Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong.
This course provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This course takes an enterprise-wide approach to developing a disaster recovery plan.
Download EC-Council Certification Track (pdf)
Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.
They will also learn the methods for identifying vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization.
This course is aimed to:
There are no prerequisites associated with this training course.
Characteristics:
The certification exam has the following characteristics:
The course has the following topics:
Introduction to Disaster Recovery and Business Continuity
Nature and Causes of Disasters
Emergency Management
Laws and Acts
Business Continuity Management
Disaster Recovery Planning Process
Risk Management
Facility Protection
Data Recovery
System Recovery
Backup and Recovery
Centralized and Decentralized System Recovery
Windows Data Recovery Tools
Linux, Mac and Novell Netware Data Recovery Tools
Incident Response
Role of Public Services in Disaster
Organizations Providing Services during Disasters
Organizations Providing Disaster Recovery Solutions
Case Studies
Our instructors are certified in different EC Council, Information Security, Cloud Computing and Risk Management disciplines and have an extensive experience in:
The design and implementation of Information Security Management Systems in the private and in the public sector.
The selection, implementation and configuration of tools and controls which support the Information Security management and which are the ones of most standing and acknowledgement in the market.
First and second level audits for Information Security Management Systems.
Teaching various ITSM, ISO, Information Security and Risk Management courses in the academic and professional field.