Backup & Recovery: Business Continuity & Disaster Recovery
SRE
| Intermediate
- 15 videos | 1h 21m 45s
- Includes Assessment
- Earns a Badge
Disasters can occur at any time and to any sized organization, so administrators should invest the time and resources to properly plan for business continuity and disaster recovery. In this course, you'll learn how to plan for business continuity, assess risk, and perform business impact assessments. You'll also learn about system resilience, sensitive data types, and data classifications. Lastly, you'll see a comparison of Recovery Time Objective and Recovery Point Objective, and examine what to include when preparing a disaster recovery training plan.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe system resilience and fault toleranceRecognize what data to include in a backup, such as full operating system, personal files, and company dataIdentify and classify assets such as pii, phi, and proprietary dataProvide an overview of data classifications such as top secret, secret, confidential, and unclassifiedRecognize the financial impact of a large data breach or cyber incidentProvide an overview of performing a business impact assessmentRecognize different types of risks to consider
-
Describe elements of continuity planning such as strategy and processesDefine appropriate service levelsProvide an overview of data protection solutions that can be used to protect against security issues and reduce the risk of compromised dataProvide an overview of common roles and responsibilities of an administrator when it comes to data backups and recoveryProvide an overview of recovery time objective and recovery point objective and how they can relate to a timely recoveryDescribe elements to include when preparing a disaster recovery training planSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 27s
-
12m 35sIn this video, you'll learn more about the concepts of System Resilience and Fault tolerance. You'll also learn how to make your systems more reliable overall. You'll discover that when it comes to increasing your resilience, you need to try to identify any instances where there might be a single point of failure and address it. This is referred to as reducing or eliminating the single point of failure. FREE ACCESS
-
6m 42sDuring this video, you'll learn about the considerations you should make when performing backups of your data. You'll learn that both viruses and legitimate processes are capable of damaging data or your access to it afterwards. There are however appropriate measures you can take to minimise the damage or avoid this happening. This video recommends AppData (for systems running Windows), the Program Files directory, or to try reinstalling Windows itself. If you're using Microsoft Exchange Server in an Active Directory environment, then all messages are stored on the servers. These and other solutions are outlined in this video. FREE ACCESS
-
6m 7sIn this video, you'll learn more about the different classifications of data that you may be storing in your organization. You'll learn that when it comes to classified data, there are varying regulations in place as defined by some kind of governing body. This video will focus on the classifications themselves, such as: Personally Identifiable Information or PII and also, Protected Health Information, or PII. FREE ACCESS
-
5m 21sIn this video, you'll learn more about classification types. You'll learn that classification itself is a process by which data is assigned some kind of value. This determines how critical it is to an organization to ensure data is protected in terms of maintaining confidentiality and integrity. You'll learn that top secret is typically reserved for entities such as the government or the military. It might also be used within an organization for its own purposes. FREE ACCESS
-
5m 2sIn this video, you'll learn more about the impact or damage that can result from a Data Breach. You'll also learn about some basic measures that should be implemented in any organization to help protect against breaches or other security threats. You'll discover the most common target is Personally Identifiable Information or PII including full names and addresses, financial information such as credit cards, and identity information such as social security numbers. FREE ACCESS
-
8m 49sIn this video, you'll learn more about performing a Business Impact Assessment. This is the process of identifying the resources that are most critical to your organization. You'll also learn how to determine the likelihood of any given threat actually occurring. The results are used to prioritize the resources required for you to be able to continue providing services without disruption. FREE ACCESS
-
3m 41sDuring this video, you'll learn about the basic risk categories of Natural and Human-initiated and examine methods of dealing with each type. You'll discover that these categories include natural risks such as storms, floods, earthquakes, or hurricanes. Human-initiated risks include theft, vandalism, fraud, or terrorism. You'll also learn about unintentional human error and personnel strikes. FREE ACCESS
-
5m 6sIn this video, you'll learn about the considerations when formulating a business continuity plan. This refers to the ability to maintain your business operations during and after an event that could otherwise interrupt your ability. This begins with an understanding of what events would be capable of disrupting your operations. You'll learn how to perform a risk assessment so you have a clear picture of how any given risk event will affect your protected resources. Other consideratons include office space, data backups and various other approaches discussed in this video. FREE ACCESS
-
4m 53sIn this video, you'll learn more about defining acceptable levels of service, which typically takes the form of a service level agreement between a provider and a consumer. It involves ways to measure the actual level of performance being delivered and what kind of compensation or remuneration will be offered if the measured level doesn't match the agreed-upon level. This instills confidence in the provider and makes it easier for the provider to attract new customers. FREE ACCESS
-
8m 33sIn this video, you'll learn more about Data Protection Solutions to help protect your data against a variety of security threats and from losing it entirely. You'll learn how the primary consideration is ensuring you have backup and recovery guidelines in place that outline the goals and procedures of your backup strategy to meet the needs of your organization. You'll learn there are a variety of approaches when it comes to backup and recovery, and no single approach can be labeled as the best one. FREE ACCESS
-
3m 4sIn this video, you'll learn more about the roles and responsibilities that should be defined as part of any backup strategy. You'll learn this is something that should be done in smaller organizations. The first role begins with data itself and identifying the owner of that data. Common tasks will usually include maintaining the systems and software required to perform the backups, validating that the backup jobs succeeded, and testing those backups to ensure that the data can be recovered from them. And of course, actually performing the restores if and/or when necessary. FREE ACCESS
-
7m 27sIn this video, you'll learn more about the Recovery Time Objective and the Recovery Point Objective, which are values usually outlined in a service level agreement, but not always. Sometimes they're just used internally for the benefit of your own users. But they can help alleviate concerns when it comes to losses. The RTO value refers to time as its name indicates, and expresses an expected duration of downtime based on what is deemed to be tolerable. This and the RPO are explored in detail during the video. FREE ACCESS
-
1m 41sDuring this video, you'll learn more about providing training for the personnel who will be involved at all levels of disaster recovery. You'll learn that the nature of which will vary depending on the role. But understanding the process by which disaster recovery is implemented is something that should not be limited to just system administrators or data stewards. Everyone in the organization should have some level of understanding of the overall measures that are in place. FREE ACCESS
-
1m 16s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.