Solved

Quest Migration Management

Posted on 2013-11-15
3
269 Views
Last Modified: 2014-02-27
Hello

Does anyone know the best way to learn Quest tools.  There doesn't seem to be a qualification for it/book out there  

UK based question

Thanks
0
Comment
Question by:nico-
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 350 total points
ID: 39652448
Nothing other than getting the tool and testing it out.  I'm not sure about the UK;  but in any project I've been on that used Quest they included hours for their engineers to come on site also.  You can pick a lot up that way

I'm not sure what official training they might offer but you can contact them about that   http://www.quest.com/training/

you are right though...not any books on it.

Thanks

Mike
0
 

Author Comment

by:nico-
ID: 39892941
will hand some points over !

I've found that Quest is only given to partners of Dell - i.e companies.  Nothing available outside of that for individuals
0
 

Author Closing Comment

by:nico-
ID: 39892946
cheers, thanks for your help
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question