BC190: Successful Disaster Recovery within Hours NEW

Training: Business Continuity

True Cyber Resilience through Professional Disaster Recovery: This course demonstrates hands-on how enterprises can rapidly and securely restore their systems after an attack using automated deployments - within hours instead of weeks. Instead of forensically examining complete backups in a complex manner, participants focus on validated data backups and reproducible deployment stacks.

Unfortunately there are currently no available appointments.
Would you like to request an appointment? Then click on 'No matching appointment?'

Request prefered appointment period:

* All fields marked with an asterisk are mandatory fields.

Agenda:

  • Incident cases that demand attention
  • Recovery capabilities of full backups and snapshots
  • The deployment of deployment stacks and data backups
  • Components
    • Operating system
    • Software packages
    • Configurations
    • User accounts
    • Data backups
  • Deployment
    • Stack of a Windows office system
    • Stack of an Apple office system
    • Stack of a mail server
  • Recovery paths (network, USB devices, ...)
  • Service failover as immediate measure
  • Case studies
    • Site firewall
    • Mail server
  • Recovery validation through inventory
  • Multi-hour hands-on session for practical skills

Objectives:

Participants of the BC190 Successful Disaster Recovery within Hours will be enabled to evaluate recovery procedures and select and implement the appropriate procedure according to the company's business model.

Target audience:

  • IT Decision Makers
  • Technical BCM Managers
  • Administrators

Prerequisites:

Administrative Knowledge of Operating Systems and Networks

Description:

In the course BC190 Successful Disaster Recovery within Hours, participants learn step by step how to achieve rapid recovery from site firewalls through servers to office and mail systems. Instead of forensically examining complete backups in a time-consuming manner, participants focus on validated data backups and reproducible deployment stacks.

Through the implementation of automation workflows, configuration management and agile recovery frameworks, recovery times are drastically reduced. The course combines theory and realistic threat scenarios to deepen understanding of business continuity and resilience engineering – and demonstrates how IT teams not only respond to attacks, but emerge stronger from them.

Check Icon

Guaranteed implementation:

from 2 Attendees

Booking information:

Duration:

2 Days

Price:

1.450,00 € plus VAT.

For in-person attendance, lunch and beverages are included in the price.

Authorized training partner

NetApp Partner Authorized Learning
Commvault Training Partner
CQI | IRCA Approved Training Partner
Veeam Authorized Education Center
DEKRA Certification GmbH
AWS Partner Select Tier Training
ISACA Accredited Partner
iSAQB
CompTIA Authorized Partner
EC-Council Accredited Training Center

Memberships

Allianz für Cyber-Sicherheit
TeleTrust Pioneers in IT security
Bundesverband der IT-Sachverständigen und Gutachter e.V.
Bundesverband mittelständische Wirtschaft (BVMW)
Allianz für Sicherheit in der Wirtschaft
NIK - Netzwerk der Digitalwirtschaft
BVSW
Bayern Innovativ
KH-iT
CAST
IHK Nürnberg für Mittelfranken
eato e.V.
Sicherheitsnetzwerk München e.V.