Ближайшие курсы
Об этом блоге
Слукин Сергей - тренер, независимый консультант. Microsoft Certified Trainer, Professional Developer, Technology Specialist, IT Professional Специализируюсь на: SharePoint 2013, SharePoint Server 2010, Office 365, SharePoint 2007, MOSS 2007, WSS 3.0, SharePoint Designer 2010, .NET, ASP.NET, C#, ADO.NET, LINQ, WPF, WCF, WF, Silverlight, Visual Studio 2012, Visual Studio 2010, Windows Phone 7.5, Biztalk 2010, SQL Server 2012, SQL Server 2008 R2, Business Intelligence, Reporting, Analysis, Integration Services.
Календарь
<<  Октябрь 2017  >>
ПнВтСрЧтПтСбВс
2526272829301
2345678
9101112131415
16171819202122
23242526272829
303112345

Курс 50023A: Управление Microsoft System Center Data Protection Manager 2007-2010

Курс читается в соответствии с официальной учебной программой авторизованного курса Microsoft 50023A: Managing Microsoft System Center Data Protection Manager 2007

Курс адаптирован для более новой версии Microsoft System Center Data Protection Manager 2010 и переведен на русский язык

Цель курса

Получение теоретических и практических навыков защиты данных, хранящихся в SQL Server, Exchange, SharePoint 2010 средствами Microsoft System Center Data Protection Manager 2010.

Курс предназначен для ИТ специалистов, которые занимаются резервным копированием и восстановлением данных, хранящихся в различных корпоративных системах.

Описание курса

Курс рассматривает вопросы установки и настройки SC DPM 2010 и агентов защиты, планирование развертывания, резервное копирование и восстановление данных, защиту данных в Exchange, SQL Server, SharePoint, виртуальных машинах.

Курс будет полезен системным администраторам, поддерживающим инфраструктуру SharePoint 2010, SQL Server и Exchange.

По окончании курса Вы будете уметь

1.       Планировать внедрение DPM.

2.       Устанавливать и настраивать DPM и агенты защиты.

3.       Защищать корпоративные системы Microsoft Exchange, Microsoft SQL Server, Microsoft SharePoint и виртуальные машины.

4.       Осуществлять резервное копирование и восстановление данных средствами DPM.

5.       Осуществлять резервное копирование и восстановление состояния серверов DPM.

6.       Выявлять и разрешать проблемы с серверами DPM, агентами защиты и защищаемыми данными.

Подготовка к сертификационному экзамену

Exam 70-658: TS: System Center Data Protection Manager 2007, Configuring (http://www.microsoft.com/learning/en/us/Exam.aspx?ID=70-658&locale=en-us )

Обязательная предварительная подготовка к курсу

Знакомство с Windows Server 2008-2008R2, представление о SQL server, Exchange, SharePoint.

Содержание курса

·         Модуль 1. Введение в защиту данных и аварийное восстановление

·         Модуль 2: Установка и настройка DPM 2010

·         Модуль 3: Защита данных в корпоративных приложениях

·         Модуль 4: Работа с резервными копиями и восстановление

·         Модуль 5: Выявление и устранение проблем с DPM 2010

Информация о курсе

Продолжительность:  40 академических часов / 5 дней

Стоимость:                   25.990 руб.

Ближайшие даты:       13 - 17 июня 2011 г.

Тренер:                         Константин Березовский

В курсе рассматриваются следующие вопросы

Модуль 1. Введение в защиту данных и аварийное восстановление

This module discuses disaster recovery basics, describes the System Center Data Protection Manager 2007 architecture, and discusses the planning process required to implement DPM-based disaster recovery and data protection in an enterprise environment.

During group discussion exercises that accompany this module, you will analyze a typical enterprise environment and develop a plan to implement comprehensive data protection.

Уроки

·         Overview.

·         What is DPM?

·         What Can DPM Protect?

·         Examining Backup Solutions

·         DPM Backup Types.

·         Tape-Based Backup and Archive.

·         Disk-Based Protection and Recovery

·         Combining Disk and Tape Backup Methods.

·         Determining Which Storage Method to Use

·         Protecting Multiple Data Types.

·         Protecting Clustered Servers.

·         Managing Data Protection

·         DPM Administrator Console.

·         DPM Reports and Notifications.

·         DPM Management Packs

·         End-User Recovery

·         Windows PowerShell Integration

·         How Does DPM Work?

·         Examining Disk-Based Protection.

·         Deploying Protection Agents.

·         Defining Protection Groups.

·         Creating Replicas.

·         Tracking Changes

·         Examining Synchronization.

·         Synchronizing Replicas

·         Performing Consistency Checks.

·         Initiating Consistency Checks.

·         How Consistency Checks Affect Network Performance

·         Examining Recovery Points.

·         Creating Recovery Points.

·         Recovery Point Limitations

·         Recovering Data

·         Examining Tape-Based Protection

·         Seamless Disk- and Tape-Based Recovery

·         Recovery Goals for Protection on Tape

·         Tape Data Consistency

·         Managing Tape Catalog Retention

·         Inventorying Tape Libraries

·         Adding and Removing Tapes

·         Optimizing DPM Server Performance

·         Optimizing DPM Process Utilization

·         Optimizing Synchronization

·         Reducing Synchronization Impact on Network Performance

·         Planning for Disaster Recovery

·         Preparing for DPM Server Recovery

·         No Preparation?

·         Effective Preparation

·         Selecting Enterprise Data to Protect

·         Types of Data that Can Be Protected

·         Protecting File Data on Servers and Workstations

·         Protecting Exchange Server Storage Groups

·         Protecting SQL Server Databases

·         Protecting Windows SharePoint Services Data

·         Protecting Virtual Server and Virtual Machines

·         Protecting Clustered Resources

·         Protecting Server System State

·         Planning Protection Configurations

·         Planning Protection Groups

·         Selecting Protection Group Members

·         Guidelines for Protection Groups

·         Special Considerations for Protecting Data on Workstations

·         Special Considerations for Protecting Data Over a WAN

·         Importance of Protection Group Membership Decisions

·         Selecting a Data Protection Method

·         Defining Recovery Goals

·         Allocating Space for Protection Groups

·         Specifying Tape Library Details

·         Compressing Data

·         Encrypting data

·         Choosing a Replica Creation Method

·         Calculating Time Required for Replica Creation

·         Automatic Replica Creation

·         Manual Replica Creation

·         Planning for DPM Deployment

·         Planning DPM Server Configurations

·         Selecting the Number of DPM Servers

·         Locating DPM Servers

·         Selecting the Instance of SQL Server

·         Using a Remote SQL Server

·         Recommendations for Remote SQL Server Security

·         Planning the Storage Pool

·         Calculating Capacity Requirements

·         Estimating Daily Recovery Point Size

·         Determining Retention Range Objectives

·         Choosing Sources for Storage Capacity

·         Planning the Disk Configuration

·         Planning the Tape Library Configuration

·         Planning for Security

·         Security Considerations

·         Configuring Antivirus Software

·         Configuring Firewalls

·         Configuring Security Permissions

·         Using Domain Security Groups

·         Granting Appropriate User Privileges

·         Planning for End-User Recovery

·         Configuring Active Directory Domain Services

·         Installing DPM Recovery Point Client Software

·         Planning for Notifications and E-mail Reports

·         Review

Лабораторная работа: Планирование внедрения DPM

Лабораторная работа: Планирование ресурсов для резервного копирования

Модуль 2: Установка и настройка DPM 2010

This module discusses system requirements for the DPM 2010 server, explains how to specify non-default settings when installing the operating system before installing DPM, provides step-by-step instructions for installing DPM servers and protection agents on enterprise systems, and discusses troubleshooting techniques for resolving issues you may encounter.

During lab exercises that accompany this module, you will install DPM prerequisite software, install a DPM server, perform initial required configuration tasks, and perform selected tasks to enable optional DPM features and functions.

Уроки

·         Overview

·         Examining System Requirements

·         Hardware Requirements

·         Server Hardware Requirements

·         Storage Requirements

·         Software Requirements

·         DPM Server Operating System Requirements

·         DPM Server Software Requirements

·         Protected Server Requirements

·         Installing DPM 2010 on a Server

·         Installation Considerations

·         Step by Step Guide to Installing DPM 2010

·         Troubleshooting DPM 2010 Setup Issues

·         Installation Issues

·         Upgrade Issues

·         Uninstallation Issues

·         Completing Configuration Tasks

·         Opening the DPM Administrator Console

·         Navigation Bar

·         Menu Bar

·         Console Panes

·         Information Icon

·         Performing Required Configuration Tasks

·         Adding Disks to the Storage Pool

·         Configuring Tape Libraries

·         Installing Protection Agents

·         What is a Protection Agent?

·         Cross-Domain and Cross-Forest Support

·         Configuring Windows Firewall on the DPM Server

·         Installing Protection Agents

·         Installing Protection Agents behind a Firewall

·         Installing Protection Agents using Server Images

·         Installing Protection Agents Using Systems Management Server

·         Installing Protection Agents with a PowerShell Script

·         Troubleshooting Protection Agent Installation

·         Potential Issues

·         Creating Protection Groups

·         Protecting Data with Protection Groups

·         Data Sources and Protection Levels

·         Protection Group Considerations

·         Creating Custom Volumes for Protection Groups

·         Potential Issues with Standard Volumes

·         Optimizing Performance with Custom Volumes

·         Creating Custom Volumes

·         Additional Considerations for Using Custom Volumes

·         Step-by-Step Guide to Creating Protection Groups

·         Starting the Wizard

·         Selecting Protection Group Members

·         Selecting Protection Methods

·         Specifying Short-Term Protection Goals

·         Allocating Space for Protection Groups

·         Selecting Long-Term Protection Goals

·         Selecting Library and Tape Details

·         Choosing a Replica Creation Method

·         Completing Protection Group Creation

·         Completing Custom Volume Preparation

·         Creating a Protection Group in DPM Management Shell

·         Performing Optional Configuration Tasks

·         Optimizing Performance

·         Enabling On-the-Wire Compression

·         Enabling Server Throttling

·         Staggering Synchronization Jobs

·         Scheduling Consistency Checks

·         Modifying the Express Full Backup Schedule

·         Enabling End-User Recovery

·         Extending the Active Directory Schema for End User Recovery

·         Step-by Step Guide to Extending Active Directory for End User Recovery

·         Installing Shadow Copy Client Software

·         Subscribing to Alerts and Notifications

·         Configuring SMTP Servers

·         Publishing DPM Alerts

·         Installing the DPM Management Shell

·         Review

Лабораторная работа: Установка и настройка DPM 2010

Лабораторная работа: Настройка DPM 2010

Лабораторная работа: Working with End-User Recovery

Лабораторная работа: Подписка на оповещения и уведомления

После завершения модуля слушатели будут знать/уметь:

·         List out the hardware and software requirements for DPM 2010

·         Install DPM 2010 on a server

·         Use the DPM console

·         Install the protection agent on a protected computer

·         Create protection groups

·         Configure the protection group

Модуль 3: Защита данных в корпоративных приложениях

This module explains how to extend data protection to Exchange Servers, SQL Servers, SharePoint and Clustered servers, and Virtual Server Hosts and Virtual Machines by installing protection agents and configuring protection groups.

During lab exercises that accompany this module, you will install protection agents on an Exchange Server, a SQL Server, a SharePoint server, and a Virtual Server Host, create protection groups on the DPM server, and monitor data collection.

Уроки

·         Overview

·         General Requirements

·         Planning Protection Groups

·         Designing Protection Groups for Exchange and SQL Servers

·         Managing Protected Servers

·         Performing General Server Maintenance

·         Using Windows Maintenance Tools

·         Applying Operating System Updates

·         Running Antivirus Software

·         End User Recovery Only Supported for File Servers

·         Considerations for Protecting File Servers

·         Changing the Path of an Encrypted Data Source

·         Renaming a File Server

·         Changing the Time Zone of File Servers

·         Protecting Exchange Servers

·         Considerations for Protecting Exchange Servers

·         Understanding Exchange Storage Groups

·         Installing Protection Agents on Exchange Servers

·         Creating Exchange Server Protection Groups

·         Starting the Create New Protection Group Wizard

·         Selecting Protection Group Members

·         Selecting Protection Methods

·         Specifying Short-Term Protection Goals

·         Specifying Exchange Protection Options

·         Allocating Disk Space

·         Selecting Long-Term Protection Goals

·         Choosing a Replica Creation Method

·         Completing Protection Group Creation

·         Protecting SQL Servers

·         Considerations for Protecting SQL Servers

·         Adding Databases

·         Changing Database File Paths

·         Renaming Databases

·         Co-existing with Other Backup Applications

·         Performance Optimizations for Slow Networks

·         End-user Recovery is Not Supported

·         Installing Protection Agents on SQL Servers

·         Creating SQL Server Protection Groups

·         Starting the Create New Protection Group Wizard

·         Selecting Data to Protect

·         Selecting Protection Methods

·         Specifying Short-Term Protection Goals

·         Allocating Disk Space

·         Specifying Long-Term Protection Policies

·         Protecting SharePoint Server Farms

·         DPM 2010 Support for SharePoint Versions

·         Considerations for Protecting SharePoint Servers

·         SharePoint Writer Must be Registered and Started

·         Upgrading Windows SharePoint Services

·         Adding Databases to a Windows SharePoint Services Farm

·         Recovering SharePoint Databases

·         SharePoint System Architecture

·         Web Servers

·         Content Database Servers

·         Configuration Database

·         Web Server Topology

·         SharePoint Farm Layout

·         Installing Protection Agents on Windows SharePoint Farms

·         Registering and Starting the WSS Writer Service

·         Installing the Protection Agent

·         Providing SharePoint Credentials to the Protection Agent

·         Creating SharePoint Protection Groups

·         Protecting Virtual Machines

·         DPM 2010 Support for Virtual Hosts and Virtual Machines

·         Typical Protection for Virtual Machines

·         Better Protection for Virtual Machines with DPM

·         Application Awareness

·         Ease of Use and Management

·         Using DPM 2010 to Protect Virtual Server Hosts and Virtual Machines

·         Considerations for Virtual Machine Protection

·         Adding Virtual Machines

·         Changing Virtual Machine File Paths

·         Protecting Application Data on Virtual Machines

·         Performance Optimizations for Slow Networks

·         Installing DPM Protection Agents on Virtual Servers

·         Creating Virtual Machine Protection Groups

·         Review

Лабораторная работа: Защита данных Exchange

Лабораторная работа: Защита БД SQL Server

Лабораторная работа: Защита баз данных SharePoint

После завершения модуля слушатели будут знать/уметь:

·         Perform maintenance jobs on the DPM servers

·         Protect file servers

·         Protect Exchange servers

·         Protect SQL servers

·         Protect SharePoint farms

·         Protect virtual machines

Модуль 4: Работа с резервными копиями и восстановление

This module provides step-by-step instructions to prepare for recovery of DPM servers, backup protected computer system states, and recover and restore system states and protected data for the DPM Server, Exchange Servers, SQL Servers, and Virtual Server Machines. Topics also explain how to synchronize the DPM Server with data protected data in the storage pool.

Уроки

·         Overview

·         Preparing for Disaster Recovery

·         Disaster Recovery Review

·         Backing Up Protected Computer System States

·         DPM Server Components that Require Backup

·         DPM Database and Report Database

·         Replicas

·         DPM Config folder

·         ScriptingConfig.xml and Other Scripts

·         Backing up the DPM Server

·         Backing Up DPM from a Secondary DPM Server

·         Backing up DPM Databases to Tape from the Primary DPM Server

·         Backing up with Third-Party Software

·         Recovering Protected Computers

·         Recovering System State to Protected Computers

·         Recovering System State Files

·         Restoring System State Files

·         Recovering Protected Computers to New Hardware

·         Recovering Protected Computers from a Secondary DPM Server

·         Recovering DPM Servers

·         Recovering DPM Databases

·         Recovering DPM Replicas

·         Performing a Bare Metal Recovery of a DPM Server

·         Synchronizing DPM Databases with DpmSync

·         Using Pre-backup and Post-backup Scripts

·         Recovering Protected Exchange Data

·         Choosing Exchange Data Recovery Methods

·         Recovering Storage Groups

·         Recovering a Storage Group to its Original Location

·         Recovering a Storage Group to a Network Folder

·         Recovering Mailboxes

·         Recovering a Protected Mailbox

·         Recovering Protected SQL Data

·         Choosing SQL Server Recovery Methods

·         Recover Database to Original Location

·         Recover Databases to Alternate Locations on the Same Server

·         Recover Databases to an Alternate Server

·         Recover Database Files to Tape

·         Recovering a SQL Database to its Original Location

·         Recovering a Renamed Copy of a SQL Database

·         Recovering a SQL Database to a Network Folder

·         Recovering a Copy of the SQL Database to Tape

·         Recovering Protected Virtual Machines

·         Choosing a Virtual Machine Recovery Method

·         Recovering Virtual Machines to Original Locations

·         Recovering Virtual Machines to Alternate Locations

·         Recovering a Virtual Machine to its Original Location

·         Recovering a Virtual Machine to a Network Folder

·         Review

Лабораторная работа : Защита и восстановление сервера DPM

Лабораторная работа: Восстановление данных Exchange

Лабораторная работа: Восстановление БД SQL Server

Лабораторная работа: Восстановление БД SharePoint

After completing this module, students will be able to:

·         Backup a DPM server

·         Recover protected computers

·         Recover protected Exchange data

·         Recover protected SQL data

·         Recover protected virtual machines

Модуль 5: Выявление и устранение проблем с DPM 2010

This module provides an overview of techniques for troubleshooting DPM environments to resolve DPM Server and protection agent installation issues. Topics also explain how to use the Windows PowerShell-based DPM Management Shell to manage and maintain DPM environments.

During lab exercises that accompany this module, you will use DPM tools and utilities to perform typical maintenance and repair tasks.

Уроки

·         Overview

·         Troubleshooting DPM Installation and Upgrade

·         Analyzing Issues

·         Reviewing Error Details in DPM Setup

·         Reviewing Installation Logs

·         Resolving DPM Installation Issues

·         An Installation of a Prerequisite Failed

·         Non-DPM Applications are Interrupted by DPM Installation

·         Disks are Missing

·         Errors Occur When Running from a UNC Path

·         Tape Libraries Malfunction or Display Incorrectly

·         End-user Recovery Permissions Update Failed

·         Protection Agent Upgrade Failure

·         Resolving DPM 2010 Uninstallation Issues

·         Uninstalling DPM 2010

·         Removing or Retaining Recovery Points

·         Uninstalling Prerequisite Software

·         Uninstalling Protection Agents

·         Uninstalling DPM-Specific User Settings

·         Watson Errors during DPM Uninstallation

·         Repairing DPM 2010

·         Troubleshooting Protection Agent Installation

·         Analyzing and Resolving Protection Agent Installation Failures

·         DPM Protection Agent Will Not Install on a Computer

·         Resolving Issues Indicated by Error Messages

·         Using Alerts to Maintain and Monitor DPM

·         Understanding Alerts

·         Alert Severity

·         Alert Status

·         Dynamic Nature of Alerts

·         Relationship Between Alerts and Jobs

·         Resolving Alerts

·         Using DPM Help to Obtain Information about Alerts

·         Monitoring Alerts

·         Troubleshooting with the DPM Management Shell

·         Review

После завершения модуля слушатели будут знать/уметь:

·         Review installation logs

·         Resolve installation issues

·         Resolve upgrade issues

·         Resolve uninstallation issues

·         Resolve protection agent installation issues

·         Use alerts to monitor DPM servers

·         Use DPM Management Shell for troubleshooting