Certified Disaster Recovery Professional
Certified Disaster Recovery Professional
Certified Disaster Recovery Professional

Certified Disaster Recovery Professional

Equips professionals with essential business continuity and disaster recovery skills, including securing data through policies and restoring critical systems after a disaster.

This Course Is Ideal For

  • IT Professionals in the BC/DR or System Administration domain

  • Business Continuity and Disaster Recovery Consultants

  • Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery

  • IT Risk Managers and Consultants

  • CISOs and IT Directors

  • IT Professionals in the BC/DR or System Administration domain

  • Business Continuity and Disaster Recovery Consultants

  • Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery

  • IT Risk Managers and Consultants

  • CISOs and IT Directors

  • IT Professionals in the BC/DR or System Administration domain

  • Business Continuity and Disaster Recovery Consultants

  • Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery

  • IT Risk Managers and Consultants

  • CISOs and IT Directors

What to Expect In This Course

SKILL LEVEL
Intermediate
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English

Skill You Will Learn

  • Develop and implement comprehensive Business Continuity (BC) and Disaster Recovery (DR) plans for IT environments.

  • Conduct thorough risk assessments and business impact analyses (BIA) to identify critical assets and vulnerabilities.

  • Design and execute effective data protection strategies, including various backup types and cloud recovery solutions.

  • Implement virtualization-based and system recovery procedures for efficient restoration of operations.

  • Test, maintain, and continuously improve BC/DR plans through drills, training, and regular updates.

  • Ensure BC/DR initiatives comply with relevant industry standards and regulatory frameworks (e.g., ISO, NFPA, NICE).

  • Apply practical, hands-on skills gained through labs and case studies to real-world BC/DR scenarios.

  • Develop and implement comprehensive Business Continuity (BC) and Disaster Recovery (DR) plans for IT environments.

  • Conduct thorough risk assessments and business impact analyses (BIA) to identify critical assets and vulnerabilities.

  • Design and execute effective data protection strategies, including various backup types and cloud recovery solutions.

  • Implement virtualization-based and system recovery procedures for efficient restoration of operations.

  • Test, maintain, and continuously improve BC/DR plans through drills, training, and regular updates.

  • Ensure BC/DR initiatives comply with relevant industry standards and regulatory frameworks (e.g., ISO, NFPA, NICE).

  • Apply practical, hands-on skills gained through labs and case studies to real-world BC/DR scenarios.

  • Develop and implement comprehensive Business Continuity (BC) and Disaster Recovery (DR) plans for IT environments.

  • Conduct thorough risk assessments and business impact analyses (BIA) to identify critical assets and vulnerabilities.

  • Design and execute effective data protection strategies, including various backup types and cloud recovery solutions.

  • Implement virtualization-based and system recovery procedures for efficient restoration of operations.

  • Test, maintain, and continuously improve BC/DR plans through drills, training, and regular updates.

  • Ensure BC/DR initiatives comply with relevant industry standards and regulatory frameworks (e.g., ISO, NFPA, NICE).

  • Apply practical, hands-on skills gained through labs and case studies to real-world BC/DR scenarios.

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module 10

Module 11

Module 12

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module 10

Module 11

Module 12

Outcomes of the Course

By the end of this course, participants will be able to:

  • Ability to design a robust Business Continuity Management (BCM) framework.

  • Proficiency in creating comprehensive risk assessment reports.

  • Skill in generating detailed Business Impact Analysis (BIA) reports.

  • Capability to develop effective business continuity strategies.

  • Expertise in applying Disk-to-Disk-to-Disaster Recovery (3DR) concepts and implementing various infrastructure technologies for data recovery.

  • Competence in leveraging virtualization for disaster recovery and implementing various virtualization techniques.

  • Ability to create backups of virtual machines running on platforms like VMware and Hyper-V.

  • Proficiency in implementing system recovery across diverse operating systems (Windows, Linux, Mac).

  • Demonstrated ability to recover various servers running on different operating systems.

  • Understanding and application of centralized and decentralized computing architectures for recovery.

  • Knowledge and implementation of PASIS architecture.

  • Ability to execute key disaster recovery documentation activities.

  • Competence in planning and executing disaster recovery testing, including various BCP testing methods.

By the end of this course, participants will be able to:

  • Ability to design a robust Business Continuity Management (BCM) framework.

  • Proficiency in creating comprehensive risk assessment reports.

  • Skill in generating detailed Business Impact Analysis (BIA) reports.

  • Capability to develop effective business continuity strategies.

  • Expertise in applying Disk-to-Disk-to-Disaster Recovery (3DR) concepts and implementing various infrastructure technologies for data recovery.

  • Competence in leveraging virtualization for disaster recovery and implementing various virtualization techniques.

  • Ability to create backups of virtual machines running on platforms like VMware and Hyper-V.

  • Proficiency in implementing system recovery across diverse operating systems (Windows, Linux, Mac).

  • Demonstrated ability to recover various servers running on different operating systems.

  • Understanding and application of centralized and decentralized computing architectures for recovery.

  • Knowledge and implementation of PASIS architecture.

  • Ability to execute key disaster recovery documentation activities.

  • Competence in planning and executing disaster recovery testing, including various BCP testing methods.

By the end of this course, participants will be able to:

  • Ability to design a robust Business Continuity Management (BCM) framework.

  • Proficiency in creating comprehensive risk assessment reports.

  • Skill in generating detailed Business Impact Analysis (BIA) reports.

  • Capability to develop effective business continuity strategies.

  • Expertise in applying Disk-to-Disk-to-Disaster Recovery (3DR) concepts and implementing various infrastructure technologies for data recovery.

  • Competence in leveraging virtualization for disaster recovery and implementing various virtualization techniques.

  • Ability to create backups of virtual machines running on platforms like VMware and Hyper-V.

  • Proficiency in implementing system recovery across diverse operating systems (Windows, Linux, Mac).

  • Demonstrated ability to recover various servers running on different operating systems.

  • Understanding and application of centralized and decentralized computing architectures for recovery.

  • Knowledge and implementation of PASIS architecture.

  • Ability to execute key disaster recovery documentation activities.

  • Competence in planning and executing disaster recovery testing, including various BCP testing methods.

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module Title 9

Module Title 10

Module Title 11