EC-Council Disaster Recovery Professional certification

  • Introduction to Disaster Recovery and Business Continuity

    • Disaster Recovery & Business Continuity: Terminologies
    • Disaster Types
    • Consequences of Disaster
    • Disaster Recovery & Business Continuity
    • Principles of Disaster Recovery and Business Continuity
    • Disaster Recovery & Business Continuity: Issues Addressed
    • Activities of Disaster Recovery & Business Continuity
    • Disaster Recovery and Business Continuity Program
    • Disaster Recovery & Business Continuity Solutions
    • Best Practices in Disaster Recovery & Business Continuity Program
    • International Strategy for Disaster Reduction (ISDR)
    • International Day for Disaster Reduction

  • Nature and Causes of Disasters

    • Nature of Disasters
    • Categorization of Disasters
    • Natural Disasters
    • Earthquakes
    • Protecting Yourself During Earthquake
    • Earthquakes: Volcanoes
    • Protection from Volcanoes
    • Forecasting Volcanoes
    • Estimating Earthquakes
    • Earthquakes: Tsunami
    • Protecting Yourself During Tsunami
    • Landslides
    • Effects of Landslides
    • Protecting Yourself from Landslides
    • Hurricanes
    • Safety Measures During Hurricanes
    • Predicting Hurricanes
    • Floods
    • Effect of floods
    • Prevention Measures
    • Wildfires
    • Safety Measures
    • Drought
    • Consequences of Drought
    • Measures to Overcome Drought Effects
    • Man-Made Disasters
    • Accidents
    • Power Outage
    • Telecommunication Outage
    • Categorization of Human Intentional Disasters
    • Arson
    • Civil Disorder
    • Terrorism
    • War
    • Chemical Biological Radiological Nuclear (CBRN)

  • Emergency Managemen

    • Emergency
    • Emergency Management
    • Need for Emergency Management
    • Emergency Management Phases
    • Mitigation
    • Preparedness
    • Response
    • Recovery
    • Effect of Disaster on Business Organizations
    • Emergency Management for Business Organizations
    • FEMA- Federal Emergency Management Agency
    • FEMA as an Organization
    • Activities of FEMA

  • Laws and Acts

    • Applicable Acts in DR
    • Laws and Acts in United States of America
    • Industries: Sarbanes-Oxley Act
    • Foreign Corrupt Practices Act (FCPA)
    • Healthcare: HIPAA Regulations
    • Financial Institutions: Gramm-Leach-Bliley Act
    • Flood Disaster Protection Act of 1973
    • Robert T. Stafford Disaster Relief and Emergency Assistance Act
    • CAN-SPAM Act of 2003
    • Federal Financial Institutions Examinations Council (FFIEC)
    • Personal Information Protection and Electronic Documents Act (PIPEDA)
    • Laws and Acts of Europe
    • Data Protection Act 1998
    • Transmission of Personal Data: Directive 2002/58/EC
    • Personal Data: Directive 95/46/EC
    • Insurance: Financial Groups Directive (FGD)
    • The Foundation of Personal Data Security Law: OECD Principles
    • Dutch Personal Data Protection Act
    • Austrian Federal Act concerning the Protection of Personal Data
    • German Federal Data Protection Act
    • Laws and Acts in Australia
    • Health Records and Information Privacy Act (HRIP)
    • Financial Transactions Reporting (FTR) Act 1988

  • Business Continuity Management

    • Business Continuity Management
    • Business Continuity Planning
    • Objectives of Business Continuity Planning
    • Essential Resources in Business Continuity Planning
    • Business Continuity Management Planning Steps
    • ISO (International Organization for Standardization)
    • Overview of BS 7799 / ISO 17799
    • ISO/IEC 17799:2005
    • ISO/IEC 17799:2005: Business Continuity Management
    • Risk Analysis
    • Risk Assessment
    • Basic Elements of Risk Assessment
    • Business Impact Analysis (BIA)
    • Components of Business Impact Analysis
    • Threat Analysis
    • Risk Analysis and Business Impact Analysis
    • Crisis Management
    • Steps in Crisis Management
    • Crisis Management Phases
    • Compliance
    • Preparedness
    • Training and Resource Development
    • Contingency Planning
    • Points to remember in BCM Plan Testing
    • Birmingham City Council’s BCM Assessment Template
    • Greenwich Council – Emergency and BCM Plan

  • Disaster Recovery Planning Process

    • Disaster Recovery Planning Process
    • Management Support
    • Organizing DR Team
    • Components of Disaster Recovery Team
    • Disaster Recovery Planning Team
    • Building a Planning Team
    • Establishing Team at the Departmental Level
    • Risk Assessment
    • Risk Assessment
    • Conduct Business Impact Analysis
    • Critical Business Activities
    • Analysis Sheet
    • Example: Analysis Sheet for IT System
    • Roles and Responsibilities
    • Individual: Leader
    • Individual: Disaster Recovery Coordinator
    • Individual: IT Administrator
    • Individual: Network Manager
    • Individual: Disaster Recovery Manager
    • Individual: DR Team Member
    • Team: Administration Team
    • Team: Technical Team
    • Team: Damage Evaluation and Salvage Team
    • Team: Physical Security Team
    • Team: Communications Team
    • Responsibilities Common to all Disaster Recovery Teams
    • Developing Charts of Responsibilities
    • Facility Disaster Recovery Chart of Responsibilities
    • Department Disaster Recovery Chart of Responsibilities
    • Business Process Disaster Recovery Chart of Responsibilities
    • Developing Policies and Procedures
    • Assumptions for DR Planning
    • Need for Disaster Recovery Planning
    • Disaster Recovery Plan Development
    • Disaster Recovery & Management: Budgeting
    • Centralized Office of DR Planning: Budget
    • Safety and Health Procedures
    • Procedures for Internal and External Communications
    • Procedures for Containment and Property Protection
    • Procedures for Recovering and Resuming Operations
    • Assessing Insurance Requirements & Coverage Needs
    • Need for Insurance
    • Evaluating Insurance Policies
    • Testing and Training
    • DRP Testing and Rehearsal Process
    • DRP Testing: Advantages
    • DRP Testing: Methods
    • DRP Testing Steps
    • DRP Testing Flow Chart
    • Training DR Teams
    • Commence Training Program for Disaster Recovery
    • Training for Executives
    • Training for Middle Managers
    • Training for Supervisors
    • Training for Disaster Response Teams
    • Training for Employees
    • Documentation of DR Procedures
    • Need for Documentation of Plans
    • Important Documentations in Disaster Recovery Process
    • Writing Disaster Recovery Plan
    • Best Practices for Documentation
    • Managing Records
    • DRP Maintenance
    • Monitoring Process
    • Monitoring Procedures
    • Evaluate Latest Technologies
    • Conducting Regular Reviews
    • Conducting Training Programs for Updated Plan
    • DRP Implementation
    • DR Plan Implementation
    • Internal and External Awareness Campaigns

  • Risk Management

    • What is Risk
    • Introduction to Risk Management
    • Functions of Risk Management
    • Analytic Process of Risk Management
    • Risk Analysis
    • Risk Reduction Analysis
    • Management Decision
    • Risk Reduction Planning
    • Reviews and Audit
    • Project Risk Management
    • IT Security Risk Management
    • Risk Management Standards
    • Financial Risk Management
    • Basel II and Risk Management
    • Pillar I: Minimum Capital Requirement
    • Pillar II: Supervisory Review Process
    • Pillar III: Market Discipline
    • Quantitative Risk Management
    • Best Practices in Risk Management

  • Facility Protection

    • Facility Protection
    • Water Supply
    • Protecting Water Supply
    • Fire
    • Types of Fire Extinguishers
    • APW Extinguishers
    • Dry Chemical Extinguisher
    • Carbon Dioxide Extinguishers
    • Points to Remember
    • Using a Fire Extinguisher
    • Fire Suppression for Companies
    • Fire exits
    • Power Supply
    • Common Power Supply Problems
    • Ensuring Steady Power Supply
    • Ventilation
    • Kinds of Ventilation
    • Measures for Proper Ventilation
    • Air Conditioners
    • Measures for Proper Working of Air Conditioners
    • Building and Premises
    • Checklist for Securing Facility

  • Data Recovery

    • Types of Data Recovery
    • Logical Data Recovery
    • Physical Data Recovery
    • Disk-to-Disk-to Disaster Recovery (3DR) Concept
    • Steps in Data Recovery
    • Recovery Management
    • Recovery Management Evaluation Metrics
    • Recovery Time Objective (RTO)
    • Role of RTO in Disaster recovery
    • Recovery Point Objective (RPO)
    • Network Recovery Objective (NRO)
    • Recovery Management Model Layers
    • Data Protection Continuum
    • Do’s and Don'ts
    • Lumigent's Log Explorer
    • Best Practices in Data Recovery

  • System Recovery

    • System Restore in Windows XP
    • Linux System Recovery
    • Linux System Crash Recovery
    • Crash Recovery Kit for Linux
    • Mac System Recovery
    • Restoring Windows Server 2003
    • Recovering from Boot problems in Windows Server 2003
    • Step 1: Start computer by using Last Known Good Configuration
    • Step 2: Starting computer in Safe Mode
    • Step 3: Use Event Viewer to Identify the Cause of the Startup Problem
    • Step 4: Use System Information to Identify the Cause of the Startup Problem
    • Step 5: The Safe Mode Boot Log File
    • Step 6: Use Device Manager to Identify the Cause of the Startup Problem
    • Step 7: Use System Configuration Utility
    • Microsoft Windows Recovery Console
    • Automated System Recovery
    • Windows 2000 Backup and Restore Utility
    • Methods for Restoring Replicated Data
    • Restoring Server Services
    • Active Directory Recovery: Non-Authoritative Restore
    • Active Directory Recovery: Authoritative Restore
    • Verifying Active Directory Restoration: Advanced Verification
    • Verifying Active Directory Restoration: Basic Verification
    • Active Directory Recovery on a Computer with a Different Hardware Configuration
    • Sysvol Recovery: Primary Restore
    • Sysvol Recovery: Non-authoritative Restore
    • Sysvol Recovery: Authoritative Restore
    • Recovery of Global Catalog Server
    • Recovery of  an Operations Master
    • Domain Controller Recovery: With a Working Domain Controller
    • Domain Controller Recovery: Without a Working Domain Controller
    • Database Integrity Testing
    • Rights Management Services Restoration
    • Rights Management Services Database Restoration
    • Tools for Active Directory Disaster Recovery: Recovery Manager
    • Restoring IIS Configurations: iisback.vbs
    • Restoring Microsoft IIS Metabase Backup
    • WANSync IIS
    • WANSync IIS: Working
    • Restoring Exchange Server 2003
    • Data Recovery Scenarios
    • Exchange Data Recovery Preparation
    • Single Mailbox Recovery
    • Single Item Recovery using Deleted Items Retention
    • Single Item Recovery using Third-party Brick Backup Programs
    • Full-Server Recovery: Preparation
    • Full-Server Recovery: Option 1
    • Full-Server Recovery: Option 2
    • Full-Server Recovery: Option 3
    • Full-Server Recovery: Option 4
    • Exchange Server Backup/Recovery Solution: SonaSafe
    • Recovering Blackberry Enterprise Server
    • IBM WebSphere Application Server Recovery
    • Recovering Coldfusion Application Server: CFMAIL Bug
    • Recovering Coldfusion Application Server: Variable Deadlocks
    • Recovering Coldfusion Application Server: ODBC Errors
    • Recovering Coldfusion Application Server:500 IIS Internal Server Error
    • Recovering Coldfusion Application Server: System Registry Access Problem
    • Recovering from Domino Server Crashes
    • Tool: SteelEye LifeKeeper
    • Restoring MySQL Server
    • Restoring MS SQL Server: Option 1
    • Restoring MS SQL Server: Option 2
    • Restoring MS SQL Server: Option 3
    • Restoring MS SQL Server: Option 4
    • Restoring MS SQL Server: Option 5
    • Restoring MS SQL Server: Option 6
    • Restoring MS SQL Server: Option 7
    • Restoring MS SQL Server: Option 8
    • Restoring My SQL Server
    • Recovering Cisco IOS

  • Backup and Recovery

    • Backup
    • Need for Backup
    • Types of Backup:
    • Full Backup
    • Incremental Backup
    • Differential Backup
    • Hot Backup
    • Hot Backup Sample Code
    • Cold Backup
    • Cold Backup Sample Code
    • Backup Sites
    • Hot Site/ Cold Site
    • Redundant Array of Inexpensive Disks (RAID)
    • RAID: Some Important Levels
    • Wide Area File Services (WAFS)
    • Backup for UNIX
    • Bare Metal Recovery for LINUX
    • Bucky Backup for Mac OS X
    • System Backup Administrator
    • NanoCopy Technology
    • Backup4all
    • Backup4all Features
    • ABC Backup Software
    • Genie Backup Manager
    • NTI BackupNow
    • High Availability Disaster Recovery (HADR)
    • Best Practices in Backup & Recovery

  • Centralized and Decentralized System Recovery

    • Distributed Computing
    • Objectives of Distributed Computing
    • Architecture for Distributed Computing
    • Working of Distributed Computing
    • Centralized Backup
    • Centralized Backup Using SAN or NAS Server
    • Data Consolidation
    • Cross-Platform Data Consolidation
    • Mainframe as Centralized Storage Source
    • Tiers of Disaster Recovery
    • GDPS/PPRC
    • GDPS/PPRC Configuration
    • GDPS/PPRC Single-site Workload Configuration
    • GDPS/PPRC Multi-site Workload Configuration
    • Best Practices in Centralized and Decentralized System Recovery

  • Windows Data Recovery Tools

    • Digital Photo Recovery
    • Active@ UNERASER
    • Test Disk
    • PhotoRec
    • BadCopy Pro
    • Directory Snoop
    • Data Advisor
    • Fast File Undelete
    • File Scavenger
    • GetDataBack
    • Kernel Recovery for FAT+NTFS
    • R-Mail
    • R-Studio
    • Recover4all
    • Recover It All
    • Recover My Files Data Recovery
    • Quick Recovery for Windows
    • Restorer2000
    • File Recovery
    • EasyRecovery DataRecovery
    • EasyRecovery Professional
    • RecoverSoft Media Tools Professional
    • RecoverSoft Data Rescue PC
    • ADRC Data Recovery Software Tool
    • SalvageRecovery for Windows
    • Disk Doctors Email Recovery
    • Winternals Recovery Manager

  • Recovery Tools

    • Kernel Recovery for Linux
    • Kernel Recovery for ReiserFS
    • Kernel Recovery for JFS
    • Kernel Recovery for Macintosh
    • Kernel Recovery for Novell-Netware
    • Stellar Phoenix Linux
    • R-Linux
    • Quick Recovery for Linux
    • Quick Recovery for Macintosh
    • SalvageRecovery for Linux
    • SalvageRecovery for Mac
    • SalvageRecovery for Netware
    • Disk Doctors Linux Data Recovery Software
    • DiskInternals Linux Reader

  • Incident Response

    • Incident
    • Category of Incidents
    • Low Level
    • Mid Level
    • High Level
    • How to Identify an Incident?
    • How to Prevent an Incident?
    • Relationship between Incident Response, Incident Handling, and Incident Management
    • Incident Management Plan
    • Incident Handling
    • Information Security Life Cycle
    • Incident Response
    • Incident Response Policy
    • Risk Analysis
    • Risk Analysis and Incident Response
    • Incident Response Methodology
    • Preparation
    • Identification
    • Containment
    • Eradication
    • Recovery
    • Follow up
    • CERT (Computer Emergency Response Team)
    • CSIRT (Computer Security Incident Response Team)
    • General Categories of CSIRTs
    • Members of CSIRT Team
    • Building an Effective CSIRT
    • FIRST (Forum of Incident Response and Security Teams)
    • Request Tracker for Incident Response
    • Helix – Incident Response & Computer Forensics Live CD
    • Incident Response Tools Present in Helix CD
    • THE FARMER'S BOOT CD
    • Resources

  • Role of Public Services in Disaster

    • Public Services
    • State and Local Governments
    • Public Utilities and Departments
    • Hospitals
    • Blood Banks
    • Medical Laboratories
    • Food Banks
    • Fire Fighting Service
    • Waste/ Debris Management
    • Police
    • Armed Forces
    • Public Transportation
    • Water Supply System
    • Electricity Department
    • Information & Public Relations Department
    • IT Service Providers

  • Organizations Providing Services during Disasters

    • Organizations Providing Services during Disasters
    • Relief Organizations
    • International Committee of the Red Cross (ICRC)
    • International Federation of Red Cross and Red Crescent Societies (IFRC)
    • United Nations Children's Fund (UNICEF)
    • National Emergency Response Team (NERT)
    • CARE
    • Ananda Marga Universal Relief Team (AMURT)
    • Action Against Hunger (AAH)
    • Emergency Nutrition Network (ENN)
    • Doctors Without Borders
    • Hunger Plus, Inc.
    • InterAction
    • International Rescue Committee (IRC)
    • Mennonite Central Committee (MCC)
    • Mercy Corps (MC)
    • Refugees International
    • Relief International
    • Save the Children
    • Project HOPE

  • Organizations Providing Disaster Recovery Solutions

    • Organizations Providing Disaster Recovery Solutions
    • Symantec
    • System Sizing
    • System Sizing: Practices
    • Disk-based Backup
    • Manual System Recovery
    • Disadvantages
    • Automated System Recovery
    • IBM
    • Human Capital Resilience
    • Human Capital Risks in Crisis Situations
    • Business Resilience
    • Elements of Business Resilience
    • Framework for Business Resilience
    • Causes of E-Mail Outages
    • E-Mail Continuity
    • DELL
    • Oracle Data Guard Utility
    • RMAN Utility for Database Backup
    • NAS (Network Attached Storage)
    • Sun Microsystems
    • Integrated Solutions of Sun and Vignette
    • Sun Cluster Geographic Edition
    • Infosys Business Continuity Planning Solution
    • Infosys BCP solution
    • Sybase Business Continuity Planning Solution
    • Sybase Model
    • HP Business Continuity and Availability solutions
    • HP 3-tiered Service Levels Balance Investment with Risk
    • PricewaterhouseCoopers Fast Track BCP
    • AT&T's Business Continuity and Disaster Recovery

  • Case Studies

    • Business Continuity for Critical Applications
    • Jones Walker: Weathering the Storm
    • Let’s be prepared: An educational project about disasters in Cuba
    • From rehabilitation to safety: Gujarat school safety initiative, India
    • Disaster-resistant schools: A tool for universal primary education
    • Disaster Recovery Situation Assessment
    • Disaster Recovery Planning
    • Business Continuity Planning and Business Impact Analysis
    • Local risk management in earthquake zones of Kazakhstan
    • Disaster Recovery Case Study: Max Re
    • Disaster Recovery Case Study: GSD&M
    • Storage Assessment Services
    • Backup and Recovery Plan and Design
    • Storage Infrastructure Design and Implementation
    • Continuous Data Protection and Disaster Recovery
    • Disaster Recovery Testing
    • Disaster Recovery Strategy Assessment and Validation
    • Case Study: Improving Disaster Recovery Without Breaking the Bank