EC-Council Disaster Recovery Professional EDRP

canvas eccouncil2canvas disastercanvas recoverycanvas professional

edrp-banners

Computek is one of the largest and first Ec-council learning solution in egypt with 20 years of experience delivering training and certifications in all technologies.All Ec-Council Training in computek is held by Ec-Council Certified Instructors with over than 10 years experience in the technical and training field .

edrp-text

The EDRP certification validates the candidate’s ability to plan, organize, and direct
the testing of disaster response, recovery support, and business resumption procedures.

IT-Disaster--Recovery-Course

Disaster-Recovery-ProfessionalThe EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in it disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster.
This IT disaster recovery course EDRP takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.

 edrp-Course-Description

courece-description-edrp-image This course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.

 ceh-Who-Should-Attendchfi-course-outline-img2


Network server administrators, firewall administrators, systems administrators, application developers, and IT security officers.

Duration: 5 days (9:00 – 5:00)

 

ceh-certificationchfi-course-outline-img3

The EC-Council Disaster Recovery Professional certification exam 312-76 will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the EDRP certification.

 

course222outline333

 
Introduction to Disaster Recovery and Business Continuity

Introduction to Disaster Recovery and Business Continuity

 

 

protocal-analysisDisaster Recovery & Business Continuity: Terminologies

Disaster Types

Consequences of Disaster

Disaster Recovery & Business Continuity

Principles of Disaster Recovery and Business Continuity

Disaster Recovery & Business Continuity: Issues Addressed

Activities of Disaster Recovery & Business Continuity

Disaster Recovery and Business Continuity Program

Disaster Recovery & Business Continuity Solutions

Best Practices in Disaster Recovery & Business Continuity Program

International Strategy for Disaster Reduction (ISDR)

International Day for Disaster Reduction

Nature and Causes of Disasters

Nature-and-Causes-of Disasters

log-analysis22Nature of Disasters

Categorization of Disasters

Natural Disasters

Earthquakes

Protecting Yourself During Earthquake

Earthquakes: Volcanoes

Protection from Volcanoes

Forecasting Volcanoes

Estimating Earthquakes

Earthquakes: Tsunami

Protecting Yourself During Tsunami

Landslides

Effects of Landslides

Protecting Yourself from Landslides

Hurricanes

Safety Measures During Hurricanes

Predicting Hurricanes

Floods

Effect of floods

Prevention Measures

Wildfires

Safety Measures

Drought

Consequences of Drought

Measures to Overcome Drought Effects

Man-Made Disasters

Accidents

Power Outage

Telecommunication Outage

Categorization of Human Intentional Disasters

Arson

Civil Disorder

Terrorism

War

Chemical Biological Radiological Nuclear (CBRN)

back to top

Emergency Management

Emergency-Management-text

security-standardsEmergency

Emergency Management

Need for Emergency Management

Emergency Management Phases

Mitigation

Preparedness

Response

Recovery

Effect of Disaster on Business Organizations

Emergency Management for Business Organizations

FEMA- Federal Emergency Management Agency

FEMA as an Organization

Activities of FEMA

Laws and Acts

Laws-and-Acts-text

law-and-computerApplicable Acts in DR

Laws and Acts in United States of America

Industries: Sarbanes-Oxley Act

Foreign Corrupt Practices Act (FCPA)

Healthcare: HIPAA Regulations

Financial Institutions: Gramm-Leach-Bliley Act

Flood Disaster Protection Act of 1973

Robert T. Stafford Disaster Relief and Emergency Assistance Act

CAN-SPAM Act of 2003

Federal Financial Institutions Examinations Council (FFIEC)

Personal Information Protection and Electronic Documents Act (PIPEDA)

Laws and Acts of Europe

Data Protection Act 1998

Transmission of Personal Data: Directive 2002/58/EC

Personal Data: Directive 95/46/EC

Insurance: Financial Groups Directive (FGD)

The Foundation of Personal Data Security Law: OECD Principles

Dutch Personal Data Protection Act

Austrian Federal Act concerning the Protection of Personal Data

German Federal Data Protection Act

Laws and Acts in Australia

Health Records and Information Privacy Act (HRIP)

Financial Transactions Reporting (FTR) Act 1988

Business Continuity Management

Business-Continuity-Management-text

team-eccouncil-8Business Continuity Management

Business Continuity Planning

Objectives of Business Continuity Planning

Essential Resources in Business Continuity Planning

Business Continuity Management Planning Steps

ISO (International Organization for Standardization)

Overview of BS 7799 / ISO 17799

ISO/IEC 17799:2005

ISO/IEC 17799:2005: Business Continuity Management

Risk Analysis

Risk Assessment

Basic Elements of Risk Assessment

Business Impact Analysis (BIA)

Components of Business Impact Analysis

Threat Analysis

Risk Analysis and Business Impact Analysis

Crisis Management

Steps in Crisis Management

Crisis Management Phases

Compliance

Preparedness

Training and Resource Development

Contingency Planning

Points to remember in BCM Plan Testing

Birmingham City Council’s BCM Assessment Template

Greenwich Council – Emergency and BCM Plan

Disaster Recovery Planning Process

Disaster-Recovery-Planning-Process-text

penetration-testing-iconDisaster Recovery Planning Process

Management Support

Organizing DR Team

Components of Disaster Recovery Team

Disaster Recovery Planning Team

Building a Planning Team

Establishing Team at the Departmental Level

Risk Assessment

Risk Assessment

Conduct Business Impact Analysis

Critical Business Activities

Analysis Sheet

Example: Analysis Sheet for IT System

Roles and Responsibilities

Individual: Leader

Individual: Disaster Recovery Coordinator

Individual: IT Administrator

Individual: Network Manager

Individual: Disaster Recovery Manager

Individual: DR Team Member

Team: Administration Team

Team: Technical Team

Team: Damage Evaluation and Salvage Team

Team: Physical Security Team

Team: Communications Team

Responsibilities Common to all Disaster Recovery Teams

Developing Charts of Responsibilities

Facility Disaster Recovery Chart of Responsibilities

Department Disaster Recovery Chart of Responsibilities

Business Process Disaster Recovery Chart of Responsibilities

Developing Policies and Procedures

Assumptions for DR Planning

Need for Disaster Recovery Planning

Disaster Recovery Plan Development

Disaster Recovery & Management: Budgeting

Centralized Office of DR Planning: Budget

Safety and Health Procedures

Procedures for Internal and External Communications

Procedures for Containment and Property Protection

Procedures for Recovering and Resuming Operations

Assessing Insurance Requirements & Coverage Needs

Need for Insurance

Evaluating Insurance Policies

Testing and Training

DRP Testing and Rehearsal Process

DRP Testing: Advantages

DRP Testing: Methods

DRP Testing Steps

DRP Testing Flow Chart

Training DR Teams

Commence Training Program for Disaster Recovery

Training for Executives

Training for Middle Managers

Training for Supervisors

Training for Disaster Response Teams

Training for Employees

Documentation of DR Procedures

Need for Documentation of Plans

Important Documentations in Disaster Recovery Process

Writing Disaster Recovery Plan

Best Practices for Documentation

Managing Records

DRP Maintenance

Monitoring Process

Monitoring Procedures

Evaluate Latest Technologies

Conducting Regular Reviews

Conducting Training Programs for Updated Plan

DRP Implementation

DR Plan Implementation

Internal and External Awareness Campaigns

back to top

Risk Management

Risk-Management-edrp-text

prize-icon2What is Risk

Introduction to Risk Management

Functions of Risk Management

Analytic Process of Risk Management

Risk Analysis

Risk Reduction Analysis

Management Decision

Risk Reduction Planning

Reviews and Audit

Project Risk Management

IT Security Risk Management

Risk Management Standards

Financial Risk Management

Basel II and Risk Management

Pillar I: Minimum Capital Requirement

Pillar II: Supervisory Review Process

Pillar III: Market Discipline

Quantitative Risk Management

Best Practices in Risk Management

Facility Protection

Facility-Protection-text

risk-assessmentFacility Protection

Water Supply

Protecting Water Supply

Fire

Types of Fire Extinguishers

APW Extinguishers

Dry Chemical Extinguisher

Carbon Dioxide Extinguishers

Points to Remember

Using a Fire Extinguisher

Fire Suppression for Companies

Fire exits

Power Supply

Common Power Supply Problems

Ensuring Steady Power Supply

Ventilation

Kinds of Ventilation

Measures for Proper Ventilation

Air Conditioners

Measures for Proper Working of Air Conditioners

Building and Premises

Checklist for Securing Facility

Data Recovery

Data-Recovery-edrp-text

hard-diskTypes of Data Recovery

Logical Data Recovery

Physical Data Recovery

Disk-to-Disk-to Disaster Recovery (3DR) Concept

Steps in Data Recovery

Recovery Management

Recovery Management Evaluation Metrics

Recovery Time Objective (RTO)

Role of RTO in Disaster recovery

Recovery Point Objective (RPO)

Network Recovery Objective (NRO)

Recovery Management Model Layers

Data Protection Continuum

Do’s and Don'ts

Lumigent's Log Explorer

Best Practices in Data Recovery

System Recovery

System-Recovery-edrp-text

network-scanningSystem Restore in Windows XP

Linux System Recovery

Linux System Crash Recovery

Crash Recovery Kit for Linux

Mac System Recovery

Restoring Windows Server 2003

Recovering from Boot problems in Windows Server 2003

Step 1: Start computer by using Last Known Good Configuration

Step 2: Starting computer in Safe Mode

Step 3: Use Event Viewer to Identify the Cause of the Startup Problem

Step 4: Use System Information to Identify the Cause of the Startup Problem

Step 5: The Safe Mode Boot Log File

Step 6: Use Device Manager to Identify the Cause of the Startup Problem

Step 7: Use System Configuration Utility

Microsoft Windows Recovery Console

Automated System Recovery

Windows 2000 Backup and Restore Utility

Methods for Restoring Replicated Data

Restoring Server Services

Active Directory Recovery: Non-Authoritative Restore

Active Directory Recovery: Authoritative Restore

Verifying Active Directory Restoration: Advanced Verification

Verifying Active Directory Restoration: Basic Verification

Active Directory Recovery on a Computer with a Different Hardware Configuration

Sysvol Recovery: Primary Restore

Sysvol Recovery: Non-authoritative Restore

Sysvol Recovery: Authoritative Restore

Recovery of Global Catalog Server

Recovery of  an Operations Master

Domain Controller Recovery: With a Working Domain Controller

Domain Controller Recovery: Without a Working Domain Controller

Database Integrity Testing

Rights Management Services Restoration

Rights Management Services Database Restoration

Tools for Active Directory Disaster Recovery: Recovery Manager

Restoring IIS Configurations: iisback.vbs

Restoring Microsoft IIS Metabase Backup

WANSync IIS

WANSync IIS: Working

Restoring Exchange Server 2003

Data Recovery Scenarios

Exchange Data Recovery Preparation

Single Mailbox Recovery

Single Item Recovery using Deleted Items Retention

Single Item Recovery using Third-party Brick Backup Programs

Full-Server Recovery: Preparation

Full-Server Recovery: Option 1

Full-Server Recovery: Option 2

Full-Server Recovery: Option 3

Full-Server Recovery: Option 4

Exchange Server Backup/Recovery Solution: SonaSafe

Recovering Blackberry Enterprise Server

IBM WebSphere Application Server Recovery

Recovering Coldfusion Application Server: CFMAIL Bug

Recovering Coldfusion Application Server: Variable Deadlocks

Recovering Coldfusion Application Server: ODBC Errors

Recovering Coldfusion Application Server:500 IIS Internal Server Error

Recovering Coldfusion Application Server: System Registry Access Problem

Recovering from Domino Server Crashes

Tool: SteelEye LifeKeeper

Restoring MySQL Server

Restoring MS SQL Server: Option 1

Restoring MS SQL Server: Option 2

Restoring MS SQL Server: Option 3

Restoring MS SQL Server: Option 4

Restoring MS SQL Server: Option 5

Restoring MS SQL Server: Option 6

Restoring MS SQL Server: Option 7

Restoring MS SQL Server: Option 8

Restoring My SQL Server

Recovering Cisco IOS

back to top

Backup and Recovery

Backup-and-Recovery-text

viruses-worms2Backup

Need for Backup

Types of Backup:

Full Backup

Incremental Backup

Differential Backup

Hot Backup

Hot Backup Sample Code

Cold Backup

Cold Backup Sample Code

Backup Sites

Hot Site/ Cold Site

Redundant Array of Inexpensive Disks (RAID)

RAID: Some Important Levels

Wide Area File Services (WAFS)

Backup for UNIX

Bare Metal Recovery for LINUX

Bucky Backup for Mac OS X

System Backup Administrator

NanoCopy Technology

Backup4all

Backup4all Features

ABC Backup Software

Genie Backup Manager

NTI BackupNow

High Availability Disaster Recovery (HADR)

Best Practices in Backup & Recovery

Windows Data Recovery Tools

Windows-Data-Recovery-Tools-text

online-instructorDigital Photo Recovery

Active@ UNERASER

Test Disk

PhotoRec

BadCopy Pro

Directory Snoop

Data Advisor

Fast File Undelete

File Scavenger

GetDataBack

Kernel Recovery for FAT+NTFS

R-Mail

R-Studio

Recover4all

Recover It All

Recover My Files Data Recovery

Quick Recovery for Windows

Restorer2000

File Recovery

EasyRecovery DataRecovery

EasyRecovery Professional

RecoverSoft Media Tools Professional

RecoverSoft Data Rescue PC

ADRC Data Recovery Software Tool

SalvageRecovery for Windows

Disk Doctors Email Recovery

Winternals Recovery Manager

Centralized Decentralized System Recovery

Centralized-Decentralized System Recovery

investigating-webDistributed Computing

Objectives of Distributed Computing

Architecture for Distributed Computing

Working of Distributed Computing

Centralized Backup

Centralized Backup Using SAN or NAS Server

Data Consolidation

Cross-Platform Data Consolidation

Mainframe as Centralized Storage Source

Tiers of Disaster Recovery

GDPS/PPRC

GDPS/PPRC Configuration

GDPS/PPRC Single-site Workload Configuration

GDPS/PPRC Multi-site Workload Configuration

Best Practices in Centralized and Decentralized System Recovery

Incident Response

Incident-Response-edrp-text

first-responder-proceduresIncident

Category of Incidents

Low Level

Mid Level

High Level

How to Identify an Incident?

How to Prevent an Incident?

Relationship between Incident Response, Incident Handling, and Incident Management

Incident Management Plan

Incident Handling

Information Security Life Cycle

Incident Response

Incident Response Policy

Risk Analysis

Risk Analysis and Incident Response

Incident Response Methodology

Preparation

Identification

Containment

Eradication

Recovery

Follow up

CERT (Computer Emergency Response Team)

CSIRT (Computer Security Incident Response Team)

General Categories of CSIRTs

Members of CSIRT Team

Building an Effective CSIRT

FIRST (Forum of Incident Response and Security Teams)

Request Tracker for Incident Response

Helix – Incident Response & Computer Forensics Live CD

Incident Response Tools Present in Helix CD

THE FARMER'S BOOT CD

Resources

Linux Mac Novell Netwark Data Recovery Tools

Linux-Mac-Novell-Netware Data Recovery Tools

systemKernel Recovery for Linux

Kernel Recovery for ReiserFS

Kernel Recovery for JFS

Kernel Recovery for Macintosh

Kernel Recovery for Novell-Netware

Stellar Phoenix Linux

R-Linux

Quick Recovery for Linux

Quick Recovery for Macintosh

SalvageRecovery for Linux

SalvageRecovery for Mac

SalvageRecovery for Netware

Disk Doctors Linux Data Recovery Software

DiskInternals Linux Reader

Role of Public Services in Disaster

Role of Public Services in Disaster-edrp-text

Managing-IT-PMPublic Services

State and Local Governments

Public Utilities and Departments

Hospitals

Blood Banks

Medical Laboratories

Food Banks

Fire Fighting Service

Waste/ Debris Management

Police

Armed Forces

Public Transportation

Water Supply System

Electricity Department

Information & Public Relations Department

IT Service Providers

Organizations Providing Services During Disasters

Organizations-Providing-Services During Disasters

first-responder-procedures

Organizations Providing Services during Disasters

Relief Organizations

International Committee of the Red Cross (ICRC)

International Federation of Red Cross and Red Crescent Societies (IFRC)

United Nations Children's Fund (UNICEF)

National Emergency Response Team (NERT)

CARE

Ananda Marga Universal Relief Team (AMURT)

Action Against Hunger (AAH)

Emergency Nutrition Network (ENN)

Doctors Without Borders

Hunger Plus, Inc.

InterAction

International Rescue Committee (IRC)

Mennonite Central Committee (MCC)

Mercy Corps (MC)

Refugees International

Relief International

Save the Children

Project HOPE

Organizations Providing Disaster Recovery Solutions

Organizations-Providing-Disaster-Recovery-Solutions

deleted-filesOrganizations Providing Disaster Recovery Solutions

Symantec

System Sizing

System Sizing: Practices

Disk-based Backup

Manual System Recovery

Disadvantages

Automated System Recovery

IBM

Human Capital Resilience

Human Capital Risks in Crisis Situations

Business Resilience

Elements of Business Resilience

Framework for Business Resilience

Causes of E-Mail Outages

E-Mail Continuity

DELL

Oracle Data Guard Utility

RMAN Utility for Database Backup

NAS (Network Attached Storage)

Sun Microsystems

Integrated Solutions of Sun and Vignette

Sun Cluster Geographic Edition

Infosys Business Continuity Planning Solution

Infosys BCP solution

Sybase Business Continuity Planning Solution

Sybase Model

HP Business Continuity and Availability solutions

HP 3-tiered Service Levels Balance Investment with Risk

PricewaterhouseCoopers Fast Track BCP

AT&T's Business Continuity and Disaster Recovery

Case Studies

Case-Studies-edrp-text

lpt-course12Business Continuity for Critical Applications

Jones Walker: Weathering the Storm

Let’s be prepared: An educational project about disasters in Cuba

From rehabilitation to safety: Gujarat school safety initiative, India

Disaster-resistant schools: A tool for universal primary education

Disaster Recovery Situation Assessment

Disaster Recovery Planning

Business Continuity Planning and Business Impact Analysis

Local risk management in earthquake zones of Kazakhstan

Disaster Recovery Case Study: Max Re

Disaster Recovery Case Study: GSD&M

Storage Assessment Services

Backup and Recovery Plan and Design

Storage Infrastructure Design and Implementation

Continuous Data Protection and Disaster Recovery

Disaster Recovery Testing

Disaster Recovery Strategy Assessment and Validation

Case Study: Improving Disaster Recovery Without Breaking the Bank

 
become an ethical hackerbecoma a forensic Investigator
become a secure computer userbecome an Enryption Specialist
become a network security administratorBecome a Network Defense Architect
 
  •                        ec-council-logo-reflection
need best quotation for a training course in egypt call

sat-guaranteed

We are committed to providing our customers with the best service and products available.

100% satisfaction guarantee

why students prefer computek as the best training center in egypt new

1.Computek Training Center has trained over 1,000,000 trainees in Egypt and over 100,000 trainees in Middle East and africa.

2.Our programs are designed to meet our clients' training necessities including budget and time limitation.

3.We will cooperate with you to bring out effective programs fitting your organization.

4.Computek Training Center provides customer-focus training in mutable deliverymethods offering top quality training and high qualified instructor to meet individual learning styles and organization profession training.

5.Computek instructors are selected from the best of training professional instructors in Egypt who awarded the trust worthy certified international companies, Computek instructors not only provide superior education but also reliable work experience in the field of giving courses

6.Trainees prefer Computek Training Center not only due to our high quality training but also for our reasonable and cost-effective price list.

7.Computek Classroom is designed with cutting edge facilities strong from hardware and software technologies to the most sophisticated educational aids.

8.The information desk with our friendly and professional customers support representative is highly qualified to answer any questions and also deliver your unique requirements.

9.Computek Training Center staff is available 7 days in week from 10:00 AM to 10:00 PM to deal with any inquiries and assist student with anything they need.

10.Computek Training Center is partner of world's technology leads such as Microsoft, Cisco, Compatia, EC Council ,Adobe , Autodesk, prometric and Pearson VUE.

All Rights Reseved © Computekeg.com