Mestoonline - na engleskom
Datum09.02.2026 - 12.02.2026
Vreme07:30-14:30
Cena225.000,00 + PDV

Overview

The Veeam® Backup & Replication™ v13: Configure,Manage and Recover training course is a four day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v13
solution.

With extensive hands-on labs, the class promotes situational resiliency in responding to recovery scenarios and enables administrators and engineers to effectively protect and manage data in an ever-changing technical and business environment, bringing tangible benefit to business in the digital world. This course is based on Veeam Backup & Replication v13, part of Veeam Data Platform.

Course duration

four days
Theory/labs: 60/40

Audience

This course is suitable for anyone responsible for configuring, managing, or supporting a Veeam Backup & Replication v12.3 environment. It is also ideal for IT professionals across various roles, including backup administrators, disaster recovery
specialists, system engineers, technical support staff, IT administrators, cloud administrators, cybersecurity professionals, compliance officers, monitoring specialists, reporting analysts, and security teams — reflecting the broad applicability of Veeam University PRO trainings.

Prerequisites

Students should have fundamental IT experience working with networking, servers, storage, cloud, virtualization and operating systems. To get the most out of this course, students should be familiar with the core fundamental concepts of Veeam Backup & Replication through hands-on experience.

Certification

VMCE is the foundational training required to qualify for the upcoming VMCE-E certification. To progress to this next-level Veeam certification, candidates must complete the designated courses in Veeam Backup & Replication, Veeam Data
Platform: Monitor, Manage, Analyze (Veeam ONE), and Veeam Data Platform: Scale, Automate, Secure (Veeam Recovery Orchestrator).

Objectives

After completing this course, students will
be able to:
• Articulate Veeam’s data protection strategy
• Explain the role of each of Veeam’s
core components
• Configure and manage the Veeam
Software Appliance
• Given a scenario, configure a backup job and
backup copy job
• Protect physical servers with Veeam agents
• Configure unstructured data backup jobs
(NAS/SMB shares, etc)
• Describe Veeam’s replication capabilities
• Determine appropriate use case for backups,
replicas and continuous data protection
• Ensure backup recoverability by leveraging
SureBackup and immutable repositories
• Describe Veeam security concepts and how
to implement within the product
• Configure malware detection and explain how
to remediate
• Given a scenario, recover data from backups for
VMs, agents and applications
• Articulate the enterprise products Veeam has
developed plug-ins for
• Describe how to monitoring, reporting and
alerting function
• Implement the enterprise manager
• Explain how to perform basic troubleshooting
procedures and how to work with support

Course Contents

Data Protection Strategies
Review of key data protection strategies that
ensure the safety of your data.
Analysis of risks to data
Explore different risk scenarios. What risks do we
face daily within our environment?
What is protected?
Review of Veeam Data Platform and introduction
to the class scenario.
Security and protection considerations
Describe strategies and tools to secure the Veeam
backup server to avoid unauthorized access and
data leaks.
Protecting workloads
Efficiently protect VMware and Hyper-V virtual
machines based on well-defined SLAs through
the creation of backup jobs.
Deploying agents
Identify the use of protection groups to automate
the installation of Veeam Agents and protect
workloads with agent backup jobs.
Unstructured data backup
List required components and features available
to protect unstructured data.
Optimizing your backups
Analyze features and settings that allow backup
storage optimization, faster backups and
data consistency.
Backup copy jobs
Ensure recoverability and adhere to the 3-2-1
Rule with backup copy jobs.
Immutability and hardened repositories
Describe backup data protection mechanisms
to avoid premature deletion and unwanted
modifications. Identify characteristics and
deployment steps of Linux Hardened Repositories
to achieve backup data immutability

Backup infrastructure optimization
List deployment options and additional settings to
improve general backup solution performance.
Replication
Describe use cases, architectures and features
of replication jobs and continuous data protection
(CDP) policies.
Long-term retention
List different mechanisms for data archiving,
including grandfather-father-son retention policies.
Scale-out Backup Repository™
Describe architecture, placement policies,
data tiers and management of Scale-out
Backup Repositories.
Move and copy backups with VeeaMover
Identify use cases for virtual machine and backup
migrations with VeeaMover.
Recovery verification
Create automated tests to ensure recoverability
from backups and replicas.
Veeam Backup Enterprise Manager
Describe the use cases for Veeam Backup
Enterprise Manager.
Incident Response Planning
Integrating Veeam Backup and Replication into
your incident response plan.
Advanced recovery features
Explore some more in-depth recovery features
of Veeam Backup and Replication.
Selecting the ideal recovery method
What are the implications of different
recovery methods and selecting the correct
recovery method.
Enacting a recovery
Get practice in recovering different recovery types
with a variety of data types.

Malware Detection
Using Veeam’s malware detection capabilities.
Post-incident processes
Investigate post-incident activities.
Enterprise Plugins
Learn which plug-ins Veeam currently supports
and how they work
Monitoring, alerting and reporting
Discover how to run reports and understand
backup job status summaries

Troubleshooting
Understand the basics of troubleshooting Veeam
issues and how to resolve with support
Veeam Calculators
Where to find them and an intro on how to utilize

Leave a Reply