Intermediate level technical course that covers how to plan and perform cyber protection and remote management.


What you will learn


Intermediate level technical course on how to plan and perform cyber protection and remote management.


Description


The newly updated Acronis #CyberFit Tech trainings consists of four separate courses that you and your team can take either live, on-demand, or a combination of the two. Additionally, all Acronis #CyberFit Academy courses will be free this quarter for all existing Acronis partners.


These technical training courses are designed to provide IT professionals with broad knowledge and background information about the usage of Acronis Cyber Cloud and Cyber Protect Cloud software solutions. These hands-on training courses allow participants to learn and test all product functionality both on premises and in the cloud.


Tech Associate Protect course consists of 6 sections:


1. Planning for Cyber Protection – this section covers Security and Management Features, CyberFit Score, and Voice Control.


2. Cyber Protection for Backup & Recovery – this section  covers Continuous Data Protection Backup, Forensic Backup, and Safe Recovery.



Subscribe to latest coupons on our  Telegram channel.



3. Cyber Security – this section covers Antivirus and Antimalware Protection, Windows Defender and Microsoft Security Essentials, URL Filtering, Patch Management, and Data Protection Map.


4. Other Operations – this section covers Backup Scanning, Whitelist, Quarantine, and Remote Wipe.


5. Remote Desktop – this section covers HTML5 Client, Remote Desktop Client, and Sharing Remote Connection.


6. Monitoring & Reporting – this section covers Dashboard and Reports, Monitoring Disk Health, and Threat Feed Overview


Available as 1 hour online e-learning session.


English


language


Content


Introduction to Course


Introduction to Course


Planning for Cyber Protection


Planning for Cyber Protection


Voice Control


Protection Plan Modules


Cyber Protect for Backup & Recovery


CDP Backup


Forensic Backup


Cyber Security


Antivirus & Antimalware


Windows Defender


URL Filtering


Vulnerability Assessment


Patch Management


Data Protection Map


Pre-defined Protection Plans


Other Operations


Managing Quarantine Files


Backup Scanning


Whitelisting


Safe Recovery


Remote Wipe


Remote Desktop


Remote Desktop


Monitoring & Reporting


Dashboard and Reports


Threat Feed and Smart Protection


Disk Health Monitoring


Miscellaneous Tech Tips

Post a Comment

Previous Post Next Post