Certified Disaster Recovery Professional
Equips professionals with essential business continuity and disaster recovery skills, including securing data through policies and restoring critical systems after a disaster.



This Course Is Ideal For
IT Professionals in the BC/DR or System Administration domain
Business Continuity and Disaster Recovery Consultants
Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery
IT Risk Managers and Consultants
CISOs and IT Directors
IT Professionals in the BC/DR or System Administration domain
Business Continuity and Disaster Recovery Consultants
Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery
IT Risk Managers and Consultants
CISOs and IT Directors
IT Professionals in the BC/DR or System Administration domain
Business Continuity and Disaster Recovery Consultants
Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery
IT Risk Managers and Consultants
CISOs and IT Directors
What to Expect In This Course
SKILL LEVEL
Intermediate
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English
Skill You Will Learn
Develop and implement comprehensive Business Continuity (BC) and Disaster Recovery (DR) plans for IT environments.
Conduct thorough risk assessments and business impact analyses (BIA) to identify critical assets and vulnerabilities.
Design and execute effective data protection strategies, including various backup types and cloud recovery solutions.
Implement virtualization-based and system recovery procedures for efficient restoration of operations.
Test, maintain, and continuously improve BC/DR plans through drills, training, and regular updates.
Ensure BC/DR initiatives comply with relevant industry standards and regulatory frameworks (e.g., ISO, NFPA, NICE).
Apply practical, hands-on skills gained through labs and case studies to real-world BC/DR scenarios.
Develop and implement comprehensive Business Continuity (BC) and Disaster Recovery (DR) plans for IT environments.
Conduct thorough risk assessments and business impact analyses (BIA) to identify critical assets and vulnerabilities.
Design and execute effective data protection strategies, including various backup types and cloud recovery solutions.
Implement virtualization-based and system recovery procedures for efficient restoration of operations.
Test, maintain, and continuously improve BC/DR plans through drills, training, and regular updates.
Ensure BC/DR initiatives comply with relevant industry standards and regulatory frameworks (e.g., ISO, NFPA, NICE).
Apply practical, hands-on skills gained through labs and case studies to real-world BC/DR scenarios.
Develop and implement comprehensive Business Continuity (BC) and Disaster Recovery (DR) plans for IT environments.
Conduct thorough risk assessments and business impact analyses (BIA) to identify critical assets and vulnerabilities.
Design and execute effective data protection strategies, including various backup types and cloud recovery solutions.
Implement virtualization-based and system recovery procedures for efficient restoration of operations.
Test, maintain, and continuously improve BC/DR plans through drills, training, and regular updates.
Ensure BC/DR initiatives comply with relevant industry standards and regulatory frameworks (e.g., ISO, NFPA, NICE).
Apply practical, hands-on skills gained through labs and case studies to real-world BC/DR scenarios.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Outcomes of the Course
By the end of this course, participants will be able to:
Ability to design a robust Business Continuity Management (BCM) framework.
Proficiency in creating comprehensive risk assessment reports.
Skill in generating detailed Business Impact Analysis (BIA) reports.
Capability to develop effective business continuity strategies.
Expertise in applying Disk-to-Disk-to-Disaster Recovery (3DR) concepts and implementing various infrastructure technologies for data recovery.
Competence in leveraging virtualization for disaster recovery and implementing various virtualization techniques.
Ability to create backups of virtual machines running on platforms like VMware and Hyper-V.
Proficiency in implementing system recovery across diverse operating systems (Windows, Linux, Mac).
Demonstrated ability to recover various servers running on different operating systems.
Understanding and application of centralized and decentralized computing architectures for recovery.
Knowledge and implementation of PASIS architecture.
Ability to execute key disaster recovery documentation activities.
Competence in planning and executing disaster recovery testing, including various BCP testing methods.
By the end of this course, participants will be able to:
Ability to design a robust Business Continuity Management (BCM) framework.
Proficiency in creating comprehensive risk assessment reports.
Skill in generating detailed Business Impact Analysis (BIA) reports.
Capability to develop effective business continuity strategies.
Expertise in applying Disk-to-Disk-to-Disaster Recovery (3DR) concepts and implementing various infrastructure technologies for data recovery.
Competence in leveraging virtualization for disaster recovery and implementing various virtualization techniques.
Ability to create backups of virtual machines running on platforms like VMware and Hyper-V.
Proficiency in implementing system recovery across diverse operating systems (Windows, Linux, Mac).
Demonstrated ability to recover various servers running on different operating systems.
Understanding and application of centralized and decentralized computing architectures for recovery.
Knowledge and implementation of PASIS architecture.
Ability to execute key disaster recovery documentation activities.
Competence in planning and executing disaster recovery testing, including various BCP testing methods.
By the end of this course, participants will be able to:
Ability to design a robust Business Continuity Management (BCM) framework.
Proficiency in creating comprehensive risk assessment reports.
Skill in generating detailed Business Impact Analysis (BIA) reports.
Capability to develop effective business continuity strategies.
Expertise in applying Disk-to-Disk-to-Disaster Recovery (3DR) concepts and implementing various infrastructure technologies for data recovery.
Competence in leveraging virtualization for disaster recovery and implementing various virtualization techniques.
Ability to create backups of virtual machines running on platforms like VMware and Hyper-V.
Proficiency in implementing system recovery across diverse operating systems (Windows, Linux, Mac).
Demonstrated ability to recover various servers running on different operating systems.
Understanding and application of centralized and decentralized computing architectures for recovery.
Knowledge and implementation of PASIS architecture.
Ability to execute key disaster recovery documentation activities.
Competence in planning and executing disaster recovery testing, including various BCP testing methods.
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module Title 9
Module Title 10
Module Title 11