Seminare
Seminare

Disaster Recovery Professional (EDRP)

Webinar - PROKODA GmbH

Disaster Recovery Professional (EDRP)
Termin Ort Preis*
02.12.2024- 06.12.2024 online 5.295,50 €
02.12.2024- 06.12.2024 Nürnberg 5.295,50 €
*Alle Preise verstehen sich inkl. MwSt.

Detaillierte Informationen zum Seminar

Inhalte:

Agenda Module 01: Introduction to Disaster Recovery and Business Continuity

  • An Introduction to Business Continuity
  • An Introduction to Disaster Recovery
  • Basic Terminologies of Disaster Recovery & Business Continuity
  • Disaster Recovery Vs. Business Continuity
  • Purpose of Disaster Recovery and Business Continuity
  • Trends in Disaster Recovery and Business Continuity
  • Best Practices in Disaster Recovery and Business Continuity

Module 02: Business Continuity Management (BCM)

  • What is Business Continuity
  • What is BCM?
  • Ownership of BCM
  • Scope of BCM
  • Benefits of BCM
  • Business Continuity Management Framework
  • Best Practices of BCM
  • Business Continuity Standards

Module 03: Risk Assessment

  • Terminologies Related to Risk in BCP
  • What is a Risk?
  • Risk Models
  • Risk Assessment
  • Goals of Risk Assessment
  • Assessment Approaches
  • Communicating and Sharing Risk Assessment Information and Results
  • Maintaining the Risk Assessment
  • Steps in Risk Assessment Process
  • Risk Assessment Repor
  • Best Practices in Risk Assessment
  • Risk Management Standards
  • Case Study

Module 04: Business Impact Analysis (BIA)

  • What is Cost Benefit Analysis (CBA)?
  • What is Business Impact Analysis (BIA)?
  • Scope and Objectives of Business Impact Analysis (BIA)
  • BIA Terminology
  • Components of BIA
  • Performing BIA
      • ISO/TS 22317:2015
  • (Societal Security—Business Continuity Management Systems-Guidelines for BIA)
  • Case Study

Module 05: Business Continuity Planning (BCP)

  • Business Continuity Planning
  • Characteristics of Business Continuity Plan
  • Key Elements of Business Continuity Policy
  • Key Elements of Business Continuity Plan as Part of its Policy
  • Business Continuity Strategy Design
  • Case Study for Business Continuity Strategy Design

Module 06: Data Backup Strategies

  • Backup
  • Need for Backup
  • Types of Backup
  • 3-2-1 Backup Strategy
  • Hot Backup
  • Cold Backup
  • Types of Backup/ Recovery Sites
  • Bare Metal Recovery
  • Disk Backups
  • Deduplication
  • Cloud Data Recovery
  • Cloud Disaster Recovery Blueprint
  • Best Practices in Backup

Module 07: Data Recovery Strategies

  • Introduction to Data Recovery
  • Recovery Management
  • Recovery Management Model Layers
  • Types of Data Recovery
  • Steps in Data Recovery
  • Disk-to-Disk-to-Disaster Recovery (3DR)
  • Infrastructure Technologies
  • Data Protection Continuum
  • Data Loss
  • Best Practices in Data Recovery

Module 08: Virtualization-Based Disaster Recovery

  • What is Virtualization?
  • Virtualization and Disaster Recovery
  • Backup of Virtual Systems
  • Challenges in Virtualization Deployment
  • Best Practices in Virtualization
  • Virtualization Standards
  • Case Study

Module 09: System Recovery

  • What is System Recovery?
  • System Restore in Windows 10
  • Linux System Recovery
  • Mac System Recovery
  • Restoration of Windows Server 2012
  • Recovering from a Boot issue in Windows Server 2012 R2
  • Active Directory Recovery
  • Verifying Active Directory Restoration
  • Sysvol Recovery
  • Recovery of Global Catalog Servers
  • Recovery of Domain Controller
  • Database Integrity Testing
  • Restoring IIS Configurations
  • Restoring Microsoft IIS Metabase Backup
  • Restoring Exchange Server 2016
  • IBM WebSphere Application Server Recovery
  • Recovering from Domino Server Crashes
  • Restoring MySQL Server

Module 10: Centralized and Decentralized System Recovery

  • Introduction
  • Centralized Computing
  • Centralized Computing Architecture
  • Decentralized Computing
  • Decentralized Computing Architecture
  • Differences between Centralized Computing and Decentralized Computing
  • Survivable Storage Systems

Module 11: Disaster Recovery Planning Process

  • Introduction to Disaster Recovery (DR)
  • Need for Disaster Recovery Planning
  • Factors Affecting the Disaster Recovery (DR) Strategy
  • Components of a Disaster Recovery Plan Strategy
  • Disaster Recovery Planning Process
  • DR Planning Methodology
  • Disaster Recovery Lifecycle
  • Tiers of Disaster Recovery
  • Data Protection and Recovery Strategy
  • Establishing a Disaster Recovery Plan
  • Develop a Disaster Recovery Team Structure
  • Disaster Recovery Plan Testing
  • DR Plan Implementation

Module 12: BCP Testing, Maintenance, and Training

  • Business Continuity Plan Testing
  • Elements of the BCP Test Plan
  • Maintaining the Business Continuity Plan
  • Auditing the Business Continuity Plan
  • BCP Training
  • Implementing Business Continuity Training Program
  • Establishing a BC Training Program
  • Value of BC Training
  • BC Training Evaluation
Teilnahmevoraussetzungen:

Voraussetzungen

Für eine optimale Teilnahme am Kurs empfehlen wir folgende Vorkenntnisse:

  • Erfahrungen im Bereich IT BC/DR
  • Nachweis über 2 Jahre Berufserfahrung im Bereich Informationssicherheit
Zielgruppe:

Zielgruppe

  • IT-Fachleute im Bereich BC/DR oder System Domäne Administration
  • Business Continuity und Disaster Recovery Berater / Mitarbeiter
  • IT-Risikomanager und -Berater
  • CISOs und IT-Leiter
Nach unten
Nach oben
Wir setzen Analyse-Cookies ein, um Ihre Zufriedenheit bei der Nutzung unserer Webseite zu verbessern. Diese Cookies werden nicht automatisiert gesetzt. Wenn Sie mit dem Einsatz dieser Cookies einverstanden sind, klicken Sie bitte auf Akzeptieren. Weitere Informationen finden Sie hier.
Akzeptieren Nicht akzeptieren









Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha



Bei der Verarbeitung Ihrer personenbezogenen Daten im Zusammenhang mit der Kontaktfunktion beachten wir die gesetzlichen Bestimmungen. Unsere ausführlichen Datenschutzinformationen finden Sie hier. Bei der Kontakt-Funktion erhobene Daten werden nur an den jeweiligen Anbieter weitergeleitet und sind nötig, damit der Anbieter auf Ihr Anliegen reagieren kann.







Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha