Veeam Backup & Replication: Configure, Manage, and Recover (VBRCMR)

About Course

The Veeam® Backup & Replication™ v12.3: Configure, Manage and Recover training course is a four-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v12.3 solution. With extensive hands on labs, the class promotes situational resiliency in responding to recovery scenarios and enables administrators and engineers to effectively protect and manage data in an ever changing technical and business environment, bringing tangible benefit to business in the digital world. This course is based on Veeam Backup & Replication v12.3, part of Veeam Data Platform.

Course Objectives

After completing this course, you will be able to:

  • Describe Veeam security concepts
  • Given a scenario, configure a backup job and a backup copy job
  • Explain network-attached storage (NAS) backups and configuration
  • Describe Veeam’s replication capabilities
  • Determine appropriate use case for backups, replicas and/or continuous data protection
  • Configure backup infrastructure components, including proxy and repository
    servers
  • Given a scenario, evaluate when and how to apply immutability settings
  • Given a scenario, recover data from backups

Course Outline

1.  Data Protection Strategies

Review of key data protection strategies that ensure the safety of your data.

2.  Analysis of Risks to Data

Explore different risk scenarios, what risks do we face daily within our environment?

3.  What Is Protected?

Review of Veeam Data Platform and introduction to the class scenario.

4.  Security and protection considerations

Describe strategies and tools to secure the Veeam backup server to avoid unauthorized
access and data leaks.

5.  Protecting workloads

Efficiently protect VMware and Hyper-V virtual machines based on well-defined SLAs
through the creation of backup jobs.

6.  Deploying agents

Identify the use of protection groups to automate the installation of Veeam Agents and
protecting workloads with agent backup jobs.

7.  Unstructured Data Backup

List required components and features available to protect unstructured data.

8.  Optimizing Your Backups

Analyze features and settings that allow backup storage optimization, faster backups and
data consistency.

9.  Immutability and Hardened Repositories

Describe backup data protection mechanisms to avoid premature deletion and unwanted
modifications. Identify characteristics and deployment steps of Linux Hardened
Repositories to achieve backup data immutability.

10.  Backup Infrastructure Optimization

List deployment options and additional settings to improve general backup solution
performance.

11.  Replication

Describe use cases, architectures and features of replication jobs and continuous data
protection (CDP) policies.

12.  Backup Copy Jobs

Ensure recoverability and adhere to the 3-2-1 Rule with backup copy jobs.

13.  Long-Term Retention

List different mechanisms for data archiving, including grandfather-father-son retention
policies.

14.  Scale-Out Backup Repository™

Describe architecture, placement policies, data tiers and management of Scale-out
Backup Repositories.

15.  Move and Copy Backups with VeeaMover

Identify use cases for virtual machine and backup migrations with VeeaMover.

16.  Recovery Verification

Create automated tests to ensure recoverability from backups and replicas.

17.  Veeam Backup Enterprise Manager

Describe the use cases for Veeam Backup Enterprise Manager.

18.  Incident Response Planning

Integrating Veeam Backup and Replication into your incident response plan.

19.  Advanced Recovery Features

Explore some more in-depth recovery features of Veeam Backup and Replication.

20.  Selecting the Ideal Recovery Method

What are the implications of different recovery methods and selecting the correct
recovery method.

21.  Enacting a Recovery

Get practice in recovering different recovery types with a variety of data types.

22.  Malware Detection

Using Veeam’s malware detection capabilities.

23.  Post-Incident Processes

Investigate post-incident activites.

World Food Programme (WFP)

Our work with the World Food Programme (WFP) focused on enabling the effective adoption of digital field technologies and essential digital literacy capabilities. Participants utilized mobile-based data collection platforms within operational contexts, enhancing accuracy, consistency, and confidence in digital data handling. The engagement strengthened WFP’s ability to rely on digital tools to support field operations and humanitarian programs.

Raya

For Raya, we delivered technology enablement focused on automation-driven operations and scalable application development. Participants gained hands-on experience with automation technologies and modern front-end development frameworks, supporting more efficient processes and the delivery of flexible, high-performance digital solutions aligned with business growth objectives.

EgyptAir

Our engagement with EgyptAir focused on enabling the effective use of application development technologies alongside the adoption of cybersecurity and secure computing practices within operational environments. Participants worked with Microsoft-based development platforms and programming technologies while gaining practical exposure to secure application usage, access control mechanisms, and threat-aware system interaction. This integrated technology enablement supported more secure digital operations, improved system reliability, and reinforced cyber resilience across aviation technology environments.

Banque Misr

We collaborated with Banque Misr to enable integrated enterprise technology capabilities across multiple domains. The engagement supported effective utilization of IT infrastructure environments, data analytics platforms, and professional capability development frameworks, allowing teams to operate confidently within complex enterprise systems. Our delivery approach focused on practical technology adoption, operational alignment, and building sustainable competencies that support reliable banking services and informed, data-driven decision-making.

Course Booking Form