CompTIA Security+ 2011: BC, DR, Security Training, and Forensics

Target Audience
Expected Duration
Lesson Objectives
Course Number

Business continuity, disaster recovery, and computer forensics go hand in hand when a security professional trains on ways to create, maintain, and repair network security. This course examines business continuity plans along with risk assessment techniques and the strategies used when creating a risk management process. This course also examines security training for end users and the methodologies and tools used when performing computer forensics. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target Audience
Individuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Expected Duration (hours)

Lesson Objectives

CompTIA Security+ 2011: BC, DR, Security Training, and Forensics

  • identify activities that occur during the project initiation phase of business continuity planning
  • perform a business impact analysis on given business functions
  • recognize key considerations when conducting a business impact analysis
  • identify best practices for user habits
  • identify the best practices for data handling
  • distinguish between the results of qualitative and quantitative risk assessments
  • match stages of the risk assessment process with corresponding descriptions
  • label examples of actions taken by a company in response to a risk as either avoidance, transfer, mitigation, or acceptance
  • identify key considerations for fault tolerance
  • describe key considerations for the various backup methods
  • describe the ways in which you can verify backups
  • recognize how to mitigate IT-related risk for an organization
  • recognize how to manage IT-related risk through incident response and computer forensics
  • recognize how to implement incident response and computer forensics
  • Course Number: