This course is a premium course it can be accessed either by individual purchase or through a premium subscription
Policies and defined procedures surrounding back-up processes, incident management, disaster recovery and business continuity drastically reduce the risk associated with ransomware, system outages and natural disasters. A comprehensive disaster recovery plan is vital to ensuring the ongoing ability to conduct business in the event of a disruption. Such plans provide detailed procedures to recover disrupted systems and help return organizations to business as normal. The primary purpose of disaster recovery and business continuity plans is to minimize negative impacts operationally and financially.
This course takes you through the steps required to put together Incident Response, Disaster Recovery and Business Continuity plans. We delve into the most important recovery planning considerations and review several questionnaires and templates to help get you started. Additionally, we delve into understanding the processes of monitoring, documentation, and escalation. Lastly, we discuss methodologies for successful implementation and training requirements.
Course Key Concepts: Ransomware, back-up, incident response, disaster recovery, business continuity, IR, DR, BCP, BCM.
Learning Objectives
- Discover and define incident response, disaster recovery and business continuity.
- Identify critical components of incident response, disaster recovery and business continuity plans.
- Identify process controls to consider when developing incident response, disaster recovery and business continuity plans.
- Discover strategies for implementing, testing and maintaining the plans.
- Explore solutions available to assist with writing and maintaining the plans.
Included In Certifications
This course is included in the following Certification Programs:
10 CoursesInformation Technology Auditor Certification
- Understanding Information Technology Governance and the Application of NIST
- Performing a Security Risk Assessment
- Auditing Data Security IT Computer Controls
- Auditing Third Party Service Providers and Cloud Environments
- Auditing Automated Business and Financial Transaction Processes
- Auditing Logical Security and Logical Access Controls
- Auditing Change Management
- Auditing the Network
- The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
- Information Technology Audit Summary
1 Review (5 ratings)
Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.