OS Mission Critical Planning
How to select the right tools and develop effective Contingency Planning for information systems.
More than ever your corporate data is at risk. During this 72 hour class, you'll learn the principles of contingency planning and develop an A to Z disaster recovery plan for information assurance in your organization. This interactive workshop / lab will jump start your contingency planning processes for large or small organizations. You will walk away with a portfolio of near and long term answers and initiatives for critical asset management risk, contingency plans and disaster recovery.
Class Fee: | $3,990 |
Time: | 72 hrs |
Learning Level: | Entry |
Contact Hours: | 72 hr Lecture |
Prerequisites: | Understanding of TCP/IP Protocols |
Credits: | 72 CPE / 3 CEU |
Method of Delivery: | Residential (100% face-to-face) or Hybrid |
Instructor: | TBD |
Method of Evaluation: | 95 % attendance 2. 100 % completion of Lab |
Grading: | Pass = Attendance+ labs & quizzes Fail > 95% Attendance |
Sample Job Titles:
Contracting Officer (CO)
Contracting Officer Technical Representative (COTR)
Information Assurance (IA) Manager
Information Assurance (IA) Program Manager
Information Assurance (IA) Security Officer
Information Security Program Manager
Information Systems Security Manager (ISSM)
Information Systems Security Officer (ISSO)
Information Systems Security Operator
This 72 hour accelerated class is taught using face to face modality or hybrid modality. Class includes 72 hours of contact studies, labs, reading assignments and final exam ‐ passing the final exam is a requirement for graduation.
Who should attend: CIOs with responsibility for Contingency Planning, Network Administrators, Information Security Architects, Auditors, Consultants, and all others seeking to plan, implement, and/or manage an Contingency Planning program.
KU Outcomes:
- Students will be able to describe potential system attacks and the actors that might perform them.
- Students will be able to describe cyber defense tools, methods and components.
- Students will be able to apply cyber defense methods to prepare a system to repel attacks.
- Students will be able to describe appropriate measures to be taken should a system compromise occur.
- Students will be able to describe cyber defense tools, methods and components.
- Students will be able to apply cyber defense methods to prepare a system to repel attacks.
- Students will be able to describe appropriate measures to be taken should a system compromise occur.
Learning Objectives:
Basics of contingency planning
Business Impact Analysis (BIA) tools "test drive" leading
contingency planning software.
Determine your organizations most critical applications,
Explore Maximum Allowable Delay (MAD),
Configure time techniques,
Establish disaster recovery teams
Designate a control center methodology
Develop a process for real‐time disaster recovery for your
organization.
Contingency planning product(s)
Import existing personnel
Equipment records
Establish the recovery teams you will need,
Recovery strategies (hot site, cold site, reciprocal agreements, etc.),
Test your contingency plan
Grades ‐All students must ordinarily take all quizzes, labs, final exam and submit the class practical in order to be eligible for a Q/ISP, Q/IAP, Q/SSE, or Q/WP credential unless granted an exception in writing by the President. Know that Q/ISP classes draws quite the spectrum of students, including "those less comfortable," "those more comfortable," and those somewhere in between. However, what ultimately matters in this course is not so much where you end up relative to your classmates but where you end up relative to yourself in on Friday of class. The course is graded as a pass or fail solely on your attendance and participation. Books ‐ No books are required for this course. However, you may want to supplement your preparation.