ATCDR2 - EC Council Certified Disaster Recovery

The Master of Security Science (MSS) is part of a nested suite of programs, which includes EC-Council® Post Graduate Diploma and a Master 's degree with different entry points depending upon previous academic studies. The program is intended both for new graduates and for experienced graduates who wish to update their skills or change their area of specialization. It is concerned with the design, management, and implementation of network security in corporations and public networks, and service provision to public and private networks. The focus of the course is to provide students with an advanced knowledge of Security detailed to give an excellent background for a professional career in industrial or commercial organizations, and in security science. As a result, the course will enable the student to undertake further study leading to the specializations needed for a research career. The MSS course is suitable for students with a wide range of previous security experience.

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »


  • Applicants will be expected to have a degree or equivalent in any discipline. Applicants with at least two years of experience in the IT industry will be given preference.

Detailed Class Syllabus

Module 1: Introduction to Disaster Recovery and Business Continuity

Topic 1.1: Module Objective
Topic 1.2: Module Flow
Topic 1.3: Disaster Recovery & Business Continuity: Terminologies
Topic 1.4: Disaster Types
Topic 1.5: Consequences of Disaster
Topic 1.6: Disaster Recovery & Business Continuity
Topic 1.7: Principles of Disaster Recovery and Business Continuity
Topic 1.8: Disaster Recovery & Business Continuity: Issues Addressed
Topic 1.9: Activities of Disaster Recovery & Business Continuity
Topic 1.10: Disaster Recovery and Business Continuity Program
Topic 1.11: Disaster Recovery & Business Continuity Solutions
Topic 1.12: Best Practices in Disaster Recovery & Business Continuity Program
Topic 1.13: International Strategy for Disaster Reduction (ISDR)
Topic 1.14: International Day for Disaster Reduction
Topic 1.15: News: The Secretary-General Message on the International Day for Disaster Reduction
Topic 1.16: Summary

Module 2: Nature and Causes of Disasters

Topic 2.1: Module Objective
Topic 2.2: Module Flow
Topic 2.3: Nature of Disasters
Topic 2.4: Categorization of Disasters
Topic 2.5: Summary

Module 3: Emergency Management

Topic 3.1: Module Objective
Topic 3.2: Module Flow
Topic 3.3: Emergency
Topic 3.4: Emergency Management
Topic 3.5: Need for Emergency Management
Topic 3.6: Emergency Management Phases
Topic 3.7: Effect of Disaster on Business Organizations
Topic 3.8: FEMA-Federal Emergency Management Agency
Topic 3.9: Summary

Module 4: Laws and Acts

Topic 4.1: Module Objective
Topic 4.2: Module Flow
Topic 4.3: Introduction
Topic 4.4: Applicable Acts in DR
Topic 4.5: Laws and Acts in United States of America
Topic 4.6: Laws and Acts of Europe
Topic 4.7: Dutch Personal Data Protection Act
Topic 4.8: Austrian Federal Act Concern the Protection of Personal Data
Topic 4.9: German Federal Data Protection Act
Topic 4.10: Laws and Acts in Australia
Topic 4.11: Summary

Module 5: Business Continuity Management

Topic 5.1: Module Objective
Topic 5.2: Module Flow
Topic 5.3: Business Continuity Management
Topic 5.4: Business Continuity Planning
Topic 5.5: Business Continuity Management Planning Steps
Topic 5.6: ISO (International Organization for Standardization)
Topic 5.7: Risk Analysis
Topic 5.8: Risk Assessment
Topic 5.9: Business Impact Analysis (BIA)
Topic 5.10: Threat Analysis
Topic 5.11: Crisis Management
Topic 5.12: Contingency Planning
Topic 5.13: Points to Remember in BCM Plan Testing
Topic 5.14: Summary

Module 6: Disaster Recovery Planning Process

Topic 6.1: Module Objective
Topic 6.2: Module Flow
Topic 6.3: Disaster Recovery Planning Process
Topic 6.4: Management Support
Topic 6.5: Summary

Module 7: Risk Management

Topic 7.1: Module Objective
Topic 7.2: Module Flow
Topic 7.3: What is Risk
Topic 7.4: Introduction to Risk Management
Topic 7.5: Functions of Risk Management
Topic 7.6: Analytic Process of Risk Management
Topic 7.7: Project Risk Management
Topic 7.8: IT Security Risk Management
Topic 7.9: Risk Management Standards
Topic 7.10: Financial Risk Management
Topic 7.11: Basel II and Risk Management
Topic 7.12: Quantitative Risk Management
Topic 7.13: Best Practices in Risk Management
Topic 7.14: Summary

Module 8: Facility Protection

Topic 8.1: Module Objective
Topic 8.2: Module Flow
Topic 8.3: Facility Protection
Topic 8.4: Summary

Module 9: Data Recovery

Topic 9.1: Module Objective
Topic 9.2: Module Flow
Topic 9.3: Introduction-Data Recovery
Topic 9.4: Types of Data Recovery
Topic 9.5: Data-to-Disk-to Disaster Recovery (3DR) Concept
Topic 9.6: Steps in Data Recovery
Topic 9.7: Recovery Management
Topic 9.8: Recovery Management Model Layers
Topic 9.9: Data Protection Continuum
Topic 9.10: Do's and Don'ts
Topic 9.11: Lumigent's Log Explorer
Topic 9.12: Best Practices in Data Recovery
Topic 9.13: Summary

Module 10: System Recovery

Topic 10.1: Module Objective
Topic 10.2: Module Flow
Topic 10.3: System Restore in Windows XP
Topic 10.4: Linux System Recovery
Topic 10.5: Macintosh System Recovery
Topic 10.6: Restoring Windows Server 2003
Topic 10.7: Recovering from Boot Problems in Windows 2003
Topic 10.8: Microsoft Windows Recovery Console
Topic 10.9: Automated System Recovery
Topic 10.10: Windows 2000 Backup and Restore Utility
Topic 10.11: Methods for Restoring Replicated Data
Topic 10.12: Restoring Server Services
Topic 10.13: Active Directory Recovery: Non-Authoritative Restore
Topic 10.14: Active Directory Recovery: Authoritative Restore
Topic 10.15: Verifying Active Directory Restoration: Advanced Verification
Topic 10.16: Verifying Active Directory Restoration: Basic Verification
Topic 10.17: Active Directory Recovery on a Computer with a Different Hardware Configuration
Topic 10.18: Sysvol Recovery: Primary Restore
Topic 10.19: Sysvol Recovery: Non-Authoritative Restore
Topic 10.20: Sysvol Recovery: Authoritative Restore
Topic 10.21: Recovery of Global Catalog Server
Topic 10.22: Recovery of an Operations Master
Topic 10.23: Domain Controller Recovery: With a Working Domain Controller
Topic 10.24: Domain Controller Recovery: Without a Working Domain Controller
Topic 10.25: Database Integrity Testing
Topic 10.26: Rights Management Services Restoration
Topic 10.27: Rights Management Services Database Restoration
Topic 10.28: Tools for Active Directory Disaster Recovery: Recovery Manager
Topic 10.29: Restoring IIS Configurations: iisback.vbs
Topic 10.30: Restoring Microsoft IIS Metabase Backup
Topic 10.31: WANSync IIS
Topic 10.32: Restoring Exchange Server 2003
Topic 10.33: Data Recovery Scenarios
Topic 10.34: Exchange Data Recovery Preparation
Topic 10.35: Single Mailbox Recovery
Topic 10.36: Single Item Recovery Using Deleted Items Retention
Topic 10.37: Single Item Recovery Using Third-Party Brick Backup Programs
Topic 10.38: Full Server Recovery: Preparation
Topic 10.39: Exchange Server Backup/Recovery Solution: SonaSafe
Topic 10.40: Recovering Blackberry Enterprise Server
Topic 10.41: IBM WebSphere Application Server Recovery
Topic 10.42: Recovering Coldfusion Application Server: CFMAIL Bug
Topic 10.43: Recovering Coldfusion Application Server: Variable Deadlock
Topic 10.44: Recovering Coldfusion Application Server: ODBC Errors
Topic 10.45: Recovering Coldfusion Application Server: 500 IIS Internal Server Error
Topic 10.46: Recovering Coldfusion Application Server: System Registry Access Problem
Topic 10.47: Recovering from Domino Server Crashes
Topic 10.48: Tool: SteelEye LifeKeeper
Topic 10.49: Restoring MySQL Server
Topic 10.50: Restoring My SQL Server
Topic 10.51: Recovering Cisco IOS
Topic 10.52: Summary

Module 11: Backup and Recovery

Topic 11.1: Module Objective
Topic 11.2: Module Flow
Topic 11.3: Backup
Topic 11.4: Need for Backup
Topic 11.5: Types of Backup
Topic 11.6: Hot Backup
Topic 11.7: Cold Backup
Topic 11.8: Backup Sites
Topic 11.9: Redundant Array of Inexpensive Disks (RAID)
Topic 11.10: Wide Area File Services (WAFS)
Topic 11.11: Backup For UNIX
Topic 11.12: Bare Metal Recovery for Linux
Topic 11.13: Bucky Backup for Mac OS X
Topic 11.14: System Backup Administrator
Topic 11.15: NanoCopy Technology
Topic 11.16: Backup4all
Topic 11.17: ABC Backup Software
Topic 11.18: Genie Backup Manager
Topic 11.19: NTI BackupNow
Topic 11.20: High Availability Disaster Recovery (HADR)
Topic 11.21: Best Practices in Backup & Recovery
Topic 11.22: Summary

Module 12: Centralized and Decentralized System Recovery

Topic 12.1: Module Objective
Topic 12.2: Module Flow
Topic 12.3: Distributed Computing
Topic 12.4: Centralized Backup
Topic 12.5: Tiers of Disaster Recovery
Topic 12.6: GDPS/PPRC
Topic 12.7: Best Practices in Centralized and Decentralized System Recovery
Topic 12.8: Summary

Module 13: System Recovery

Topic 13.1: Module Objective
Topic 13.2: Module Flow
Topic 13.3: Digital Photo Recovery
Topic 13.4: Active@ UNERASER
Topic 13.5: Test Disk
Topic 13.6: PhotoRec
Topic 13.7: BadCopy Photo
Topic 13.8: Directory Snoop
Topic 13.9: Data Advisor
Topic 13.10: Fast File Undelete
Topic 13.11: File Scavenger
Topic 13.12: GetDataBack
Topic 13.13: Kernel Recovery for FAT+NTFS
Topic 13.14: R-Mail
Topic 13.15: R-Studio
Topic 13.16: Recover4all
Topic 13.17: Recovery It All
Topic 13.18: Recovery My Files Data Recovery
Topic 13.19: Quick Recovery for Windows
Topic 13.20: Restorer2000
Topic 13.21: File Recovery
Topic 13.22: EasyRecovery DataRecovery
Topic 13.23: EasyRecovery Professional
Topic 13.24: RecoverSoft Media Tools Professional
Topic 13.25: RecoverSoft Data Rescue PC
Topic 13.26: ADRC Data Recovery Software Tool
Topic 13.27: SalvageRecovery for Windows
Topic 13.28: Disk Doctors Email Recovery
Topic 13.29: Winternals Recovery Manager
Topic 13.30: Summary

Module 14: Linux, Mac, and Novell Netware Data Recovery Tools

Topic 14.1: Module Objective
Topic 14.2: Module Flow
Topic 14.3: Kernel Recovery for Linux
Topic 14.4: Kernel Recovery for ReiserFS
Topic 14.5: Kernel Recovery for JFS
Topic 14.6: Kernel Recovery for Macintosh
Topic 14.7: Kernel Recovery for Novell/Netware
Topic 14.8: Stellar Phoenix Linux
Topic 14.9: R-Linux
Topic 14.10: Quick Recovery for Linux
Topic 14.11: Quick Recovery for Macintosh
Topic 14.12: SalvageRecovery for Linux
Topic 14.13: SalvageRecovery for Mac
Topic 14.14: SalvageRecovery for Netware
Topic 14.15: Disk Doctors Linux Data Recovery Software
Topic 14.16: DiskInternals Linux Reader
Topic 14.17: Summary

Module 15: Incident Response

Topic 15.1: Module Objective
Topic 15.2: Module Flow
Topic 15.3: Incident
Topic 15.4: Category of Incidents
Topic 15.5: How to Identify an Incident
Topic 15.6: How to Prevent an Incident
Topic 15.7: Relationship Between Incident Response, Incident Handling, and Incident Management
Topic 15.8: Incident Management Plan
Topic 15.9: Incident Handling
Topic 15.10: Information Security Life Cycle
Topic 15.11: Incident Response
Topic 15.12: Incident Response Policy
Topic 15.13: Risk Analysis
Topic 15.14: Risk Analysis and Incident Response
Topic 15.15: Incident Response Methodology
Topic 15.16: CERT (Computer Emergency Response Team)
Topic 15.17: CSIRT (Computer Security Incident Response Team)
Topic 15.18: FIRST (Forum of Incident Response and Security Teams)
Topic 15.19: Request Tracker for Incident Response
Topic 15.20: Helix-Incident Response & Computer Forensics Live CD
Topic 15.21: Incident Response Tools Present in Helix CD
Topic 15.23: Resources
Topic 15.24: Summary

Module 16: Role of Public Services in Disaster

Topic 16.1: Module Objective
Topic 16.2: Module Flow
Topic 16.3: Public Services
Topic 16.4: Summary

Module 17: Organizations Providing Services During Disasters

Topic 17.1: Module Objective
Topic 17.2: Module Flow
Topic 17.3: Organizations Providing Services during Disasters
Topic 17.4: Summary

Module 18: Organizations Providing Disaster Recovery Solutions

Topic 18.1: Module Objective
Topic 18.2: Module Flow
Topic 18.3: Kernel Recovery for Linux
Topic 18.4: Kernel Recovery for ReiserFS
Topic 18.5: Kernel Recovery for JFS
Topic 18.6: Kernel Recovery for Macintosh
Topic 18.7: Kernel Recovery for Novell/Netware
Topic 18.8: Stellar Phoenix Linux
Topic 18.9: R-Linux
Topic 18.10: Quick Recovery for Linux
Topic 18.11: Quick Recovery for Macintosh
Topic 18.12: SalvageRecovery for Linux
Topic 18.13: SalvageRecovery for Mac
Topic 18.14: Summary

Module 19: Case Studies