Course
Title |
: Business
Resilience and Data Protection Best
Practices |
Course
Duration |
: 2 Day
Face-to-Face Classroom and 2 Day Online
Intructor Led Workshop
: Online
workshop is delivered in two days, two units
each day between 10:30 am to 1 pm and 3 pm to
5:30 pm |
Course Fee |
: Available
upon request (Write to us at info@tlcpak.com) |
Course
Location |
: TLC
(Karachi), Customer On-site and Online |
Course Code |
: TN185 |
Deliverables |
:
Comprehensive Student Guide and Workshop
Certificate |
PURPOSE:
Data protection
contains much more than just adopting basic backup and
recovery techniques, extending to issues related to
data corruption, retention and data loss, data
accessibility and availability, data confidentiality
and sanitization, and compliance. In a nut-shell, this
workshop shall cover factors to consider for data
protection at the storage level and offers detailed
best practices to:
- Safeguarding
of physical and logical data following SNIA best
practices
- Restore
critical data in the event of a disaster
- Determine
appropriate backup retention periods using DLM and
ILM
- Classify and
archive sensitive data according to regulatory and
policy requirements
- Ensure
securing data to meet appropriate compliance
regulations
In a nut-shell, this
workshop summarizes the techniques used for storage
data protection and business resilience methodologies
to ensure continuity of operations by using backup
recovery tools in the light of DP best practices
recommended by SNIA.
Also understand
how to avoid data corruption due to malware or
ransomware attacks with tape solutions that
physically isolate data from a local area network.
Perform a Cost of Data Breach
assessment to evaluate your current needs, identify
gaps, strengths and weaknesses, and receive
recommendations to build an effective Data
Protection resilience plan.
Furthermore, this
workshop is designed on the basis that you
have got nothing to lose and everything to gain.
TARGETED
AUDIENCE:
This workshop is
equally beneficial for fresh universities graduates
and for those who want to start their career as
technology professional. This workshop is a
prerequsite of the following job roles.
- Want to start
their career as a Storage Solution Architect, Data
Security Design, and Storage Presales
Specialists.
- Want to
develop skills in the space of storage data
protection and business resilience as Technology
Consultants and Systems Integrators.
- Senior IT
Managers and Leaders who want to refresh their
knowledge in the field of storage data protection
technologies.
- Project
Managers and Enterprise Architects.
- Technology
vendors and their Business Partners.
- End-users to
expand their knowledge enabling them to better
communicate with their technology vendors during
presales cycle, preparing RPFs etc.
- Data Center
Operation Managers, System and Storage
Administrators.
- Audit and
Compliance experts.
PREREQUISITES:
Participants should
have basic level of understandings of Information
Technology.
COURSE
OUTLINE
Unit
1: Business Resilience, Data Protection
and Strorage Challenges
- Understanding
new challenges of Digital
Transformation.
- Defining
Strategy and Strategic Planning The
Key Difference.
- What
is Business Resilience and why you need
a BR Strategy?
- Global
barriers to achieving Business
Resilience The Four Domains.
- Understanding
Fault Tolerant and Fault Resilience.
- How
to calculate your IT Operations Uptime?
SLA and OLA.
- Knowing
the Three Categories of Risks.
- Business
Resilience Strategy and ISO 22301.
- Benefits
of a Business Continuity Management
System.
- Nine
step process to implementing a BCMS
based on ISO22301.
- The
impact of Business Resilience and Data
Protection.
- Storage
types/subsystems & knowing Which
storage technology is best?
- Critical
facts about storage that you cannot
ignore.
- Pressure
on IT and senior management teams.
- Reduce
cost, minimize risk and improve
services.
- Employing
a 3-2-1 backup strategy A Backup
recovery strategy.
- Consideration
prior investing in new storage solution.
- Latency
Why it is an important fact to
consider?
- Unit
1 Assessment.
Unit 2:
Information Infrastructure Challenges and
Storage Securities
- Differentiate
between Security & Information
Security.
- Business
and Technology needs and priorities.
- Consequences
of data security breaches.
- Types
of threats to Information Security.
- What
is information infrastructure and its
challenges.
- Information
Infrastructure model.
- Critical
Characteristics of Information.
- Components
of information infrastructure solution.
- Data
protection technologies.
- Data
replication technologies.
- Access
Control Authentication and
Authorization.
- Understanding
Encryption Symmetric and Asymmetric.
- Fabric-based
encryption for data-at-rest.
- About
Self-Encrypting Devices.
- Understand
what is Latency, Storage legacy and
Storage Subsystems.
- Unit
2 Assessment.
|
Unit
3: Storage and Data Management
Methodologies
- Why
Storage Management.
- Removing
the storage silo's.
- The
Data-driven Enterprise and its
Challenges.
- Five
ways to optimize Data strategy.
- Storage
Management Challenges.
- SMI-S
and Benefits.
- Storage
Vs Data Classification.
- Understand
Information Lifecycle Management and
Data Lifecycle Management.
- ILM
Three Storage Strategies.
- Data
Classification details.
- Key
difference between ILM and DLM.
- Importance
of Virtual Tape Library and Data
Protection technologies.
- Data-Debuplication
and its example.
- Unit
3 Assessment
Unit
4: Data Protection Best Practices using
Common Data Protection Technologies
- Data
Protection Overview
- Personal
Data Defined
- Five
phases of the data protection life cycle
- The
two faces of Data Protection
- Data
Protection and Digital Archives
- Drivers
of Data Protection
- Data
Corruption and Data Loss, Data
Protection Algorithms
- Continuous
Data Protection, Replication and
Mirroring
- Data
Protection in the Cloud
- Accessibility
and Availability , Replication
Multi-Site
- Business
Continuity Management
- Basic
Infrastructure Resiliency
- Data
Compliance, Data Retention and
Disposition
- Data
Authenticity, Data Integrity, Data
Confidentiality and Sanitization
- Using
storage backup recovery tools following
SNIA data protection best practices and
knowing their complete set of pros and
cons.
- Data
Monitoring, Auditing and Reporting
- Unit
4 Assessment
|
|
|
|