Microsoft System Center 2012 R2 – Configure and Deploy: DPM

This course is included in our On-demand training solution.


Protecting the private cloud is vital in order for an organization to fulfill its objectives. In this course, you’ll learn how System Center Data Protection Manager, or DPM, allows data center administrations to protect, backup, and restore their cloud infrastructure. This course is one of a series in the Skillsoft learning path that can be taken in preparation for the exam 70-247 – Configuring and Deploying a Private Cloud.

Target Audience

Data center administrators responsible for designing, installing, and configuring a private cloud infrastructure



Expected Duration

120 min.

Course Objectives

Course Introduction

DPM Considerations

  • describe the considerations for a DPM deployment
  • DPM Backup Strategies

  • recognize the different DPM backup strategies
  • DPM Storage Strategies

  • recognize the different DPM storage options
  • DPM Security Roles

  • recognize the different DPM security roles
  • DPM Components

  • recognize the required DPM components
  • DPM Process

  • describe and plan the DPM process
  • DPM End-User File Protection

  • recognize the DPM protection options for end-user files
  • DPM Upgrade Requirements

    DPM In-Place Upgrade

  • plan a DPM in-place upgrade
  • DPM Side-by-Side Upgrade

  • plan a DPM side-by-side upgrade
  • Installing DPM

    Configuring Storage Pools for DPM

  • configure a storage pool for DPM
  • Deploying DPM Agents

  • deploy DPM agents to domain and workgroup computers
  • Deploying DPM Agents Using Certificate Authentication

  • deploy DPM agents using certificate-based authentication
  • Creating DPM Protection Groups

  • create and configure a DPM protection group
  • Configuring SQL Server Protection

  • configure SQL Server protection using DPM
  • Restoring SQL Server Data

  • restore SQL Server data using DPM
  • SQL Self-Service Recovery

  • configure and perform self-service recovery for SQL data
  • Protecting Hyper-V Using DPM

  • recognize the options for protecting Hyper-V hosts and guests with DPM
  • Protecting Hyper-V Clusters Using DPM

  • configure DPM protection for Hyper-V servers
  • Recovering Virtual Machine Data Using DPM

  • recover virtual machines and virtual machine files using DPM
  • DPM Self-Service Recovery for End Users

  • configure DPM self-service recovery for end users
  • Exercise: Configuring DPM