C)DRE Certified Disaster Recovery Engineer

When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in the vendor neutral Certified Disaster Recovery Engineer certification course.

Description

Certified Disaster Recovery EngineerDisaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies and procedures to follow in the event of a disruption. The goal is to keep a business’ critical operations running, which today relies heavily on its IT infrastructure. The comprehensive Certified Disaster Recovery Engineer course goes beyond traditional BCP training -preparing students for industry certification in Business Continuity planning, and presenting the latest methodologies and best practices for real-world systems recovery.  Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans. 

This course offers up-to-date information that has been developed by leading risk management professionals.

 

Prerequisites

 A minimum of 1 year of Information Systems or IS Management

 

Target audience

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • DR & BCP engineers
  • Information Systems Owners
  • IS Control Assessor

Detailed Syllabus

Module 1 - Welcome to Disaster Recovery Training

  • CDRE Agenda
  • The CDRE Exam
  • Introduction to Business Continuity Planning
  • What is a Disaster?
  • What is a Critical  Business Function?
  • Business Continuity Planning (BCP)
  • Importance of BCP
  • Importance of BCP
  • Disaster Recovery Planning (DRP)
  • Emergency Response
  • BC/DR Trends
  • Purpose of BC/DR Program
  • Challenges to Effective BCP
  • BCP Planning Phases
  • BCP Planning Phases
  • Where does Project Initiation
  • fit into the Process?
  • Project Initiation Phase
  • BC/DR Program Life Cycle
  • Summary

  • Module 2 Business Impact Analysis
  • BCP Planning Model
  • BCP Planning Phases
  • Where does BIA 
  • fit into the Process?
  • What is a BIA?
  • BIA Scope, Goal, and Objectives
  • BIA Terminology
  • Maximum Tolerable Downtime
  • Recovery Time Objective
  • Recovery Time Examples
  • Recovery Point Objective
  • BIA Process-  Disaster Mode Staffing
  • BIA Process - Capacity & Performance Objectives
  • BIA – Getting Started
  • BIA Tools
  • Kick off Meeting
  • Preparing for 
  • the BIA Interviews
  • Conducting the Interviews
  • BIA
  • Notes on Data Collection
  • Identify Dependencies
  • Finalize Data Analysis
  • BIA Report
  • Presentation to 
  • Senior Management
  • Summary

  • Module 3 - Risk Analysis
  • BCP Planning Model
  • BCP Planning Phases
  • Where does the Risk Analysis 
  • fit into the Process?
  • Functional Requirements
  • Threats to Business Process
  • Causes of Unplanned Downtime *
  • Risk Examples
  • Risk Analysis Terminology
  • Risk Analysis Terminology
  • Risk Analysis Activities
  • Exposure Inventory
  • Business Process Inventory
  • Business Process Documentation
  • Statement of Risk
  • ALE Annualized Loss Expectancy
  • Statement of Risk
  • Risk Control Definition
  • Identifying Existing Controls
  • Physical Controls
  • Risk Analysis
  • Risk Analysis
  • Risk Assessment Report
  • Compiling a Risk Assessment Report
  • Risk Analysis Summary

  • Module 4 - Design & Development Phase (BCP Strategies)
  • BCP Planning Model
  • BCP Planning Phases
  • Where does BCP Strategies
  • fit into the Process?
  • Strategy Process
  • BCP Strategies
  • Summary
  • BCP Planning Phases
  • Where does BIA fit into the Process?
  • Design & Development Phase
  • BCP Design
  • Emergency Response & Operations
  • Emergency Response Components
  • Develop ER Procedures
  • ER Sources for Assistance
  • BCP Design
  • BCP Design
  • Alternate Recovery Site
  • Selecting Vendors 
  • for DR/BC Services
  • Site Recovery & Resumption
  • Restoration of Primary Site
  • Return to Primary Site
  • Continuity Strategy - Insurance
  • Evaluate Insurance Terms
  • Summary
 
  • Module 5 - IT Recovery Strategies
  • BCP Planning Model
  • BCP Planning Phases
  • Where does IT Strategy 
  • fit into the Process?
  • IT Recovery Strategy Process
  • IT Recovery Strategies
  • Examples of IT Recovery
  • Tape Backups
  • Tape Vault Facilities
  • Disk Backups
  • DIY Disk Backups
  • Backup Appliance
  • Data Archiving
  • Systems Replication
  • SAN Replication
  • Virtual Server Replication
  • Application Redundancy
  • Voice & Networking Strategies
  • Alternate Recovery Sites
  • Alternate Recovery Sites
  • Internal or Vendor
  • BC/DR Services
  • Selecting Vendors 
  • for BC/DR Services
  • Evaluating Vendors 
  • of DR/BC Resources
  • Critical Factors
  • IT Recovery 
  • Strategies Assessment
  • IT Recovery Strategies
  • Summary
  • BCP Planning Phases
  • Where does IT 
  • Strategy fit into the Process?
  • DR Plan Development
  • DR Plan Design
  • Summary

  • Module 6 - Implementation Phase
  • BCP Planning Model
  • BCP Planning Phases
  • Where does Implementation
  • fit into the Process?
  • Implementation of BCP
  • Responsibility for
  • BCP Implementation
  • Determine Cost Estimates
  • Management Approval 
  • and Funding
  • Install & Configure
  • Detailed Documentation
  • Implement Operational Changes
  • Procure Facilities & Services
  • BCP Planning Phases
  • Where does Awareness & Training 
  • fit into the Process?
  • Awareness & Training
  • Summary

  • Module 7 - Testing and Exercise
  • BCP Planning Model
  • BCP Planning Phases
  • Where does Testing and Drills fit into the Process?
  • Testing & Exercise Phase
  • Testing & Drills
  • Progression of Testing Types
  • Testing Participants
  • Test Script Example
  • Testing Post-Mortem
  • Summary
 
  • Module 8 - Maintenance and Updating
  • BCP Planning Model
  • BCP Planning Phases
  • Where does Maintenance
  • fit into the Process?
  • Maintenance 
  • Policies and Procedures
  • Plan Maintenance
  • Maintenance & Schedule Budgets
  • Software Tools for Maintenance
  • Input Criteria 
  • for Plan Maintenance
  • Plan Distribution & Security
  • Summary
 
  • Module 9 - Pandemics
  • What is a Pandemic?
  • Pandemic Frequency
  • Quick Facts
  • Effects on Business
  • Who Should Plan for 
  • Pandemic Influenza?
  • Develop a Disaster Plan
  • Develop a Disaster Plan
  • Planning Checklist
  • Communications
  • HR Travel Policies
  • Physical Resources
  • Contamination
  • Pandemics – Work from Home
  • Pandemics
 
  • Module 10 Case Studies and Templates
  • Hospital Case Study
  • Pharmacy Case Study
  • BIA Worksheet
  • Inventory Worksheet
  • BCP Master Document

Similar courses

With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

More Information

Held by over 1​ million IT professionals worldwide, CompTIA A+ is the most essential IT certification for establishing an IT career. If you’re new to the IT industry, this will help you put your best foot forward. And if you’re already an IT professional, the CompTIA A+ certification validates your skills and can boost your career.

More Information

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

More Information

The Certified Professional Ethical Hacker course is the introductory training to mile2's line of penetration testing courses and certifications.

More Information

The Certified Associate in Project Management (CAPM) is a globally recognized credential that demonstrates your ability to work as a project management professional. This online course is designed to equip you with the foundational knowledge and skills needed to successfully pass the CAPM exam and launch your project management career!

More Information

The Certified Information Systems Security Manager certification course is designed to teach towards and certify a information systems professional high standard of excellence in following areas:

More Information

The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security

More Information

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

More Information

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena.

More Information

This course is for persons wishing to take the Microsoft Office Specialist (MOS) PowerPoint exam.

More Information

Looking to boost your project management skills? Join our PMP Certification event online! Learn the ins and outs of project management, from planning to execution, all from the comfort of your home. Our expert instructors will guide you through the process, helping you ace the PMP exam. Don't miss this opportunity to advance your career and become a certified project management pro.

More Information

Get Certified at your own pace with these Mile 2 Cyber Security Ultimate Self-Study and Certification Bundles.Everything you need to pass 1 mile2 certification on your own time and at your own pace!

More Information

Want to make sure that you are ready for the PMI-PBA® exam and increase your odds of passing it on the first try? This comprehensive workshop will prepare you for the PMI Professional in Business Analysis (PMI-PBA)® exam and help you make the most of the limited study time you have. The course was designed, created, and is taught by recipients of multiple credentials who have been awarded the PMI-PBA in order to help others focus on the critical areas to study and prepare for the exam.

More Information

The PMI-ACP Certification Preparation training course will thoroughly prepare Agile practitioners to sit for and pass the PMI-ACP exam through instructor-led presentations, class discussions, games, exercises, and practice exams. The course is aligned with the PMI-ACP Exam Content Outline (ECO) and provides everything needed to pass the exam

More Information

The Mile2® vendor-neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The mile2 vendor neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

CIMA Unlimited is a complete programme of study for the Certificate level that provides everything you need to pass your exams at an extremely attractive price.

More Information

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

More Information

This three-day course prepares you for the examination leading to the Foundation Certificate in IT Service Management. The course is designed as an introduction to ITIL 4 and enables you to understand a new way to look at IT Service Management through a Service Value System (SVS).

More Information