Resilience and Data Protection Best
||: 2 Day
Face-to-Face Classroom and 2 Day Online
Intructor Led Workshop
workshop is delivered in two days, two units
each day between 10:30 am to 1 pm and 3 pm to
upon request (Write to us at firstname.lastname@example.org)
(Karachi), Customer On-site and Online
Comprehensive Student Guide and Workshop
contains much more than just adopting basic backup and
recovery techniques, extending to issues related to
data corruption, retention and data loss, data
accessibility and availability, data confidentiality
and sanitization, and compliance. In a nut-shell, this
workshop shall cover factors to consider for data
protection at the storage level and offers detailed
best practices to:
In a nut-shell, this
workshop summarizes the techniques used for storage
data protection and business resilience methodologies
to ensure continuity of operations by using backup
recovery tools in the light of DP best practices
recommended by SNIA.
of physical and logical data following SNIA best
critical data in the event of a disaster
appropriate backup retention periods using DLM and
- Classify and
archive sensitive data according to regulatory and
securing data to meet appropriate compliance
how to avoid data corruption due to malware or
ransomware attacks with tape solutions that
physically isolate data from a local area network.
Perform a Cost of Data Breach
assessment to evaluate your current needs, identify
gaps, strengths and weaknesses, and receive
recommendations to build an effective Data
Protection resilience plan.
workshop is designed on the basis that you
have got nothing to lose and everything to gain.
This workshop is
equally beneficial for fresh universities graduates
and for those who want to start their career as
technology professional. This workshop is a
prerequsite of the following job roles.
- Want to start
their career as a Storage Solution Architect, Data
Security Design, and Storage Presales
- Want to
develop skills in the space of storage data
protection and business resilience as Technology
Consultants and Systems Integrators.
- Senior IT
Managers and Leaders who want to refresh their
knowledge in the field of storage data protection
Managers and Enterprise Architects.
vendors and their Business Partners.
- End-users to
expand their knowledge enabling them to better
communicate with their technology vendors during
presales cycle, preparing RPFs etc.
- Data Center
Operation Managers, System and Storage
- Audit and
have basic level of understandings of Information
1: Business Resilience, Data Protection
and Strorage Challenges
Information Infrastructure Challenges and
new challenges of Digital
Strategy and Strategic Planning The
is Business Resilience and why you need
a BR Strategy?
barriers to achieving Business
Resilience The Four Domains.
Fault Tolerant and Fault Resilience.
to calculate your IT Operations Uptime?
SLA and OLA.
the Three Categories of Risks.
Resilience Strategy and ISO 22301.
of a Business Continuity Management
step process to implementing a BCMS
based on ISO22301.
impact of Business Resilience and Data
types/subsystems & knowing Which
storage technology is best?
facts about storage that you cannot
on IT and senior management teams.
cost, minimize risk and improve
a 3-2-1 backup strategy A Backup
prior investing in new storage solution.
Why it is an important fact to
between Security & Information
and Technology needs and priorities.
of data security breaches.
of threats to Information Security.
is information infrastructure and its
Characteristics of Information.
of information infrastructure solution.
Control Authentication and
Encryption Symmetric and Asymmetric.
encryption for data-at-rest.
what is Latency, Storage legacy and
3: Storage and Data Management
the storage silo's.
Data-driven Enterprise and its
ways to optimize Data strategy.
Vs Data Classification.
Information Lifecycle Management and
Data Lifecycle Management.
Three Storage Strategies.
difference between ILM and DLM.
of Virtual Tape Library and Data
and its example.
4: Data Protection Best Practices using
Common Data Protection Technologies
phases of the data protection life cycle
two faces of Data Protection
Protection and Digital Archives
of Data Protection
Corruption and Data Loss, Data
Data Protection, Replication and
Protection in the Cloud
and Availability , Replication
Compliance, Data Retention and
Authenticity, Data Integrity, Data
Confidentiality and Sanitization
storage backup recovery tools following
SNIA data protection best practices and
knowing their complete set of pros and
Monitoring, Auditing and Reporting