies and Copies
  • Identifying Components

PowerProtect Cyber Recovery Administration

  • Configure Storage and Applications
  • Manage Policies and Copies
  • Recover with PPDM in Cyber Recovery
  • Recover with NetWorker in Cyber Recovery
  • Recover with Avamar with Cyber Recovery
  • CyberSense Configuration
  • Perform Administrative Tasks
  • Protect Cyber Recovery with Disaster Recovery
  • Sheltered Harbor Configuration
  • Configure Unisys Stealth with Cyber Recovery

PowerProtect Cyber Recovery Design

  • Design Considerations
  • Designing the Solution
  • Planning and Sizing the Environment
  • Hardening the Solution

PowerProtect Cyber Recovery Troubleshooting

  • Diagram a Cyber Recovery Solution
  • Configure Services, Alerts, and Workflow
  • Troubleshooting Cyber Recovery
  • Troubleshooting Cyber Sense

Get in touch to schedule training for your team
We can enroll multiple students in an upcoming class or schedule a dedicated private training event designed to meet your organization’s needs.


Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with New Horizons