CERTIFIED DISASTER RECOVERY ENGINEER KEY DATA COURSE OVERVIEW ACCREDITATION Course Title: C)DRE Duration: 4 days CPE Credits: 32 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should Attend: DR Engineers BC Practitioners IS Managers Prerequisites: A minimum of 12 months experience in risk, security, or facilities management Sound knowledge of business assessment and writing skills Provided Materials: Student Workbook Student Lab Guide Software/Tools (DVDs) Certification Exam: C)DRE: Certified Disaster Recovery Engineer Certification Track: C)DRE: Certified Disaster Recovery Engineer When a business faces unexpected adverse conditions, such as cyber crime or damages from a storm, how will it respond? How long will the business not be able to operate? How much will it cost? The Certified Disaster Recovery Engineer certification course will prepare individuals to help their business handle the unexpected, while continuing to serve its customers. Students will be trained in the best practices of Business Continuity Planning ( BCP ) by instructors, with real-world experience. From Business Impact Analysis ( BIA ), Risk Analysis, Solution Design, IT Recovery and Implementation training students will have a great start on a BCP for their business and the knowledge of how to execute and finish that plan when they leave the course. This course is up to date with the best industry standards. UPON COMPLETION Students will: Have Foundational Knowledge of Business Continuity Planning Have a start on their Business Continuity/ Disaster Recovery plan for their business. (With mentored oversight from the instructor.) Be ready to sit for the C)DRE Exam. ABOUT THE AUTHOR John Glover - CISSP, CISA, CISSO, CMC, I.T.C.P. Accreditor: The United States of America National Security Agency s Committee of National Security Systems Accreditation: For CNSS Standard CNSSI- 4016: National Information Assurance Training Standards for Risk Analysis Also available as: LIVE VIRTUAL TRAINING Attend live classes from anywhere in the world! Visit Mile2.com John has been a certified management consultant (CMC) since 1985 working with national and international consulting firms. From 1985 to 1992 John was a senior consultant with DMR Group Ltd. executing assignments across North America. Most of these assignments were related to the design and development of telecommunications networks and delivery services. In 1992 John left DMR for a two-year assignment in Manila, Philippines on a Canadian International Development Agency (CIDA) and World Bank Telecommunications deployment project for the Philippine government. Upon his return to Canada in 1995 John specialized in the design, development and implementation of voice and data networks to support enterprise-wide business systems in the public and private sectors of British Columbia.
Page No. 2 Recent projects have included migration from legacy systems to client/server environments, major retrofitting of corporate telecommunications and systems infrastructures and deployment of corporate information security systems for a BC Insurance provider. Since 1999, John has provided Lead Instructor learning services to a variety of organizations and government departments. To date, from 1999 through 2013 John has been delivered over 250 Common Body of Knowledge (CBK) review seminars throughout North America (including Mexico), Australia, Asia and Europe. These seminar sessions, of between 5 8 days duration, provided guidance and mentoring support for an average of 15-20 candidates in support of their certification process. EXAM INFORMATION The Certified Disaster Recovery Engineer exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is accessible on your mile2.com account. The exam will take roughly 2 hours and consist of 100 multiple choice questions. The cost is $300 USD and must be purchased from the store on Mile2.com. COURSE OUTLINE Module 1: Introduction Module 2: Business Impact Analysis Module 3: Threat & Risk Analysis Module 4: BDP Strategies Module 5: IT Recovery Strategies Module 6: Implementation Phase Module 7: Testing and Exercise Module 8: Maintenance and Updating Module 9: Execution Phase Module 10: Module 11: Pandemics Review & Exam
Page No. 3 DETAILED MODULE DESCRIPTION Module 1 - Welcome to Disaster Recovery mile2 Class Training - Overview mile2 Course Road Map mile2 Brochure CDRE Agenda Schedule The CDRE Exam Introductions Introduction to Business Continuity Planning What is a Disaster? What is a Critical Business Function? Business Continuity Planning (BCP) Importance of BCP Disaster Recovery Planning (DRP) Emergency Response BC/DR Trends Purpose of BC/DR Program BCP Overview Challenges to Effective BCP Where does Project Initiation fit into the Process? Project Initiation Phase BC/DR Program Life Cycle Module 2 Business Impact Analysis What is a BIA? BIA Scope, Goal, and Objectives BIA Terminology Maximum Tolerable Downtime Recovery Point Objective Recovery Time Objective Recovery Time Examples BIA Process BIA Process- Disaster Mode Staffing BIA Process - Capacity & Performance Objectives BIA Tools Kick off Meeting Preparing for the BIA Interviews Conducting the Interviews Notes on Data Collection Identify Dependencies Finalize Data Analysis BIA Report Presentation to Senior Management Module 3 - Risk Analysis Where does the Risk Analysis fit into the Process? Functional Requirements Threats to Business Process Causes of Unplanned Downtime Risk Examples Risk Analysis Terminology Risk Analysis Activities Exposure Inventory Business Process Inventory Business Process Documentation Statement of Risk ALE Annualized Loss Expectancy Statement of Risk Risk Control Definition Identifying Existing Controls Physical Controls Risk Analysis Risk Assessment Report Compiling a Risk Assessment Report Risk Analysis Module 4 - & Development Phase Where does BCP Strategies fit into the Process? Strategy Process BCP Strategies Design & Development Phase Emergency Response & Operations Emergency Response Components Develop ER Procedures ER Sources for Assistance Alternate Recovery Site Selecting Vendors for DR/BC Services Site Recovery & Resumption Restoration of Primary Site Return to Primary Site Continuity Strategy - Insurance Evaluate Insurance Terms
Page No. 4 Module 5 - IT Recovery Strategies Where does IT Strategy fit into the Process? IT Recovery Strategy Process IT Recovery Strategies Examples of IT Recovery Tape Vault Facilities Disk Backups Replicated Disk Backups Deduplicated & Replicated Backups Backups Replicated & Deduplicated Data Archiving Systems Replication Application Redundancy Telecommunications Strategies Alternate Recovery Sites Internal or Vendor BC/DR Services Selecting Vendors for BC/DR Services Evaluating Vendors of DR/BC Resources Critical Factors IT Recovery Strategies Assessment IT Recovery Strategies DR Plan Development DRP Design DR Plan Development Module 6 - Implementation Phase Where does Implementation fit into the Process? Implementation of BCP Responsibility for BCP Implementation Determine Cost Estimates Management Approval and Funding Install & Configure Detailed Documentation Implement Operational Changes Procure Facilities & Services Awareness & Training Awareness Programs Training Programs Module 7 - Testing and Exercise Where does Testing and Drills fit into the Process? Testing & Exercise Phase Testing & Drills Progression of Testing Types Testing Participants Test Script Example Testing Post-Mortem Module 8 - Maintenance and Updating Where does Maintenance fit into the Process? Maintenance Policies and Procedures Plan Maintenance Maintenance & Schedule Budgets Software Tools for Maintenance Input Criteria for Plan Maintenance Plan Distribution & Security Module 9 - Execution Phase Where does the Execution Phase fit into the Process? Execution Phase Escalation Procedures Disaster Declaration Procedures Public Relations/Spokesperson Role Typical Audiences Audience Messages Sources of Information Incident Command Centre (ICC) ICC Chain of Command ICC Organization Be Prepared to Work with Public Authorities Executing the Plan Module 10 - Computer Crime & Cyber Attack Scenarios Northeast Cyber Attack Scenario Economic Impact of Malicious Code Attacks
Page No. 5 Including in Definitions of Terrorism Domestic and International Terrorism Department of Homeland Security Key Assets Cyberspace Security Strategies Expectations of Information Warfare Considerations for Developing Information Warfare Protection Against Evolving Privacy Laws How Computer Systems are Attacked Types of Computer Attacks Developing Procedure in the wake of a Security Breach Developing Procedures for Working with Law Enforcement Developing Procedures to Determine Economic Losses Developing Procedures to Ease IT Recovery Types of Systems and Networks Recovery of Small Computer Systems Recovery of Large Computer Systems Network Recovery Establishing a Computer Incident Response Team Module 11 Pandemics What is Pandemic Influenza? Pandemics Quick Facts Why use BCP/DRP for Pandemic Influenza? Planning Approach Critical Services Additional Impacts of Pandemic Areas to Plan for Pandemics Planning Issues per Stage Stage 4 Communications HR Policies Stage 3 HR Travel Policies Stage 3 Government Relations Stage 3 Physical Resources Stage 3 & 4 Physical Resources Stage 4 Physical Resources Pandemics Work from Home Contact: Progreso Training Pte Ltd Tel: +65 6509 9600 Fax: +65 6509 9667 Email: enquiry@progreso.com.sg Website: www.progreso.com.sg/training