Business Continuity and Disaster Recovery Planning 1 Day

Plans must also be in place to preserve and continue business in the wake of a disaster or disruption of service. This course emphasizes two types of planning: business continuity planning and disaster recovery planning.

An organization depends on resources, personnel, and tasks performed on a daily basis to stay healthy, happy, and profitable. Most organizations have tangible resources, intellectual property, employees, computers, communication links, facilities, and facility services. If any one of these is damaged or inaccessible for one reason or another, the company can be crippled.

The longer these resources are unusable, the longer it will probably take for an organization to get back on its feet. Some companies are never able to recover after certain disasters. However, the companies that thought ahead, planned for the possible disasters, and did not put all of their eggs in one basket have had a better chance of resuming business and staying in the marketplace.


1. Anyone who is required to develop a broad and deep knowledge and understanding of Business Continuity and Disaster Recovery Planning.
2. IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers.
3. Security professionals whose positions require CISSP certification.
1. The course helps learners to understand business continuity management process and standards and best practices that must be deployed in order to implement disaster and continuity solutions.
2. In addition, the course provides learners all the necessary tools, technologies and activities to enhance a practical understanding of Business Continuity and Disaster Recovery Planning.
3. Reinforcing key areas of the (ISC)2® CBK® through practice questions and review sessions Strategically focus your preparation for CISSP Certification.
Subsequently effective combating of cyber-crime will ensure internet security for government departments, public utilities, transport operators, communications service providers and financial institutions amid a surge of cyber-attacks.