Skip navigation

Course Description

AWR-176-W - Disaster Recovery for Information Systems, Web-Based

Verified/Updated 11/13/13

Course Overview
Trains business managers to respond to varying threats that might impact their organization’s access to information. Business Information Continuity provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents
of different types. Topics include an overview of business information continuity, guides for implementing and managing a business information continuity plan, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization.

Course Objectives
At the end of this course, participants will be able to:
  • Describe the difference between Business Continuity and Business Information Continuity
  • The trainee will know the advantages of having business continuity plan and forming team
  • Explain employee buy-in and why it is important to the success of a Business Information Continuity Plan
  • Define the following terms: risk, disaster recovery, mission critical business operation, and threat
  • Define and enumerate assets, identify vulnerabilities and know how to decide control measures
  • Understand with the focus and purpose of a Business Impact Analysis and the steps required to complete a full business impact analysis
  • Explain how to start and maintain a personnel training and awareness program and know acceptable use policies
  • Describe social engineering: typical attacks, brute force, zero-day attacks, and DDOS and defense technologies
  • Explain why separation of duties is advantageous, and know common methods
  • Identify incidents, list details of a recovery process
  • Describe and demonstrate the procedure to analyze recommended changes and reviewing the effectiveness of changes
  • List commercial off-the-shelf software and its advantages and upkeep and tradeoffs with outsourcing security management
  • List some advantages and disadvantages of wireless infrastructure, describe war driving
  • Explain the strengths and weakness of MAC address filtering
  • Explain types of wireless encryption and state which is preferred
  • List authentication schemes, along with their strengths and weaknesses
  • Describe verification and list those who should perform it
  • Describe the operational penalties of non-compliance and potential for fiscal penalties for non-compliance
  • Describe the focus of HIPAA, describe the punishments that exist if HIPAA is not followed correctly, and name the agency that HIPAA charged with keeping records private and confidential
  • Discuss the HIPAA rules that ensure confidentiality, specific corporate scandals that caused Sarbanes-Oxley to be created
  • State the minimum number of years that financial data and information is to be kept private and confidential
  • State the three components of Section 802 of Sarbanes-Oxley, and identify the pertinent details of Section 302 of Sarbanes-Oxley
  • Describe how files can be kept accessible and available and state the purpose of FISMA
  • Describe the "link" and information systems safeguards addressed in OMB Circular A-130
  • Describe the Personal Identity Verification card, as addressed in HSPD-12
  • Describe the various forms in which files can be submitted instead of paper documents, as well as when documents are legally valid if submitted electronically, as specified in the GPEA
  • Describe the responsibility of the Federal Financial Management Improvement Act of 1996 and describe the purpose of FMFIA (1982)
  • Describe the components of the E-Government Act of 2002
  • Summarize the purpose of a business information continuity plan
  • Recite the primary stages of the continuity planning process, list reasons for reviewing the previous continuity plan, and identify the personnel who should be involved in the planning process
  • Determine the types of information assets that should be inventoried, describe risk analysis, list the objectives of developing risk scenarios
  • Identify different methods of testing control effectiveness and describe situations that would dictate changes to the BIC plan
  • Describe the overall structure of an incident response protocol, list the sources of possible incident alerts and list processes involved with containment
  • List the main steps that must be undertaken to resume normal operations
How this course is offered:

This is an internet-based course that can be accessed at

Prerequisites & Other Information:

No tuition is charged.

Course Specifics

Hours: 10.00
Provider: TEEX
Disciplines: Emergency Management
Emergency Medical Service
Fire Service
Government Administration
Health Care
Law Enforcement
Public Health
Public Safety Communications
Public Works

No feedback No feedback has been left for this course.

Available Classes

No classes found.

© 2010-2019 Texas Division of Emergency Management