Backup & Recovery: Business Continuity & Disaster Recovery

SRE    |    Intermediate
  • 15 videos | 1h 21m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 468 users Rating 4.7 of 468 users (468)
Disasters can occur at any time and to any sized organization, so administrators should invest the time and resources to properly plan for business continuity and disaster recovery. In this course, you'll learn how to plan for business continuity, assess risk, and perform business impact assessments. You'll also learn about system resilience, sensitive data types, and data classifications. Lastly, you'll see a comparison of Recovery Time Objective and Recovery Point Objective, and examine what to include when preparing a disaster recovery training plan.


  • Discover the key concepts covered in this course
    Describe system resilience and fault tolerance
    Recognize what data to include in a backup, such as full operating system, personal files, and company data
    Identify and classify assets such as pii, phi, and proprietary data
    Provide an overview of data classifications such as top secret, secret, confidential, and unclassified
    Recognize the financial impact of a large data breach or cyber incident
    Provide an overview of performing a business impact assessment
    Recognize different types of risks to consider
  • Describe elements of continuity planning such as strategy and processes
    Define appropriate service levels
    Provide an overview of data protection solutions that can be used to protect against security issues and reduce the risk of compromised data
    Provide an overview of common roles and responsibilities of an administrator when it comes to data backups and recovery
    Provide an overview of recovery time objective and recovery point objective and how they can relate to a timely recovery
    Describe elements to include when preparing a disaster recovery training plan
    Summarize the key concepts covered in this course


  • 1m 27s
  • 12m 35s
    In this video, you'll learn more about the concepts of System Resilience and Fault tolerance. You'll also learn how to make your systems more reliable overall. You'll discover that when it comes to increasing your resilience, you need to try to identify any instances where there might be a single point of failure and address it. This is referred to as reducing or eliminating the single point of failure. FREE ACCESS
  • Locked
    3.  Backup Data Considerations
    6m 42s
    During this video, you'll learn about the considerations you should make when performing backups of your data. You'll learn that both viruses and legitimate processes are capable of damaging data or your access to it afterwards. There are however appropriate measures you can take to minimise the damage or avoid this happening. This video recommends AppData (for systems running Windows), the Program Files directory, or to try reinstalling Windows itself. If you're using Microsoft Exchange Server in an Active Directory environment, then all messages are stored on the servers. These and other solutions are outlined in this video. FREE ACCESS
  • Locked
    4.  Sensitive Data
    6m 7s
    In this video, you'll learn more about the different classifications of data that you may be storing in your organization. You'll learn that when it comes to classified data, there are varying regulations in place as defined by some kind of governing body. This video will focus on the classifications themselves, such as: Personally Identifiable Information or PII and also, Protected Health Information, or PII. FREE ACCESS
  • Locked
    5.  Data Classifications
    5m 21s
    In this video, you'll learn more about classification types. You'll learn that classification itself is a process by which data is assigned some kind of value. This determines how critical it is to an organization to ensure data is protected in terms of maintaining confidentiality and integrity. You'll learn that top secret is typically reserved for entities such as the government or the military. It might also be used within an organization for its own purposes. FREE ACCESS
  • Locked
    6.  Costs of a Data Breach
    5m 2s
    In this video, you'll learn more about the impact or damage that can result from a Data Breach. You'll also learn about some basic measures that should be implemented in any organization to help protect against breaches or other security threats. You'll discover the most common target is Personally Identifiable Information or PII including full names and addresses, financial information such as credit cards, and identity information such as social security numbers. FREE ACCESS
  • Locked
    7.  Business Impact Assessment
    8m 49s
    In this video, you'll learn more about performing a Business Impact Assessment. This is the process of identifying the resources that are most critical to your organization. You'll also learn how to determine the likelihood of any given threat actually occurring. The results are used to prioritize the resources required for you to be able to continue providing services without disruption. FREE ACCESS
  • Locked
    8.  Assessing Risk
    3m 41s
    During this video, you'll learn about the basic risk categories of Natural and Human-initiated and examine methods of dealing with each type. You'll discover that these categories include natural risks such as storms, floods, earthquakes, or hurricanes. Human-initiated risks include theft, vandalism, fraud, or terrorism. You'll also learn about unintentional human error and personnel strikes. FREE ACCESS
  • Locked
    9.  Planning for Continuity
    5m 6s
    In this video, you'll learn about the considerations when formulating a business continuity plan. This refers to the ability to maintain your business operations during and after an event that could otherwise interrupt your ability. This begins with an understanding of what events would be capable of disrupting your operations. You'll learn how to perform a risk assessment so you have a clear picture of how any given risk event will affect your protected resources. Other consideratons include office space, data backups and various other approaches discussed in this video. FREE ACCESS
  • Locked
    10.  Service Levels
    4m 53s
    In this video, you'll learn more about defining acceptable levels of service, which typically takes the form of a service level agreement between a provider and a consumer. It involves ways to measure the actual level of performance being delivered and what kind of compensation or remuneration will be offered if the measured level doesn't match the agreed-upon level. This instills confidence in the provider and makes it easier for the provider to attract new customers. FREE ACCESS
  • Locked
    11.  Data Protection Solutions
    8m 33s
    In this video, you'll learn more about Data Protection Solutions to help protect your data against a variety of security threats and from losing it entirely. You'll learn how the primary consideration is ensuring you have backup and recovery guidelines in place that outline the goals and procedures of your backup strategy to meet the needs of your organization. You'll learn there are a variety of approaches when it comes to backup and recovery, and no single approach can be labeled as the best one. FREE ACCESS
  • Locked
    12.  Roles and Responsibilities
    3m 4s
    In this video, you'll learn more about the roles and responsibilities that should be defined as part of any backup strategy. You'll learn this is something that should be done in smaller organizations. The first role begins with data itself and identifying the owner of that data. Common tasks will usually include maintaining the systems and software required to perform the backups, validating that the backup jobs succeeded, and testing those backups to ensure that the data can be recovered from them. And of course, actually performing the restores if and/or when necessary. FREE ACCESS
  • Locked
    13.  Recovery Time Objective vs. Recovery Point Objective
    7m 27s
    In this video, you'll learn more about the Recovery Time Objective and the Recovery Point Objective, which are values usually outlined in a service level agreement, but not always. Sometimes they're just used internally for the benefit of your own users. But they can help alleviate concerns when it comes to losses. The RTO value refers to time as its name indicates, and expresses an expected duration of downtime based on what is deemed to be tolerable. This and the RPO are explored in detail during the video. FREE ACCESS
  • Locked
    14.  Training and Awareness
    1m 41s
    During this video, you'll learn more about providing training for the personnel who will be involved at all levels of disaster recovery. You'll learn that the nature of which will vary depending on the role. But understanding the process by which disaster recovery is implemented is something that should not be limited to just system administrators or data stewards. Everyone in the organization should have some level of understanding of the overall measures that are in place. FREE ACCESS
  • Locked
    15.  Course Summary
    1m 16s


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Rating 4.4 of 51 users Rating 4.4 of 51 users (51)
Rating 4.4 of 54 users Rating 4.4 of 54 users (54)
Rating 4.5 of 38 users Rating 4.5 of 38 users (38)


Rating 4.6 of 277 users Rating 4.6 of 277 users (277)
Rating 4.8 of 230 users Rating 4.8 of 230 users (230)
Rating 4.7 of 220 users Rating 4.7 of 220 users (220)