FREE CPE! Get Started Launch Offer - Use Discount Code 'WelComE21'

Business Continuity Planning and Disaster Recovery

Training the employees in planning and preparation for BCP/DR is imperative for a successful BCP/DR Program e-Learning Course Demos

BCP and DR the SecuRetain Way

Create a talent pool of the organization’s workforce that has the capabilities of successfully bring back normalcy after disaster strikes by training them on business continuity and disaster recovery.
Default

Real-world BCP/DR knowledge that will help recognize risks and empower your organization to timely recover in case of breach

Default

Affordable BCP/DR e-learning courses to acquire essential and fundamental knowledge and skills in cyber crisis management

Default

Track progress & course completion for yourself or an entire enterprise with SecuRetain Platform

Default

Customize BCP/DR courses to reflect your strategies, frameworks, guidelines, policies, and procedure

Default

Use the SecuRetain platform to distribute your training content along with SecuRetain courses in your own private space

Corporations can save more than 15% by developing in-house skills. The series of courses aim to enhance end to end knowledge.

Preview e-Learning Courses

Stay Prepared – Disaster Recovery Services and Planning

Beneficial for all organizations, irrespective of their size, industry, and geography. SecuRetain will help employees grow personally and professionally.

Learning Outcomes from BCP/DR Based e-Learning Courses

Incidents become disasters for those who are not prepared. There is no right way to prepare for a disaster, but training employees is clearly a major step!

Learn how to build a disaster recovery plan and implement a business continuity management to protect the organization from the constant risk of business disruptions caused by internal and external threats.

  • BCP/DR Driving Factors
  • Challenges in Developing DR Plan
  • BCP/DR Architecture
  • Drivers for DR Architecture
  • Architectural Elements
  • BCP/DR Plan
  • DR Emergency Procedures
  • Backup Strategy
  • Fraud and Audit Management Series
  • BCP/DR Frameworks and Standards
  • Frameworks Explained ISO 22301, National Fire Protection, Association (NFPA) 1600, FFIEC Business Continuity, NIST 800-34
  • Backup and recovery strategy
  • Apply best practices for backup
  • Learn eight different backup methods and backup hardware
  • What is recovery and methods of recovery?
  • The challenges with the recovery process and prioritization

SecuRetain’s Disaster Recovery e-Learning Courses

Browse all Disaster Recovery category courses available for you on our SecuRetain platform
To search all courses on our SecuRetain platform. Click here!

Breach Notification Advanced Part II

Objective

Your employees may be the first to identify a potential breach, so they must have adequate knowledge regarding how they should handle such a scenario. Your employees must also understand what steps they should take if they suspect a breach has occurred. The advanced course trains employees on the next steps instead of panicking. The training will educate employees to understand their roles and do’s and don’ts once the breach occurs. 

The course also educates employees on the process of breach communication internal to the organization and very importantly communicating with outsiders. The laws require timely notification to Federal and State government authorities about the breach. The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and
the penalties for failure to comply. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00302
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Breach Notification Awareness Part I

Objective

Your employees must also understand what steps they should take if they suspect a breach has occurred. Not all disclosures will be breaches. So, what is the difference between event, alert, incident, and breach? A (reportable) breach is the unauthorized acquisition, access, use, or disclosure of sensitive/PII/PHI information in a manner not permitted by law or regulation and which compromises the security and privacy. The laws require timely notification to Federal and State government authorities about the breach.

The course is designed to ensure employees understand the importance of acting quickly, make sure they are aware of the basic notification rule requirements, and the penalties for failure to comply. 

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.

  • Course ID: CS00301
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Business Continuity & Disaster Recovery Awareness Part I

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred.

This BCP and DR awareness course will provide every employee in the organization about the basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc. The course is essential for the corporations and organizations that must meet various mandates regarding privacy, confidentiality, and availability of systems and data. In order to promote sustainability and employee retainership we recommend the series BCP/DR Part I to BCP/DR Part V training programs for employee knowledge advancement and growth. 

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.

  • Course ID: DR00101
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan

Business Continuity & Disaster Recovery Awareness Part II

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred. DR is one of the most important topics in computer security and comprehensive training in this field is needed to train all the IT operators in order to prepare themselves for any type of disaster.        
 
The series BCP/DR Part I to BCP/DR Part V help learners understand a variety of topics in BCP and DR such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in the disaster recovery plan, disaster communication, etc.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: DR00102
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Business Continuity Plan (BCP) vs Disaster Recovery (DR)
  • Disaster Recovery Architecture
  • Drivers for DR Architecture
  • Architectural Elements
  • Disaster Recovery Plan
  • Backup Strategy
  • Disaster Recovery Emergency Procedures

Business Continuity Disaster Recovery Part III

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred. DR is one of the most important topics in computer security and comprehensive training in this field is needed to train all the IT operators in order to prepare themselves for any type of disaster.
 
The series BCP/DR Part I to BCP/DR Part V helps you understand a variety of topics in BCP and DR such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in a DR plan, disaster communication, etc.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: DR00103
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • BCP DR Frameworks and Standards
  • What is the Framework?
  • What are the different BCP frameworks?
  • Frameworks Explained
  • ISO 22301
  • National Fire Protection Association (NFPA) 1600
  • FFIEC Business Continuity
  • NIST 800-34
  • ISO 27301
  • BCP
  • Good Practice Guidelines (GPG)
  • Ready Gov
  • COBIT

Business Continuity Disaster Recovery Part IV

Objective

Business Continuity Planning (BCP) is the way an organization can prepare for and aid in Disaster Recovery (DR). BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred. The series BCP/DR Part I to BCP/DR Part V helps you understand a variety of topics in BCP and DR such as introduction to DR, the concept of disasters, introduction to BCP, DR processing plans, risk management techniques, facility protection during the DR period, data/system recovery, incident response and public service effect in the DR plan, disaster communication, etc.

DR Part IV course explains the backup and recovery strategy development considerations, best practices for backup, different methods of backup, recovery methods, etc. The course includes knowledge questions as users progress through the training and final test.

This interactive training course will ensure professionals and practitioners at all levels understand their roles and responsibilities, new developments, resources, and hallmarks of an effective compliance program. The course includes knowledge questions as users progress through the training and the final assessment test.
  • Course ID: DR00104
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Learn about what is a backup and recovery strategy
  • Understand and learn to apply best practices for backup
  • Learn eight different backup methods and backup hardware
  • Understand what recovery is and learn about methods of recovery
  • Learn about the challenges with recovery process and prioritization

Incident Management Advanced Part II

Objective

Information is an ASSET which, like other important business assets, has VALUE to an organization and consequently needs to be SUITABLY protected. An ISMS is that part of the overall management system, based on a business risk approach, aims to establish, implement, operate, monitor, review, maintain and improve information security. ISO 27001 is the internationally recognized best practice framework for an Information Security Management System (ISMS). ISO/IEC 27001 is the only auditable international standard which defines the requirements for an Information Security Management System (ISMS).

The training explains how implementing a security program based on the framework can help organizations mitigate the security risk and consider the appropriate level of rigor for their cybersecurity program. It explains employees on how their organization can move from their current state to their target state with the ability to identify gap and prioritize gaps based on risk assessment. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00402
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Understandthe need for ISMS
  • Learnabout ISO 27001certification and ISMS Mandatory Process
  • Introductionto implementing ISMS
  • Learnhow to implement ISO 27001 ISMS 11 Step Program
  • Stepby Step Guide on implementing ISMS program
  • Learnthe practical examples and study the documentation samples
  • Learnabout ISO 27001 Annex A Controls Checklist 14 Domains and 35 Control Objectives        
  • ISMSPart III includes implementation details for each control objective alongguidance

Incident Management Awareness Part I

Objective

Information is an ASSET that, like other important business assets, has VALUE to an organization and consequently needs to be SUITABLY protected. An ISMS is that part of the overall management system, based on a business risk approach, which aims to establish, implement, operate, monitor, review, maintain, and improve information security. ISO 27001 is the internationally recognized best practice framework for an Information Security Management System (ISMS). ISO/IEC 27001 is the only auditable international standard which defines the requirements for an Information Security Management System (ISMS).

The training explains how implementing a security program based on the framework can help organizations mitigate the security risk and consider the appropriate level of rigor for their cybersecurity program. It explains to employees how their organization can move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.
 
In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.

  • Course ID: CS00401
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Brief about Incident and Incident Management (IM)
  • Incident Management Objectives
  • What is a Security Incident Management?
  • Incident, Problem, and Service Request
  • Incident Management Key Concepts
  • Incident Management Process and ITIL
  • Incident Management Process Workflow Examples
  • Incident Management Process
  • Incident Management Process Steps Discussed in Detail

Incident Management Cyber Security Incident Response Team (CSIRT) Part III

Objective

Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore the normal operations and services as quickly as possible after an unforeseen event. IM is the process of managing the lifecycle of all incidents to ensure smooth business operations with minimal to no downtime. The program is in three parts. IM Part III is for all professionals and practitioners to help them understand their roles and how quickly an incident can escalate to become a major issue if not managed properly. Part III provides advanced knowledge in building a Cybersecurity Incident Response Team (CSIRT). The program is thorough about building a CSIRT, escalation, and adapting the CSIRT for different types of incidents. The training is supported by charts and flow diagrams along with detailed information on roles and responsibilities. This is highly recommended for organizations wanting to improve their incident management processes. The course includes knowledge questions as users progress through the training and the final assessment test. The training is focused on information technology employee growth, retention, and sustainability. In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00403
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Understand how to use code of practice ISO 27002
  • Learn about ISMS mandatory processes and documentation
  • Learn about risk assessment, risk treatment plans, statement of applicability
  • Learn about ISO 27001 Annex A controls and requirements

National Institute of Standards and Technology Part I

Objective

National Institute of Standards and Technology (NIST) is responsible for measurement science, standards, and technology in a way that promotes safety and collaboration for industry and government alike. In this course, you will learn to apply the principles of the NIST Cyber Security Framework (NIST CSF) to your organization.

A security program must keep pace with the evolving threat landscape. NIST CSF helps build and augment a security program that equips the enterprise to keep pace with evolving threats and technologies. The course outlines how implementing a security program based on the CSF framework can help organizations mitigate these issues. The framework core contains cybersecurity activities and informative references that are organized around particular functions.

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00501
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Learn about CSF fundamentals
  • Learn how to develop a risk-based cybersecurity framework
  • Understand the CSF framework core and design
  • In-depth knowledge on how to use functions, categories, and subcategories
  • Use of risk management principles, best practices, and methodologies
  • Understand the CSF implementation tiers and implementation
  • Learn about framework profile implementation
  • Learn about improving resiliency

National Institute of Standards and Technology Part II

Objective

National Institute of Standards and Technology (NIST) is responsible for measurement science, standards, and technology in a way that promotes safety and collaboration for industry and government alike. In this course, you will learn to implement the principles of the NIST Cyber Security Framework (NIST CSF) in your organization. You will study informative references associated with functions and categories in greater detail.

A security program must keep pace with the evolving threat landscape. NIST CSF helps build and augment a security program that equips the enterprise to keep pace with evolving threats and technologies. The course outlines how implementing a security program based on the CSF framework can help organizations mitigate these issues. The framework core contains cybersecurity activities and informative references that are organized around particular functions.

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00502
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Learn about CSF fundamentals
  • Learn how to establish or improve your cybersecurity program
  • Understand the NIST CSF concept and how to implement with the help of case study
  • Understand the practical application of CSF framework’s core, design, functions, categories, and subcategories
  • Detailed knowledge of functions, categories, and subcategories along with
  • informative references from COBIT, ISA, NIST SP 800-53, CIS CSC, ISO 27001, etc.

Problem Management Advanced Part II

Objective

The objective of incident management is to restore the service as quickly as possible while problem management deals with solving the underlying root cause of one or more incidents. The Problem Management Advanced course will enable you to design and implement a problem management process in your organization. 

The course will train you on establishing problem management process roles and responsibilities, step by step approach in implementing key processes, defining process inputs/outputs, and reporting. You will also learn about drivers/inputs that trigger the problem management process. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00602
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Understand basic concepts of problem management
  • Learn about the roles and responsibilities associated with the problem
  • management process
  • Understand the input that triggers the problem management process
  • Planning for problem management process implementation and training
  • Understand the problem management process implementation guide (step by step approach)
  • Understand process inputs and outputs
  • Learn about problem management reporting
  • Understand the problem management checklist
  • Understand the activities and documentation

Problem Management Awareness Part I

Objective

The objective of incident management is to restore the service as quickly as possible while problem management deals with solving the underlying root cause of one or more incidents. 

The Problem Management Awareness course will enable you to gain and apply the skills and techniques to your own organization to establish problem management best practices. You will learn when and how to implement a problem control process, understand the workarounds, develop policy and procedures, and define critical success factors as well as key performance indicators. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00601
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Understand incident vs. problems
  • Understand quick fix and permanent problem resolution
  • Key definitions and basic concepts for problem management
  • Decide whether you need to implement problem control
  • Key process activities of the problem management process
  • Understand workarounds and solutions
  • Developing problem management policy
  • Learn about problem management process interfaces
  • Critical success factors and key performance indicators

Social Engineering & Phishing Advanced Part II

Objective

Hackers call data centers and pretend to be customers who have lost their passwords or show up at a site and simply wait for someone to hold a door open for them. Hackers have been known to create phony websites, sweepstakes, or questionnaires that ask users to enter a password. Phishing is a technique used to obtain sensitive information by impersonating oneself as a trustworthy entity in an electronic communication. 

In Part II of Phishing Awareness, you will learn about different types of phishing attacks, techniques in discovering attacks, characteristics of phishing emails, etc. providing employees with very deep knowledge in responding to the growing amount of phishing emails. The course is designed for the organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, highly sensitive, and confidential data. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
  • Course ID: CS00104
  • Duration: 60 mins
  • CPE: 1 HR
  • Course Type: e-Learning
Course Details

What you will learn?

  • Learn about Ten Different Types of Phishing Attacks
  • Understand the Characteristics of Phishing Emails
  • Understand Common Methods of Phishing Attacks
  • Learn about Escalation and Containment
  • Learn about Eradication and Rebuilding
  • Learn about Recovery and Aftermath
Copyrights © 2020 All Rights Reserved by SecuRetain.