• Post category:Udemy (Jan 2022)
  • Reading time:4 mins read

What you will learn

The basics surrounding disaster recovery and business continuity planning

Different types of disasters and some mitigations against them

Data protection compliance during a disaster situation

Bring your own device (BYOD) and security implications


Over this course, we’ll be covering the basics surrounding DR and BCP planning, as well as some different types of disasters and the best ways to mitigate against them.


Topics on this course are as follows:

* Overview of Disaster Recovery (DR) and Business Continuity Planning (BCP)

* Mitigating against different types of disasters and maximising the chances of data recovery

* Common issues than can occur during a DR test or real world disaster

* Assessing the impact of a DR test or disaster on your business

* Maintaining data protection compliance during a disaster situation

Subscribe to latest coupons on our Telegram channel.

* Implications of allowing Bring Your Own Device (BYOD)

* Security considerations of any recovery strategies, i.e. ensuring the same level of physical and logical security as you would at a primary business premises.


Also included on the course are some examples of how a DR plan would be implemented in the real world, for example having key members of staff available throughout testing and having a way to contact them quickly should a real world disaster occur.

Whilst it is, of course, impossible to plan for every situation, a good analysis of the potential impact of a disaster will go a long way in ensuring continuity of service within your organisation and allow the minimum possible level of inconvenience to customers.




DR and BCP Overview

Disasters & Mitigations

Flood damage
Fire damage
Cyber attacks
Staff availability

Common BCP Helpdesk Queries

Remote access licensing
Telephony issues
Resource access issues
Physical records

Impact Assessment & Data Protection

Impact assessment
Data protection

BYOD & Security Considerations

Bring your own device (BYOD)
Security considerations