Course Information

Duration

Minimum of 40 Hours

Exam Time

2 Hours Exam

Course Type

Self Paced / Blended / Classroom

Structure

Curriculum

Day 1

  • Business Continuity & Disaster Recovery Awareness Part I - DR00101
  • Business Continuity & Disaster Recovery Awareness Part II - DR00101

Day 2

  • Business Continuity & Disaster Recovery Awareness Part II - DR00101
  • Business Continuity Disaster Recovery Part III - DR00101

Day 3

  • Business Continuity Disaster Recovery Part IV - DR00101
  • Business Continuity Disaster Recovery Part V - DR00101

Day 4

  • Prevention, Detection, and Recovery from Cyberattacks Part I Awareness
  • Prevention, Detection, and Recovery from Cyberattacks Part II CSIRT Formation

Day 5

  • Prevention, Detection, and Recovery from Cyberattacks Part III Cyberattack Prevention
  • Information Technology General Controls (ITGC) Part I
  • Exam

Course Details

Business Continuity & Disaster Recovery Awareness Part I - DR00101


The course includes cybersecurity and privacy knowledge test as users progress through the training. The training is designed to protect and preserve the confidentiality, integrity, and availability of information owned by or in the care of the corporation.


Business Continuity & Disaster Recovery Awareness Part II - DR00101


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Business Continuity & Disaster Recovery Awareness Part II - DR00101


The course provides in-depth knowledge of risk management concepts and fundamentals. The course improves risk awareness, promotes an open risk culture, and inclusion of risk in the decision-making process.Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.


Business Continuity & Disaster Recovery Awareness Part III - DR00103


The course is designed to educate employees to understand how malware can infect your device, how you can avoid malware, and what action you need to take when you get infected by malware.


Business Continuity Disaster Recovery Part IV - DR00101


The course is designed for organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, and highly sensitive and confidential data.


Business Continuity Disaster Recovery Part V - DR00101


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Prevention, Detection, and Recovery from Cyberattacks Part I Awareness


Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore normal operations and services as quickly as possible after an unforeseen event.


Prevention, Detection, and Recovery from Cyberattacks Part II CSIRT Formation


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Prevention, Detection, and Recovery from Cyberattacks Prt III Cyberattack Prevention


This BCP and DR awareness course will provide every employee in the organization with basic knowledge about disasters, risks covered by DR, use cases, challenges, DR plans, etc.


Information Technology General Controls (ITGC) Part I


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Exam


You have total 3 attempts for this exam.

Business Continuity Profesional (CBCP) is the way an organization can prepare for and aid in Disaster Recovery (DR).

BCP and DR are the yin and yang of the IT world. BCP keeps systems running and data available despite interruptions or faults. DR brings systems back to normal operation after a disaster has occurred.

This BCP and DR awareness course will provide every employee in the organization about the basic knowledge about disasters, risks covered by DR, use cases, challenges, DR Plan, etc. The certification course is most important as one of the essentials in ransomware defense and certified staff help the corporations meet various mandates regarding privacy, confidentiality, and availability of systems and data.

The certification course is usefull for those responsible for planning, executing and maintaining IT resilience and Disaster Recovery Plans with the skills and techniques to do their jobs better. This course teaches you how to develop, test, and maintain an information technology (IT) Disaster Recovery Plan for recovering IT and telecommunications systems and infrastructure in the event of a disaster or business disruption.

The course provides a comprehensive, step-by-step. IT Disaster Recovery Plan development methodology, and presents key IT availability planning concepts and principles including those that are continuous and highly available issues. You will learn how to develop Business Continuity and IT Disaster Recovery Plans which comply with industry best practices and standards such as:

  • ISO 22301: Business Continuity Management Systems – Requirements
  • NFPA : Standard on Disaster/Emergency Management and Business Continuity Programs
  • ITIL : Information Technology Infrastructure Library
The course enhances knowledge about privacy data collection, processing and global regulatory impact on disaster recovery.

  • Your job responsibility includes developing comprehensive, effective and reliable business continuity plans. You are responsible for establishing a business continuity program designed to protect organizations from unexpected business disruptions and disasters.
  • The nature of business you are in, needs to comply with internal and external business continuity audit requirements.
  • It is especially useful for Business Continuity and Disaster Recovery Planners, Business Unit Managers, project managers, senior management, and staff from Information Technology, Security, Emergency Response & Crisis Management, Communications, and Human Resource Departments.
  • You are currently studying technical field such as engineering or anything remotely related to technology then you want to expand your cyber knowledge, protect from hacks, investigate hacks, protect from attacks, protect data and learn hands-on skills to apply on the job.
  • You are currently studying non-technical field and you want to learn on how to keep data secure (such as corporate information, bank data, personal data, health data, accounts information) by timely reporting of incidents and early understanding what could be breach.
  • You understand the growing need for cybersecurity professionals and want to become a part of making the computer network a safer space and compliant organization to avoid penalties.
  • You are a tech enthusiast looking to start your career in tech and get your foot in the door in the world of networking and security on a stable, safe, and resilient cyberspace.
Excel Your Career and Contribute to the Organization Growth

  • The course covers most technical aspects that you will need on the job like business continuity and DR drivers, back up, roles, processes, compliance, recovery, frameworks , attack detection, prevention, among others.
  • The foremost challenges facing IT functions about Disaster Recovery. Learn about BCP and DR basics and driving factors.
  • Design, develop, and implement an effective information technology (IT) and telecommunications Disaster Recovery Plan to recover critical IT systems, applications, data, and business processes.
  • How to develop a Disaster Recovery Plan to keep pace with changing technologies, understand the challenges, and DR architecture basics.
  • Learn the best practices and various business continuity standards that details the steps for best business continuity plan.
  • Learn about communication standards and study how to provide information about potential and real incidents relevant to the organization’s business.
  • Study the backup management and method of backup, and how to avoid the pitfalls and take advantage of the latest technologies.
  • Conduct a risk assessment and Business Impact Analysis (BIA) to determine threats, vulnerabilities, impacts of disruption to IT infrastructure and business operations and IT and telecommunications recovery time frames, priorities, and resource requirements.
  • Ensure critical data off-site backup and storage, retrieval, and management requirements are met.
  • Assemble a knowledgeable and effective Disaster Recovery team, and assign appropriate pre-disaster, disaster, and post-disaster tasks and responsibilities. Test and manage changes to the Disaster Recovery Plan.

Various Job Oppoortunites are :


  • Systems Security Analyst
  • IT Analyst
  • Developers
  • Systems Analyst/Managers
  • Architect
  • Cybersecurity Operations Specialist
  • Cybersecurity Consultant/Advisor/
    Analyst
  • Information Assurance Specialist
  • SOC Analyst
  • Incident Response Analyst
  • Network or System Security Administration
  • IT Auditor
  • Vulnerability Assessment Analyst
  • IT Disaster Recovery planners
  • IT Auditing managers and staff
  • IT knowledgeable Risk Managers
  • Information Security managers and staff
  • IT Operations
  • Experienced Business Continuity managers and staff
  • IT Disaster Recovery Team
  • IT Risk Managers
  • Bussiness Continuity Team
  • Information Security Team
  • Change Management Team
  • Patch Management Team

Eligibility :

This program is suitable for anyone with or without prior disaster recovery knowledge or experience. The course gradually progresses from introductory to advanced topics in DR planning and includes a detailed overview of DR plan management.

Take Exam

The candidate is eligible for CSC Council exam if he meets the Eligibility criteria listed below :

  • Applicants who do not attend training must prove 1 year of work experience in the compliance area
  • Applicants who are instructors, trainers, and PhDs shall also be eligible if they meet the above criteria.
  • On the application, there is a section for the applicant to list a boss, supervisor, or department lead who will act as their verifier.
  • If further information is requested from the applicant after the application is submitted and 90 days pass with no response from the applicant, the application will be automatically rejected, and a new form will have to be submitted.
  • If application is not approved, the application fee of USD 100 will not be refunded.
  • If the application is approved, then candidate must take exam in 15 working days

Apply Now

CSC - Certified Business Continuity Profesional (CBCP)

Business Continuity Profesional (CBCP)

The Certificate in Data Privacy Regulations is a training program focused on high impact privacy regulations such as GDPR, CCPA and others.
The course upskill knowledge abuut regulations and its impact on data privacy, risk management, compliance, and privacy data protection.

Material of CBCP

Data privacy focuses on how personal information is collected and used. Information security focuses on keeping all kinds of nonpublic information and systems safe.

The consequences for data breaches, mishandling personal information, and violating data privacy laws are serious and can involve fines, damage to an organization’s reputation, and loss of customer trust.

Price of the Course CBCP

Price: $ 750.00

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

CBCP Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

CSC - Certified Business Continuity Profesional (CBCP)

Business Continuity Profesional (CBCP)

The Certificate in Data Privacy Regulations is a training program focused on high impact privacy regulations such as GDPR, CCPA and others.
The course upskill knowledge abuut regulations and its impact on data privacy, risk management, compliance, and privacy data protection.

Material of CBCP

Data privacy focuses on how personal information is collected and used. Information security focuses on keeping all kinds of nonpublic information and systems safe.

The consequences for data breaches, mishandling personal information, and violating data privacy laws are serious and can involve fines, damage to an organization’s reputation, and loss of customer trust.

Price of the Blended Course CBCP

Price: $ 900.00


The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

CBCP Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.


Contact Us for Classroom Course Schedule

Disclaimer

CSC-Council reserves the right to impose additional restriction to comply with the policy.

Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council.

CSC-Council reserves the right to revoke the certification of any person in breach of this requirement.