Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Overview
Explore
Labs
Services
Events
Partners

Select a tab

12 results found

Getting started with Cohesity

This Learning Path introduces you to the core features and functionality of Cohesity Data Protection and Cyber Recovery solutions. Starting with the Cohesity Data Platform, you'll explore how Cohesity DataProtect simplifies the protection of your most critical assets. As you progress, you'll gain insights into how Cohesity strengthens your defense against ransomware and other threats through advanced capabilities like anomaly detection, one-click threat intelligence and scanning, cyber vaulting, and machine learning–powered data classification.
Learning Path

Getting Started With Veeam Data Protection

The Veeam Data Protection Fundamentals Learning Path provides an introduction to the Veeam Data Platform. Learn about the three pillars that Veeam builds from and go hands-on with Veeam Backup and Replication. This Learning Path covers the basic concepts and functions of Veeam and provides an overview of data protection fundamentals.
Learning Path

Getting Started With Rubrik

The Rubrik Data Protection Fundamentals Learning Path will introduce you to the basic features and functionality of Rubrik. Learn about Rubrik's next-generation data management solution that goes beyond traditional data backups.
Learning Path

Getting Started With Commvault

This Learning Path will introduce you to the basic features and functionality of Commvault's data protection solutions. Learn about Commvault's scalable platform that ensures data security and availability across all workloads and environments.
Learning Path

Getting Started With Dell Data Protection

This Learning Path will introduce you to the basic features and functionality of the Dell Data Protection portfolio.
Learning Path

Rubrik Cyber Recovery

With cyberattacks increasing in frequency and sophistication, organizations face new challenges in protecting data. Legacy backup tools are more vulnerable than ever as attackers increasingly target backup data as part of their attacks. With Rubrik's comprehensive, modern solution to secure your data wherever it lives, organizations can be confident in their ability to recover from an attack while proactively gaining insight into threats and sensitive data.
Learning Path

Rubrik Data Protection

For those with a foundational understanding of Rubrik, this Learning Path will explore how Rubrik protects specific workloads such as Kubernetes, M365, and Microsoft Azure. This Learning Path also introduces Rubrik's Continuous Data Protection and details how Rubrik uses SLA Domains to simplify data protection.
Learning Path

Dell Cyber Recovery

The Dell Cyber Recovery Fundamentals Learning Path will introduce you to the basic features and functionality of the Dell Cyber Recovery solution. This Learning Path includes an overview of the Cyber Recovery solution as well as Index Engines CyberSense.
Learning Path

Dell Data Protection

Dell continues to modernize and optimize their data protection solutions to provide data management capabilities for evolving workloads. This Learning Path will cover how Dell is leading the way in the protection of cloud workloads, AI environments, and other emerging workloads.
Learning Path

Rubrik Cyber Recovery

The Rubrik Cyber Recovery Fundamentals Learning Path will provide foundational knowledge to start on your Cyber Recovery journey with Rubrik. This Learning Path includes an introduction to Cyber Recovery fundamentals and how Rubrik goes beyond traditional data protection solutions to protect against cyber threats. There are video introductions to Rubrik Security Cloud and how you can use Rubrik Security Cloud to detect, respond to, and recovery from a ransomware event.
Learning Path

Protect What Matters: An Intro to Data Protection

This beginner-friendly course provides a clear and practical introduction to the world of data protection. Designed to lay the groundwork for understanding why protecting data is critical in today's digital landscape. Explore key concepts like backup, recovery, and security, and discover how these practices safeguard information against risks and support business continuity. Perfect for anyone looking to build a strong foundation before advancing into more complex data protection and cyber recovery topics.
Learning Path

Protect, Detect, Recover: An Intro to Cyber Recovery

The Cyber Recovery Fundamentals Learning Path provides a solid foundation in the concepts, technologies, and best practices that form the backbone of modern cyber resilience. You'll learn how cyber recovery fits into an organization's overall data protection strategy, explore common threat scenarios such as ransomware, and discover the essential tools and processes used to detect, isolate, and restore critical data. You'll gain the practical knowledge needed to understand and apply cyber recovery principles in real-world environments.
Learning Path

Data Protection & Cyber Recovery

Data protection and cyber recovery strategies focus on safeguarding sensitive data and, in the event of a compromise or loss, recovering that data with little to no downtime. 

896 Followers

At a glance

174Total
70Articles
32Blogs
32Videos
12Learning Paths
9Case Studies
8Events
7Labs
2Workshops
1Assessment
1WWT Research
What's related
  • Data Center
  • Security
  • Cohesity
  • Cyber Resilience
  • ATC
  • Commvault
  • Dell Tech
  • Blog
  • Rubrik
  • Cloud
  • Dell Data Protection
  • AI & Data
  • Cohesity Data Protection
  • Primary Storage
  • Cohesity Cyber Resilience
  • WWT Presents
  • Cloud Security
  • Dell PowerProtect
  • Applied AI
  • Commvault Cyber Resilience

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies