We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you how to prepare for incidents and preserve business operations during a crisis needed for the Certified in Cybersecurity exam.

Read more

This course will teach you how to prepare for incidents and preserve business operations during a crisis needed for the Certified in Cybersecurity exam.

This is the second of the five domains for the CC examination, and it addresses the areas of business resilience and even survival. In this course, Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts for CC℠, you’ll learn to prepare for and mitigate incidents that could affect business operations. First, you’ll explore incident response. Next, you’ll discover business continuity.. Finally, you’ll learn how to recover from a disaster. When you’re finished with this course, you’ll have the skills and knowledge of Business Continuity Management needed for the Certified in Cybersecurity exam.

Enroll now

What's inside

Syllabus

Course Overview
Incident Response
Business Continuity
Disaster Recovery
Read more
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops knowledge in incident response, which is key for business operations during a crisis
Examines Business Continuity Management, which is highly relevant to the Certified in Cybersecurity exam
Covers Disaster Recovery, which is vital for organizations in risk management
Instructed by Kevin Henry, who is a highly experienced expert in cybersecurity
Students are expected to have background knowledge in cybersecurity
Teaches concepts that are essential for cybersecurity professionals

Save this course

Save Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts for CC℠ to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts for CC℠ with these activities:
Review Business Continuity & Disaster Recovery (BC/DR).
Review the basics of BC/DR to strengthen understanding before starting the course.
Browse courses on Business Continuity
Show steps
  • Define and scope the concepts of Business Continuity (BC) and Disaster Recovery (DR).
  • Understand the difference between BC and DR.
Contribute to an open-source project related to incident response or business continuity.
Gain hands-on experience in incident response and BC by contributing to an open-source project.
Show steps
  • Identify an open-source project in the area of incident response or BC.
  • Review the project documentation and codebase.
  • Identify and propose a contribution to the project.
  • Implement and submit your contribution.
Prepare an Incident Response Plan (IRP).
Apply the concepts of incident response by developing a realistic IRP.
Browse courses on Incident Response
Show steps
  • Identify potential incidents and threats.
  • Develop response procedures and assign roles.
  • Test and refine the IRP.
One other activity
Expand to see all activities and additional details
Show all four activities
Form a study group with classmates or colleagues to discuss course concepts and prepare for the exam.
Enhance understanding through peer-to-peer learning and support.
Browse courses on Collaboration
Show steps
  • Identify and connect with potential study partners.
  • Establish regular meeting times and a study schedule.
  • Review course materials and discuss concepts together.

Career center

Learners who complete Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts for CC℠ will develop knowledge and skills that may be useful to these careers:
Disaster Recovery Specialist
Disaster Recovery Specialists are responsible for developing and implementing plans to recover IT systems and data in the event of a disaster. They work with other IT professionals to identify critical systems and data, and they develop procedures to restore these systems and data as quickly as possible. This course would be very helpful for aspiring Disaster Recovery Specialists, as it would provide them with a solid foundation in the principles of disaster recovery.
Business Continuity Manager
Business Continuity Managers ensure that businesses can continue operating even during emergencies such as natural disasters or cyberattacks. They develop and implement plans to minimize the impact of disruptions, and they work with other departments to ensure that employees are prepared to respond to emergencies. This course would be very helpful for aspiring Business Continuity Managers, as it would provide them with a solid foundation in the principles of business continuity and disaster recovery.
Incident Responder
Incident Responders are responsible for responding to security incidents and breaches. They investigate incidents, contain the damage, and restore systems to normal operation. This course would be very helpful for aspiring Incident Responders, as it would provide them with a solid foundation in the principles of incident response and business continuity.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They develop and implement security policies and procedures, and they monitor systems for security breaches. This course would be helpful for aspiring Information Security Analysts, as it would provide them with a solid foundation in the principles of information security.
Penetration Tester
Penetration Testers are responsible for testing the security of an organization's computer systems. They identify vulnerabilities in systems and networks, and they provide recommendations on how to fix these vulnerabilities. This course would be helpful for aspiring Penetration Testers, as it would provide them with a solid foundation in the principles of penetration testing and incident response.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's computer networks. They install, configure, and troubleshoot network hardware and software, and they monitor networks for security breaches. This course would be helpful for aspiring Network Administrators, as it would provide them with a solid foundation in the principles of network security and disaster recovery.
Security Consultant
Security Consultants provide advice to organizations on how to improve their security posture. They assess an organization's security risks, and they develop and implement security solutions. This course would be helpful for aspiring Security Consultants, as it would provide them with a solid foundation in the principles of security consulting and business continuity.
IT Auditor
IT Auditors are responsible for auditing an organization's IT systems and controls to ensure that they are compliant with laws and regulations. They also provide guidance to management on how to improve the security of their IT systems. This course would be helpful for aspiring IT Auditors, as it would provide them with a solid foundation in the principles of IT auditing and business continuity.
Security Engineer
Security Engineers are responsible for designing and implementing security solutions for an organization. They work with other IT professionals to identify security risks, and they develop and implement security measures to mitigate these risks. This course would be helpful for aspiring Security Engineers, as it would provide them with a solid foundation in the principles of security engineering and disaster recovery.
CISO
CISOs are responsible for an organization's cybersecurity program. They oversee the organization's cybersecurity staff, and they work with other departments to ensure that the organization's information assets are protected. This course may be helpful for aspiring CISOs, as it would provide them with a solid foundation in the principles of cybersecurity.
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's information security program. They oversee the organization's security staff, and they work with other departments to ensure that the organization's information assets are protected. This course may be helpful for aspiring Information Security Managers, as it would provide them with a solid foundation in the principles of information security management.
IT Director
IT Directors are responsible for managing an organization's IT department. They oversee the department's staff, and they develop and implement the department's strategic plan. This course may be helpful for aspiring IT Directors, as it would provide them with a solid foundation in the principles of IT management.
Compliance Manager
Compliance Managers are responsible for ensuring that an organization complies with laws and regulations. They work with other departments to identify and mitigate compliance risks. This course may be helpful for aspiring Compliance Managers, as it would provide them with a solid foundation in the principles of compliance management.
Risk Manager
Risk Managers are responsible for identifying and mitigating risks to an organization. They work with other departments to develop and implement risk management strategies. This course may be helpful for aspiring Risk Managers, as it would provide them with a solid foundation in the principles of risk management.
Business Analyst
Business Analysts work with businesses to identify and solve business problems. They analyze business processes, and they develop solutions to improve efficiency and effectiveness. This course may be helpful for aspiring Business Analysts, as it would provide them with a solid foundation in the principles of business analysis.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts for CC℠.
Provides a comprehensive overview of incident response and computer forensics. It valuable resource for anyone responsible for responding to or investigating security incidents.
A comprehensive guide to disaster recovery planning for IT professionals, covering technical aspects, best practices, and case studies.
Provides a comprehensive overview of disaster recovery, including strategies, plans, and procedures. It valuable resource for anyone responsible for developing or implementing a disaster recovery plan.
Provides a comprehensive guide to business continuity and disaster recovery for IT professionals. It valuable resource for anyone responsible for developing or implementing a business continuity or disaster recovery plan.
Provides a practical guide to business continuity management. It valuable resource for anyone responsible for developing or implementing a business continuity plan.
Covers the fundamentals of business continuity and disaster recovery planning for IT professionals, and provides guidance on how to develop and implement a comprehensive plan.
Provides a practical guide to business continuity and disaster recovery for non-technical readers. It valuable resource for anyone who wants to understand the basics of business continuity and disaster recovery.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts for CC℠.
Incident Response, BC, and DR Concepts
Most relevant
Incident Management for CISM®
Most relevant
Security Operations: Business Resilience and Incident...
Most relevant
Operations and Incident Response for CompTIA Security+
Most relevant
Managing Cybersecurity Incidents and Disasters
Most relevant
Operations and Incident Response for CompTIA Security+
Most relevant
DP-203: Secure, Monitor, and Optimize Data Storage and...
Most relevant
Incident Response and Recovery for SSCP®
Most relevant
Identifying, Monitoring, and Analyzing Risk and Incident...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser