Module 1 - Test, Training, and Exercise Programs for IT Plans and Capabilities
¬ Building an Information Technology Security Awareness and Training Program
¬ Four critical steps in the life cycle of an IT Security Awareness and Training Program
¬ Principles of Results-Based Learning
¬ Risk Management Subjects to include in training
¬ Types of Exercises
¬ Establishing a Test, Training, and Exercise Program
¬ Develop Comprehensive TT&E Policy
¬ TT&E Roles and Responsibilities
¬ TT&E Event Methodology
¬ Evaluate the Need for a Tabletop Exercise
¬ Example Lab Scenarios and pre-lab hands-on exercise
Module 2 - BCP & DRP
¬ Goals
¬ BCP Steps
¬ Business Impact Analysis
¬ BCP Team Responsibilities
¬ Difference Between Preventive Measures and Recovery Strategies
¬ Multiple Processing Centers
¬ Plans
¬ Backup and offsite facilities
¬ Types of drills and tests
Module 3 - Initial Planning Processes
¬ Contingency Planning
¬ Reasons to develop a comprehensive disaster recovery plan
¬ Planning process methodology
¬ Ground Rules
¬ Priorities for Processing and Operations
¬ Terms and Concepts
¬ History of Disaster Recovery Planning
¬ Hands-On LAB 1 Initial Planning Processes
Module 4 - Risk Analysis Outline
¬ Organizational Assets
¬ Emergency Management
¬ Importance of Disaster Recovery Planning
¬ Organizational Vulnerabilities
¬ Risk Assessment
¬ Risk Mitigation
¬ Approach for Control Implementation
¬ Good Security Practice
¬ Keys for Success
¬ Lab 2 – Risk Analysis
Module 5 - Business Impact Analysis Outline
¬ Identifying and Selecting Data Gathering Strategies
¬ Identifying All Functions Performed by Organizations
¬ Determining RTOs and Recovery Prioritizations
¬ Determining RPOs and Data Currency Requirements
¬ Identifying Recovery Requirements
¬ Correlating Information and Formulating BIA Reports
¬ Lab 3 - Complete a Business Impact Analysis
Module 6 - Recovery Strategy Analysis Outline
¬ Understanding Roles and Responsibilities of Recovery Organizations and Teams
¬ Identifying All Recovery Strategies for Data, IT Systems, and Functions
¬ Understanding Capabilities, Pros and Cons of Strategies
¬ Analyzing Recovery Requirements and Comparing Requirements Against Strategies
¬ Determining Most Effective Strategies Based on All Criteria
¬ Lab 4 - Recovery Strategy
Module 7 - Emergency Response Planning Outline
¬ Incident Response Team
¬ Examples of Incidents
¬ Emergency Response Plan
¬ Developing an Emergency Plan
¬ Incident Response Team Structure
¬ Incident Handling
¬ Choosing a Containment Strategy
¬ Lab 5 - Emergency Response Planning
Module 8 - Computer Incident Response
¬ Terms
¬ Cybersecurity-related attacks
¬ Response Strategies
¬ Organizing A Computer Security Incident Response Capability
¬ Need for Incident Response
¬ Incident Response Policy
¬ Incident Response Team Structure
¬ Incident Response Team Services
¬ Handling an Incident
¬ Incident Categories
¬ Incident Prioritization
¬ Containment, Eradication, and Recovery
¬ Post-Incident Activity
¬ LAB 6 - Incident Handling
Module 9 - Disaster Recovery Planning
¬ Basic Questions for BIA
¬ Information on the NIST process for BIA
¬ 10 absolute basics your plan should cover
¬ Planning Example at USAA
¬ Disaster recovery planning
¬ DRP Goals and Objectives
¬ Keys to Success
¬ Common DRP Mistakes to Avoid
¬ Contingency Plan (DRP) Review
¬ Lab 7 – Disaster Recovery