Course Offering
- Guaranteed to Run Schedule
- New Courses
- Fast Lane LIVE E-Learning
- Fast Lane Academy»
- Fast Lane IT Workshops»
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Cisco»
- Citrix»
- EC-Council»
- Google Cloud»
- Microsoft»
- NetApp»
- Palo Alto Networks»
- Red Hat»
- VMware»
-
Additional Vendors»
- Arista
- Automation Anywhere
- Barracuda
- Bosch IoT Academy
- Brocade
- Check Point
- Cloud Security Alliance
- Cloudera
- Commvault
- CompTIA
- CWNP
- Cybersecurity First Responder
- Cydrill Secure Encoding
- Dell EMC
- F5
- Fortinet
- Gigamon
- IBM
- (ISC)²
- Juniper
- Kaspersky Lab
- NCTA Cloud
- Oracle
- Pivotal / Spring
- Ruckus
- Salesforce
- SUSE
- Symantec
- Veritas
- IT & Project Management»
- ITIL®
- PRINCE2®
- Scrum
- Scaled Agile®
- Atlassian
- Featured Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Internet of Things (IoT)»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»

Data Protection and Recovery
Who should attend
This course is intended for operations and administration personnel who are new to Commvault and work with Commvault software to support daily data protection and recovery operations.
Course Objectives
Upon completion of this eLearning course you will be able to:
- Understand the Commvault® backup and recovery processes.
- Compare and contrast the various recovery methods available in the Commvault software.
- Configure and execute data protection and recovery operations.
- Create and configure job schedules and schedule policies.
Product Description
Develop a broad understanding of data protection and recovery, and review the advanced technologies used by Commvault® software. This self-paced eLearning course covers essential concepts regarding configuration and execution of data protection and recovery functions, including job types such as backup, auxiliary copies, synthetic and DASH Full, as well as job priorities. Each lesson builds on previous topics so you gain a strong understanding of why and how to protect and recover your data.