Disaster Recovery and Business Continuity

  • View Course Outline
  • Subscribe to Newsletter
    Privacy by SafeUnsubscribe
  • Get course brochure
    Privacy by SafeUnsubscribe

Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity training will help you put your organization in the best situation to handle whatever challenges come its way.

IT Disaster Recovery is the ability of a company to respond to a disaster or an interruption in services by implementing a disaster recovery plan to stabilize and restore the organization’s critical functions.

Disaster Recovery and Business Continuity Training helps you understand a variety of topics in disaster recovery and business continuity such as: introduction to disaster recovery, concept of disasters, introduction to business continuity, disaster recovery processing plans, risk management techniques, facility protection during disaster recovery period, data/system recovery, incident response and public service effect in disaster recovery plan.

Our training provides a detailed analysis of the most important concepts to grasp.

IT disaster recovery entails data recovery, disaster recovery process, business continuity, and contingency planning. It also focuses on the concept of Business Continuity planning that helps to provide security and resilience to the organization.

Employees need to know the plan effectively well before any disaster hits. Not only does an effective plan need to be put in place, but it also needs to be tested and analyzed with the critical players concerned before the actual emergency happens.

There needs to be a logical framework in place that promotes constant improvement via frequent action review.

It needs to be proactive with the goal of demanding high performance from the key players involved.

During disaster recovery, every moment is critical.

By taking the Strategic Axis disaster recovery and business continuity training, you will understand the central concept of disaster terminologies, nature of disasters, classification of disasters, natural and human-made disasters, and managing emergencies.

You might be interested in other IT Programs as a next step.

This training is relevant for obtaining CBCI: Business Continuity Institute’s Certification of the BCI

  • Request customized course
    Privacy by SafeUnsubscribe
  • Request call back
    There was an error fetching lists. Please refresh your lists and try again.
    Privacy by SafeUnsubscribe
  • Request corporate proposal
    There was an error fetching lists. Please refresh your lists and try again.
    Privacy by SafeUnsubscribe
  • View Schedule
  • COURSE TYPE Advanced
  • DURATION 5 days


By taking this disaster recovery and business continuity training, you will understand the central concept of disaster terminologies, the nature of disasters, the classification of disasters, natural and human-made disasters, and managing emergencies.

You will also learn about business continuity, business resumption plan, ISO organization, risk analysis effect on business continuity and resource development effect on business continuity.

Through the Strategic Axis disaster recovery and business continuity training course, our instructors will teach you the process of disaster recovery from defining rules, risk assessment, data verification, business impact analysis, awareness, testing and training of disaster recovery plan to the implementation of disaster recovery plans.

By the end of this seminar, you will master in the principles of risk modeling, risk analysis, estimation of risks, vulnerability analysis, and risk identification metrics.


Passing the Certificate of the Business Continuity Institute (CBCI) is the first step to proving your industry knowledge and joining the BCI’s global network of business continuity and resilience professionals.

The CBCI exam tests your knowledge of the Good Practice Guidelines (GPG) – the comprehensive guide to industry best practice for business continuity and resilience.

You can sit the CBCI Exam in the comfort of your own home or office – all you need is a webcam and a stable internet connection.



Module 1: Introduction to Disaster Recovery

  • Terminologies
  • Types of disasters
  • What will disasters do to the system?
  • Establishing a need for disaster recovery
  • Operational disruption and disasters
  • Disaster recovery definition
  • Principles of disaster recovery and business continuity
  • Activities regarding disaster recovery
  • Disaster recovery and business continuity program
  • Solutions to disaster recovery
  • Practices in disaster recovery and business continuity
  • International strategies for disaster reduction

Module 2: Defining Business Continuity Management

Business continuity vs. disaster recovery

Overview of ISO 22301

Obtaining the funding commitments

Agreeing on critical success factors

Planning for business continuity

Objectives of business continuity

Main resources

Planning steps for business continuity

Some crucial ISOs for business continuity

Risk analysis

Risk assessment

Business impact analysis

Threat analysis

Crisis management

Resource development

Module 3: Disaster Recovery Planning Process

  • Defining rules
  • Defining processes necessary for disaster recovery
  • Information processing for telecommunication resources
  • Establishing a planning group
  • Risk assessment
  • Performing risk assessment and audits
  • Establishing priorities for applications and networks
  • Developing the recovery strategies
  • Preparing inventory and documentation of the plan
  • Analysis sheet applications
  • Verification data development
  • Plan implementation
  • Classification of applications in disaster recovery process
  • Mission critical applications
  • Critical applications
  • Essential applications
  • Non-critical applications
  • Developing the business contingency planning policy
  • Risk assessment application
  • Business impact analysis application
  • Developing the business impact analysis
  • Developing business continuity and recovery strategies
  • Awareness, testing and training of disaster recovery plan
  • Testing flow charts
  • Testing methods
  • Commence training programs for disaster recovery
  • Maintenance of disaster recovery plan
  • Monitoring of disaster recovery plan
  • Implementation of disaster recovery plan
  • Disaster recovery life cycle

Module 4: Business Continuity Management

  • Business continuity Management (BCM) vs. disaster recovery
  • The importance of a BCMS
  • Overview of ISO 22301
  • Determining organizational risk appetite
  • Defining the operational environment
  • Determining the needs of interested parties
  • Identifying stakeholders
  • Analyzing stakeholder needs
  • Mapping stakeholder relationships
  • Identifying mission-critical continuity needs
  • Setting priorities based on time horizons
  • Performing Business Impact Analysis (BIA)
  • Identifying threats
  • Assessing risks to the enterprise
  • Identifying business-critical activities
  • Prioritizing infrastructure requirements

Module 5: Risk Management in Disaster Recovery Plan

  • Characterizing risks
  • Defining and identifying the sources of risk
  • Choosing a risk assessment method
  • Communicating risks across the organization
  • Developing appropriate responses
  • Matching the response to the risk
  • Taking preventive action

Module 6: Incident Response

  • Creating the incident response plan
  • Defining roles and responsibilities
  • Responding to incident scenarios
  • Directing the incident response team
  • Setting up the command center
  • Planning and conducting communications
  • Connecting with emergency services
  • Team actions following an incident
  • Meeting varied user-recovery needs

Module 7: Testing, and Improving Business Continuity Provisions

  • Rehearsing business continuity arrangements
  • Testing plans with a step-by-step process
  • Developing test scenarios and using test results effectively
  • Considering the impact of testing on the organization
  • Maintaining and improving the BCM
  • Ensuring normal developments are accounted for
  • Leveraging test results to improve organizational practices
  • Managing organizational change

Module 8: Data Recovery

  • Difficulty with the Data
  • Differences of data sharing
  • Relevance of data
  • Data finding
  • Annual frequency of security incidents
  • Consequences of security incidents
  • Safeguards
  • Types of Data Recovery
  • Logical Data Recovery
  • Physical Data Recovery
  • Selecting the best data recovery plan
  • Disk-to-Disk-to Disaster Recovery (3DR) Concept
  • Steps in Data Recovery
  • Recovery Management
  • Recovery Management Evaluation Metrics
  • Recovery Time Objective (RTO)
  • Role of RTO in Disaster recovery
  • Recovery Point Objective (RPO)
  • Network Recovery Objective (NRO)
  • Recovery Management Model Layers
  • Data Protection Continuum
  • Best Practices in Data Recovery

Module 9: System Recovery and Backup

  • Assessing the necessity of backup
  • Different types of backup
  • Incremental backup
  • Differential backup
  • Hot backup
  • Cold backup
  • Bare metal recovery
  • Bucky backup
  • System administrator for backup
  • High availability disaster recovery (HADR)
  • Centralized and Decentralized system recovery

Module 10: Incident Response

  • Types of incidents
  • Viruses
  • Accidents
  • Hacker intrusion
  • Fire
  • Denial of Service
  • Theft property information
  • Incident response and business continuity planning
  • Business continuity recovery terms
  • Incident Management Team (IMT)
  • Incident Response Team (IRT)
  • Preparation for IRP
  • Identification of incident
  • Limiting incidents
  • Analysis and eradication of incidents
  • Incident recovery
  • Ex-Post response
  • Incident detection technologies
  • Logs to collect and monitor incidents
  • IT detect incidents
  • Employee’s response
  • Chain of Custody law
  • Containment
  • Incident handling response
  • Incident management metrics

Module 11: Designing Contingency Arrangement

Establishing a standby site

Site choices: configuration and acquisition

Choosing suppliers: in-house vs. third-party

Specifying equipment

Selecting backup and restore strategies

Matching strategy to operational constraints

Meeting the organization’s storage requirements for vital records

Restoring communications and recovering users

Determining vital users with the BIA

Rerouting voice, mail, goods delivery

Eliminating single points of failure

Connecting end users

Meeting varied user-recovery needs

  • In The Classroom

  • Live, Online

  • Private Team Training

  • Indiviual Private Session

Please Register for More Information

Enroll Now
Privacy by SafeUnsubscribe