Disaster Recovery Professional (EDRP)

Seminarinformationen

Seminar - Ziel

EC Council Disaster Recovery Professional (EDRP) is a compressive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans.

It teaches professionals various methods of identifying vulnerabilities and taking countermeasures against the said vulnerabilities. The professionals will learn how to secure their data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster.

EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan.

Teilnehmer - Zielgruppe

  • IT professionals in the area of ​​BC/DR or system domain administration
  • Business Continuity and Disaster Recovery Consultants/Employees
  • IT risk manager and consultant
  • CISOs and IT leaders

Kurs - Voraussetzungen

Min 2 yrs experience in the BC/DR domain.

Seminardauer

  • 5 Tage
  • 09:00 Uhr bis 17:00 Uhr

Schulungsunterlagen

  • nach Absprache

Seminar-Inhalt / Agenda

Module 01: Introduction to Disaster Recovery and Business Continuity

  • An Introduction to Business Continuity
  • An Introduction to Disaster Recovery
  • Basic Terminologies of Disaster Recovery & Business Continuity
  • Disaster Recovery Vs. Business Continuity
  • Purpose of Disaster Recovery and Business Continuity
  • Trends in Disaster Recovery and Business Continuity
  • Best Practices in Disaster Recovery and Business Continuity

Module 02: Business Continuity Management (BCM)

  • What is Business Continuity
  • What is BCM?
  • Ownership of BCM
  • Scope of BCM
  • Benefits of BCM
  • Business Continuity Management Framework
  • Best Practices of BCM
  • Business Continuity Standards

Module 03: Risk Assessment

  • Terminologies Related to Risk in BCP
  • What is a Risk?
  • Risk Models
  • Risk Assessment
  • Goals of Risk Assessment
  • Assessment Approaches
  • Communicating and Sharing Risk Assessment Information and Results
  • Maintaining the Risk Assessment
  • Steps in Risk Assessment Process
  • Risk Assessment Report
  • Best Practices in Risk Assessment
  • Risk Management Standards
  • Case Study

Module 04: Business Impact Analysis (BIA)

  • What is Cost Benefit Analysis (CBA)?
  • What is Business Impact Analysis (BIA)?
  • Scope and Objectives of Business Impact Analysis (BIA)
  • BIA Terminology
  • Components of BIA
  • Performing BIA
  • ISO/TS 22317:2015 (Societal Security—Business Continuity Management Systems-Guidelines for
  • BIA)
  • Case Study

Module 05: Business Continuity Planning (BCP)

  • Business Continuity Planning
  • Characteristics of Business Continuity Plan
  • Key Elements of Business Continuity Policy
  • Key Elements of Business Continuity Plan as Part of its Policy
  • Business Continuity Strategy Design
  • Case Study for Business Continuity Strategy Design

Module 06: Data Backup Strategies

  • Backup
  • Need for Backup
  • Types of Backup
  • 3-2-1 Backup Strategy
  • Hot Backup
  • Cold Backup
  • Types of Backup/ Recovery Sites
  • Bare Metal Recovery
  • Disk Backups
  • Deduplication
  • Cloud Data Recovery
  • Cloud Disaster Recovery Blueprint
  • Best Practices in Backup

Module 07: Data Recovery Strategies

  • Introduction to Data Recovery
  • Recovery Management
  • Recovery Management Model Layers
  • Types of Data Recovery
  • Steps in Data Recovery
  • Disk-to-Disk-to-Disaster Recovery (3DR)
  • Infrastructure Technologies
  • Data Protection Continuum
  • Data Loss
  • Best Practices in Data Recovery

Module 08: Virtualization-Based Disaster Recovery

  • What is Virtualization?
  • Virtualization and Disaster Recovery
  • Backup of Virtual Systems
  • Challenges in Virtualization Deployment
  • Best Practices in Virtualization
  • Virtualization Standards
  • Case Study

Module 09: System Recovery

  • What is System Recovery?
  • System Restore in Windows 10
  • Linux System Recovery
  • Mac System Recovery
  • Restoration of Windows Server 2012
  • Recovering from a Boot issue in Windows Server 2012 R2
  • Active Directory Recovery
  • Verifying Active Directory Restoration
  • Sysvol Recovery
  • Recovery of Global Catalog Servers
  • Recovery of Domain Controller
  • Database Integrity Testing
  • Restoring IIS Configurations
  • Restoring Microsoft IIS Metabase Backup
  • Restoring Exchange Server 2016
  • IBM WebSphere Application Server Recovery
  • Recovering from Domino Server Crashes
  • Restoring MySQL Server

Module 10: Centralized and Decentralized System Recovery

  • Introduction
  • Centralized Computing
  • Centralized Computing Architecture
  • Decentralized Computing
  • Decentralized Computing Architecture
  • Differences between Centralized Computing and Decentralized Computing
  • Survivable Storage Systems

Module 11: Disaster Recovery Planning Process

  • Introduction to Disaster Recovery (DR)
  • Need for Disaster Recovery Planning
  • Factors Affecting the Disaster Recovery (DR) Strategy
  • Components of a Disaster Recovery Plan Strategy
  • Disaster Recovery Planning Process
  • DR Planning Methodology
  • Disaster Recovery Lifecycle
  • Tiers of Disaster Recovery
  • Data Protection and Recovery Strategy
  • Establishing a Disaster Recovery Plan
  • Develop a Disaster Recovery Team Structure
  • Disaster Recovery Plan Testing
  • DR Plan Implementation

Module 12: BCP Testing, Maintenance, and Training

  • Business Continuity Plan Testing
  • Elements of the BCP Test Plan
  • Maintaining the Business Continuity Plan
  • Auditing the Business Continuity Plan
  • BCP Training
  • Implementing Business Continuity Training Program
  • Establishing a BC Training Program
  • Value of BC Training
  • BC Training Evaluation

Weitere Schulungen zu Thema EC-Council

Certified Incident Handler (ECIH)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts ...

Certified Network Defender (CND)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the ...

Certified Encryption Specialist (ECES)

- u.a. in Frankfurt am Main, Köln, Leipzig, Paderborn, Darmstadt

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, ...

Certified Security Specialist (ECSS)

- u.a. in Hamburg, Köln, Nürnberg, Heidelberg, Offenbach

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security ...