Intermediate level technical course that covers how to plan and perform cyber protection and remote management.
What you will learn
Intermediate level technical course on how to plan and perform cyber protection and remote management.
Description
The newly updated Acronis #CyberFit Tech trainings consists of four separate courses that you and your team can take either live, on-demand, or a combination of the two. Additionally, all Acronis #CyberFit Academy courses will be free this quarter for all existing Acronis partners.
These technical training courses are designed to provide IT professionals with broad knowledge and background information about the usage of Acronis Cyber Cloud and Cyber Protect Cloud software solutions. These hands-on training courses allow participants to learn and test all product functionality both on premises and in the cloud.
Tech Associate Protect course consists of 6 sections:
1. Planning for Cyber Protection – this section covers Security and Management Features, CyberFit Score, and Voice Control.
2. Cyber Protection for Backup & Recovery – this section covers Continuous Data Protection Backup, Forensic Backup, and Safe Recovery.
Subscribe to latest coupons on our Telegram channel.
3. Cyber Security – this section covers Antivirus and Antimalware Protection, Windows Defender and Microsoft Security Essentials, URL Filtering, Patch Management, and Data Protection Map.
4. Other Operations – this section covers Backup Scanning, Whitelist, Quarantine, and Remote Wipe.
5. Remote Desktop – this section covers HTML5 Client, Remote Desktop Client, and Sharing Remote Connection.
6. Monitoring & Reporting – this section covers Dashboard and Reports, Monitoring Disk Health, and Threat Feed Overview
Available as 1 hour online e-learning session.
English
language
Content
Introduction to Course
Introduction to Course
Planning for Cyber Protection
Planning for Cyber Protection
Voice Control
Protection Plan Modules
Cyber Protect for Backup & Recovery
CDP Backup
Forensic Backup
Cyber Security
Antivirus & Antimalware
Windows Defender
URL Filtering
Vulnerability Assessment
Patch Management
Data Protection Map
Pre-defined Protection Plans
Other Operations
Managing Quarantine Files
Backup Scanning
Whitelisting
Safe Recovery
Remote Wipe
Remote Desktop
Remote Desktop
Monitoring & Reporting
Dashboard and Reports
Threat Feed and Smart Protection
Disk Health Monitoring
Miscellaneous Tech Tips
Post a Comment