
|
CSI066 |
Data Protection and Rapid Recovery in DR/BCP |
|
|
|
||
|
Objectivo Geral |
|
|
|
||
This training program will address the range of techniques and methods that are becoming available for safeguarding the corporate information asset. Trainees will be introduced to detailed procedures for identifying and categorizing data assets and for managing data to ensure its survivability and rapid restoration in the event of an unplanned interruption event. Without data recovery, disaster recovery plans cannot succeed.
|
|
|
|
OBJEcTIVos Específicos |
|
|
|
In this six module program, trainees will learn
· How to define their data recovery targets
· How to evaluate alternatives and select the best option or mix of options for protecting data based on a business value case model
· How to manage a data protection strategy and ensure that it remains consistent with business and technological change
· How to leverage network applications to automate data protection and reduce labor costs
· How to manage external service providers involved in the data protection strategy
|
|
|
|
Destinatários |
|
|
|
Managers and responsibles for the DR and BCP in the Organization.
|
|
|
|
PRÉ-REQuisitos |
|
|
|
|
|||
|
Duração |
||
|
12 Horas |
|
|
|
|
|||
|
Conteúdo Programático |
||
MODULE 1: Welcome and Introduction
Data is the life’s blood of any organization: it is the most irreplaceable asset, second only to personnel. In this module, we will provide a context for the primacy of business data, discussing the different formats of data – database, file, and hybrids (e.g., email) – and we will engage trainees in a discussion about the data dependencies of their organizations.
MODULE 2: Describing the Data Asset
This module will examine ways to characterize data assets in terms of their criticality and hosting requirements – an important prerequisite to developing appropriate data protection strategies. Trainees will learn
· How to identify data stores and techniques for analyzing storage contents
· Differences between structured, unstructured, and hybrid data and their associated protection requirements
· Methods for classifying data criticality
· Methods for documenting current storage infrastructure and assessing resiliency
· The meaning of high availability and security as they apply to data access
MODULE 3: Methods of Data Protection, Part I
This module will examine the use of tape backup as a mechanism for copying and safeguarding data assets. We will examine tape technology in detail and discuss the problems commonly attributed to tape as a protective medium, including media vulnerability, media management, labor costs, and reporting requirements. Then, the functional components of an effective tape backup strategy will be discussed. Also discussed in this module are criteria for assessing and selecting an off-site storage solution for tape-based data protection.
MODULE 4: Methods of Data Protection, Part II
Disk to disk copying and mirroring is increasingly preferred as a data protection strategy as the price of disk, interconnects, and software decline. But, before you jump into multi-tier storage for data protection, there are fundamentals that you need to know. The trainee will learn about
· Mirroring, D2D and DDT topologies, performance characteristics, and costs
· Mirroring capabilities and vulnerabilities
· Shadowing and Snap Shot technology
· Hierarchical Storage Management and Archive and their relevance to recovery
· Network and Application Layer strategies for data replication
MODULE 5: Preparing for the Worst…on a Budget
Whatever strategy is chosen for data protection, it must be validated and maintained for consistency with business and technological change. Vendors must be managed and service levels monitored. This session will explore the many maintenance tasks associated with an effective data protection strategy and will provide tips for keeping costs from accelerating as the volume of data produced by the organization grows over time.
MODULE 6: Class Exercise and Conclusion
Preços
| 1º participante | 2º participante | 3º participante |
|---|---|---|
| Preço sob consulta, peça-nos um orçamento através do seguinte email: comercial@vantagem.com | ||
| 1º participante | 2º participante | 3º participante |
|---|---|---|
| Preço sob consulta, peça-nos um orçamento através do seguinte email: comercial@vantagem.com | ||
| 1º participante | 2º participante | 3º participante |
|---|---|---|
| Preço sob consulta, peça-nos um orçamento através do seguinte email: comercial@vantagem.com | ||
Outras Informações
Os preços e incluem Coffee Breaks e Documentação.