• Post category:StudyBullet-4
  • Reading time:4 mins read




Intermediate level course on how to plan and perform backup, recovery, and related operations with Acronis Cyber Backup.

What you will learn

 

Intermediate level technical course focused on how to plan and perform backup, recovery, and related operations with Acronis Cyber Backup

Description

The newly updated Acronis #CyberFit Tech trainings consists of four separate courses that you and your team can take either live, on-demand, or a combination of the two. Additionally, all Acronis #CyberFit Academy courses will be free this quarter for all existing Acronis partners.

 

These technical training courses are designed to provide IT professionals with broad knowledge and background information about the usage of Acronis Cyber Cloud and Cyber Protect Cloud software solutions. These hands-on training courses allow participants to learn and test all product functionality both on premises and in the cloud.

 

Tech Associate Backup course consists of 4 sections:

1. Planning for Backup & Recovery – covers Backup 101, Protecting Physical Machines, Protecting Applications, Protecting Virtual Machines and Virtualization Hosts, Protecting Microsoft 365 and G Suite, Acronis Bootable Media, Acronis Universal Restore, Acronis Instant Restore, and Virtual Machine Replication.

2. Creating Backups – covers Selecting and Grouping Machines, Configuring Backup, and Browsing Backups and Plans.

3. Performing Recovery – covers Planning for Recovery, Recovery Using Web Interface, Recovery Using Bootable Media, Run as Virtual Machine, Virtual Machine Replication, and Other Recovery Methods.


Get Instant Notification of New Courses on our Telegram channel.


4. Other Operations – covers Off-Host Data Processing, Acronis Active Protection, Vulnerability Assessment, Monitoring and Reporting, and Basic Management Server Settings.

 

Available as an hour long online e-learning session.

 

English
language

Content

Introduction to Course

Introduction to Course

Recovery

Planning for Recovery
Recovery Using Web Interface
Recovery Using Bootable Media
Run as VM
VM Replication
Other Recovery Methods

Other Operations

Off-Host Data Processing
Acronis Active Protection
Vulnerability Assessment
Monitoring and Reports
Basic Management Server Settings