EC-Council Disaster Recovery Professional Exam Information

EDRP (312-76) Exam


IT Disaster Recovery Certification Information
Credit Towards Certification

EC-Council Disaster Recovery Professional (EDRP)

Exam Details

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice
  • Test Delivery: Prometric Prime
  • Exam Cost: USD 250


EDRP (312-76) Exam



Disaster Recovery and Business Continuity

  • Introduction to Disaster Recovery and Business Continuity
  • Disaster Recovery & Business Continuity: Terminologies
  • Disaster Types
  • Consequences of Disaster
  • Disaster Recovery & Business Continuity
  • Principles of Disaster Recovery and Business Continuity
  • Disaster Recovery & Business Continuity: Issues Addressed
  • Activities of Disaster Recovery & Business Continuity
  • Disaster Recovery and Business Continuity Program
  • Disaster Recovery & Business Continuity Solutions
  • Best Practices in Disaster Recovery & Business Continuity Program
  • International Strategy for Disaster Reduction (ISDR)
  • International Day for Disaster Reduction






























Nature and Causes of Disasters

  • Nature of Disasters
  • Categorization of Disasters
  • Natural Disasters
  • Earthquakes
  • Protecting Yourself During Earthquake
  • Earthquakes: Volcanoes
  • Protection from Volcanoes
  • Forecasting Volcanoes
  • Estimating Earthquakes
  • Earthquakes: Tsunami
  • Protecting Yourself During Tsunami
  • Landslides
  • Effects of Landslides
  • Protecting Yourself from Landslides
  • Hurricanes
  • Safety Measures During Hurricanes
  • Predicting Hurricanes
  • Floods
  • Effect of floods
  • Prevention Measures
  • Wildfires
  • Safety Measures
  • Drought
  • Consequences of Drought
  • Measures to Overcome Drought Effects
  • Man-Made Disasters
  • Accidents
  • Power Outage
  • Telecommunication Outage
  • Categorization of Human Intentional Disasters
  • Arson
  • Civil Disorder
  • Terrorism
  • War
  • Chemical Biological Radiological Nuclear (CBRN)

Emergency Management

  • Emergency
  • Emergency Management
  • Need for Emergency Management
  • Emergency Management Phases
  • Mitigation
  • Preparedness
  • Response
  • Recovery
  • Effect of Disaster on Business Organizations
  • Emergency Management for Business Organizations
  • FEMA- Federal Emergency Management Agency
  • FEMA as an Organization
  • Activities of FEMA


































Laws and Acts

  • Applicable Acts in DR
  • Laws and Acts in United States of America
  • Industries: Sarbanes-Oxley Act
  • Foreign Corrupt Practices Act (FCPA)
  • Healthcare: HIPAA Regulations
  • Financial Institutions: Gramm-Leach-Bliley Act
  • Flood Disaster Protection Act of 1973
  • Robert T. Stafford Disaster Relief and Emergency Assistance Act
  • XCAN-SPAM Act of 2003
  • Federal Financial Institutions Examinations Council (FFIEC)
  • Personal Information Protection and Electronic Documents Act (PIPEDA)
  • Laws and Acts of Europe
  • Data Protection Act 1998
  • Transmission of Personal Data: Directive 2002/58/EC
  • Personal Data: Directive 95/46/EC
  • Insurance: Financial Groups Directive (FGD)
  • The Foundation of Personal Data Security Law: OECD Principles
  • Dutch Personal Data Protection Act
  • Austrian Federal Act concerning the Protection of Personal Data
  • German Federal Data Protection Act
  • Laws and Acts in Australia
  • Health Records and Information Privacy Act (HRIP)
  • Financial Transactions Reporting (FTR) Act 1988

















Business Continuity Management

  • Business Continuity Management
  • Business Continuity Planning
  • Objectives of Business Continuity Planning
  • Essential Resources in Business Continuity Planning
  • Business Continuity Management Planning Steps
  • ISO (International Organization for Standardization)
  • Overview of BS 7799 / ISO 17799
  • ISO/IEC 17799:2005
  • ISO/IEC 17799:2005: Business Continuity Management
  • Risk Analysis
  • Risk Assessment
  • Basic Elements of Risk Assessment
  • Business Impact Analysis (BIA)
  • Components of Business Impact Analysis
  • Threat Analysis
  • Risk Analysis and Business Impact Analysis
  • Crisis Management
  • Steps in Crisis Management
  • Crisis Management Phases
  • Compliance
  • Preparedness
  • Training and Resource Development
  • Contingency Planning
  • Points to remember in BCM Plan Testing
  • Birmingham City Council’s BCM Assessment Template
  • Greenwich Council – Emergency and BCM Plan











Disaster Recovery Planning Process

  • Disaster Recovery Planning Process
  • Management Support
  • Organizing DR Team
  • Components of Disaster Recovery Team
  • Disaster Recovery Planning Team
  • Building a Planning Team
  • Establishing Team at the Departmental Level
  • Risk Assessment
  • Risk Assessment
  • Conduct Business Impact Analysis
  • Critical Business Activities
  • Analysis Sheet
  • Example: Analysis Sheet for IT System
  • Roles and Responsibilities
  • Individual: Leader
  • Individual: Disaster Recovery Coordinator
  • Individual: IT Administrator
  • Individual: Network Manager
  • Individual: Disaster Recovery Manager
  • Individual: DR Team Member
  • Team: Administration Team
  • Team: Technical Team
  • Team: Damage Evaluation and Salvage Team
  • Team: Physical Security Team
  • Team: Communications Team













Responsibilities Common to all Disaster Recovery Teams

  • Developing Charts of Responsibilities
  • Facility Disaster Recovery Chart of Responsibilities
  • Department Disaster Recovery Chart of Responsibilities
  • Business Process Disaster Recovery Chart of Responsibilities
  • Developing Policies and Procedures
  • Assumptions for DR Planning
  • Need for Disaster Recovery Planning
  • Disaster Recovery Plan Development
  • Disaster Recovery & Management: Budgeting
  • Centralized Office of DR Planning: Budget
  • Safety and Health Procedures
  • Procedures for Internal and External Communications
  • Procedures for Containment and Property Protection
  • Procedures for Recovering and Resuming Operations
  • Assessing Insurance Requirements & Coverage Needs
  • Need for Insurance
  • Evaluating Insurance Policies
  • Testing and Training
  • DRP Testing and Rehearsal Process
  • DRP Testing: Advantages
  • DRP Testing: Methods
  • DRP Testing Steps
  • DRP Testing Flow Chart
  • Training DR Teams
  • Commence Training Program for Disaster Recovery
  • Training for Executives
  • Training for Middle Managers
  • Training for Supervisors
  • Training for Disaster Response Teams
  • Training for Employees
  • Documentation of DR Procedures
  • Need for Documentation of Plans
  • Important Documentations in Disaster Recovery Process
  • Writing Disaster Recovery Plan
  • Best Practices for Documentation
  • Managing Records
  • DRP Maintenance
  • Monitoring Process
  • Monitoring Procedures
  • Evaluate Latest Technologies
  • Conducting Regular Reviews
  • Conducting Training Programs for Updated Plan
  • DRP Implementation
  • DR Plan Implementation
  • Internal and External Awareness Campaigns

Risk Management

  • What is Risk
  • Introduction to Risk Management
  • Functions of Risk Management
  • Analytic Process of Risk Management
  • Risk Analysis
  • Risk Reduction Analysis
  • Management Decision
  • Risk Reduction Planning
  • Reviews and Audit
  • Project Risk Management
  • IT Security Risk Management
  • Risk Management Standards
  • Financial Risk Management
  • Basel II and Risk Management
  • Pillar I: Minimum Capital Requirement
  • Pillar II: Supervisory Review Process
  • Pillar III: Market Discipline
  • Quantitative Risk Management
  • Best Practices in Risk Management
























Facility Protection

  • Facility Protection
  • Water Supply
  • Protecting Water Supply
  • Fire
  • Types of Fire Extinguishers
  • APW Extinguishers
  • Dry Chemical Extinguisher
  • Carbon Dioxide Extinguishers
  • Points to Remember
  • Using a Fire Extinguisher
  • Fire Suppression for Companies
  • Fire exits
  • Power Supply
  • Common Power Supply Problems
  • Ensuring Steady Power Supply
  • Ventilation
  • Kinds of Ventilation
  • Measures for Proper Ventilation
  • Air Conditioners
  • Measures for Proper Working of Air Conditioners
  • Building and Premises
  • Checklist for Securing Facility



















Data Recovery

  • Types of Data Recovery
  • Logical Data Recovery
  • Physical Data Recovery
  • Disk-to-Disk-to Disaster Recovery (3DR) Concept
  • Steps in Data Recovery
  • Recovery Management
  • Recovery Management Evaluation Metrics
  • Recovery Time Objective (RTO)
  • Role of RTO in Disaster recovery
  • Recovery Point Objective (RPO)
  • Network Recovery Objective (NRO)
  • Recovery Management Model Layers
  • Data Protection Continuum
  • Do’s and Don'ts
  • Lumigent's Log Explorer
  • Best Practices in Data Recovery





























System Recovery

  • System Restore in Windows XP
  • Linux System Recovery
  • Linux System Crash Recovery
  • Crash Recovery Kit for Linux
  • Mac System Recovery
  • Restoring Windows Server 2003
  • Recovering from Boot problems in Windows Server 2003
  • Step 1: Start computer by using Last Known Good Configuration
  • Step 2: Starting computer in Safe Mode
  • Step 3: Use Event Viewer to Identify the Cause of the Startup Problem
  • Step 4: Use System Information to Identify the Cause of the Startup Problem
  • Step 5: The Safe Mode Boot Log File
  • Step 6: Use Device Manager to Identify the Cause of the Startup Problem
  • Step 7: Use System Configuration Utility
  • Microsoft Windows Recovery Console
  • Automated System Recovery
  • Windows 2000 Backup and Restore Utility
  • Methods for Restoring Replicated Data
  • Restoring Server Services
  • Active Directory Recovery: Non-Authoritative Restore
  • Active Directory Recovery: Authoritative Restore
  • Verifying Active Directory Restoration: Advanced Verification
  • Verifying Active Directory Restoration: Basic Verification
  • Active Directory Recovery on a Computer with a Different Hardware Configuration
  • Sysvol Recovery: Primary Restore
  • Sysvol Recovery: Non-authoritative Restore
  • Sysvol Recovery: Authoritative Restore
  • Recovery of Global Catalog Server
  • Recovery of  an Operations Master
  • Domain Controller Recovery: With a Working Domain Controller
  • Domain Controller Recovery: Without a Working Domain Controller
  • Database Integrity Testing
  • Rights Management Services Restoration
  • Rights Management Services Database Restoration
  • Tools for Active Directory Disaster Recovery: Recovery Manager
  • Restoring IIS Configurations: iisback.vbs
  • Restoring Microsoft IIS Metabase Backup
  • WANSync IIS
  • WANSync IIS: Working
  • Restoring Exchange Server 2003
  • Data Recovery Scenarios
  • Exchange Data Recovery Preparation
  • Single Mailbox Recovery
  • Single Item Recovery using Deleted Items Retention
  • Single Item Recovery using Third-party Brick Backup Programs
  • Full-Server Recovery: Preparation
  • Full-Server Recovery: Option 1
  • Full-Server Recovery: Option 2
  • Full-Server Recovery: Option 3
  • Full-Server Recovery: Option 4
  • Exchange Server Backup/Recovery Solution: SonaSafe
  • Recovering Blackberry Enterprise Server
  • IBM WebSphere Application Server Recovery
  • Recovering Coldfusion Application Server: CFMAIL Bug
  • Recovering Coldfusion Application Server: Variable Deadlocks
  • Recovering Coldfusion Application Server: ODBC Errors
  • Recovering Coldfusion Application Server:500 IIS Internal Server Error
  • Recovering Coldfusion Application Server: System Registry Access Problem
  • Recovering from Domino Server Crashes
  • Tool: SteelEye LifeKeeper
  • Restoring MySQL Server
  • Restoring MS SQL Server: Option 1
  • Restoring MS SQL Server: Option 2
  • Restoring MS SQL Server: Option 3
  • Restoring MS SQL Server: Option 4
  • Restoring MS SQL Server: Option 5
  • Restoring MS SQL Server: Option 6
  • Restoring MS SQL Server: Option 7
  • Restoring MS SQL Server: Option 8
  • Restoring My SQL Server
  • Recovering Cisco IOS

Backup and Recovery

  • Backup
  • Need for Backup
  • Types of Backup:
  • Full Backup
  • Incremental Backup
  • Differential Backup
  • Hot Backup
  • Hot Backup Sample Code
  • Cold Backup
  • Cold Backup Sample Code
  • Backup Sites
  • Hot Site/ Cold Site
  • Redundant Array of Inexpensive Disks (RAID)
  • RAID: Some Important Levels
  • Wide Area File Services (WAFS)
  • Backup for UNIX
  • Bare Metal Recovery for LINUX
  • Bucky Backup for Mac OS X
  • System Backup Administrator
  • NanoCopy Technology
  • Backup4all
  • Backup4all Features
  • ABC Backup Software
  • Genie Backup Manager
  • NTI BackupNow
  • High Availability Disaster Recovery (HADR)
  • Best Practices in Backup & Recovery











Centralized and Decentralized System Recovery

  • Distributed Computing
  • Objectives of Distributed Computing
  • Architecture for Distributed Computing
  • Working of Distributed Computing
  • Centralized Backup
  • Centralized Backup Using SAN or NAS Server
  • Data Consolidation
  • Cross-Platform Data Consolidation
  • Mainframe as Centralized Storage Source
  • Tiers of Disaster Recovery
  • GDPS/PPRC
  • GDPS/PPRC Configuration
  • GDPS/PPRC Single-site Workload Configuration
  • GDPS/PPRC Multi-site Workload Configuration
  • Best Practices in Centralized and Decentralized System Recovery





























Windows Data Recovery Tools

  • Digital Photo Recovery
  • Active@ UNERASER
  • Test Disk
  • PhotoRec
  • BadCopy Pro
  • Directory Snoop
  • Data Advisor
  • Fast File Undelete
  • File Scavenger
  • GetDataBack
  • Kernel Recovery for FAT+NTFS
  • R-Mail
  • R-Studio
  • Recover4all
  • Recover It All
  • Recover My Files Data Recovery
  • Quick Recovery for Windows
  • Restorer2000
  • File Recovery
  • EasyRecovery DataRecovery
  • EasyRecovery Professional
  • RecoverSoft Media Tools Professional
  • RecoverSoft Data Rescue PC
  • ADRC Data Recovery Software Tool
  • SalvageRecovery for Windows
  • Disk Doctors Email Recovery
  • Winternals Recovery Manager











Linux, Mac and Novell Netware Data Recovery Tools

  • Kernel Recovery for Linux
  • Kernel Recovery for ReiserFS
  • Kernel Recovery for JFS
  • Kernel Recovery for Macintosh
  • Kernel Recovery for Novell-Netware
  • Stellar Phoenix Linux
  • R-Linux
  • Quick Recovery for Linux
  • Quick Recovery for Macintosh
  • SalvageRecovery for Linux
  • SalvageRecovery for Mac
  • SalvageRecovery for Netware
  • Disk Doctors Linux Data Recovery Software
  • DiskInternals Linux Reader































Incident Response

  • Incident
  • Category of Incidents
  • Low Level
  • Mid Level
  • High Level
  • How to Identify an Incident?
  • How to Prevent an Incident?
  • Relationship between Incident Response, Incident Handling, and Incident Management
  • Incident Management Plan
  • Incident Handling
  • Information Security Life Cycle
  • Incident Response
  • Incident Response Policy
  • Risk Analysis
  • Risk Analysis and Incident Response
  • Incident Response Methodology
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Follow up
  • CERT (Computer Emergency Response Team)
  • CSIRT (Computer Security Incident Response Team)
  • General Categories of CSIRTs
  • Members of CSIRT Team
  • Building an Effective CSIRT
  • FIRST (Forum of Incident Response and Security Teams)
  • Request Tracker for Incident Response
  • Helix – Incident Response & Computer Forensics Live CD
  • Incident Response Tools Present in Helix CD
  • THE FARMER'S BOOT CD
  • Resources

Role of Public Services in Disaster

  • Public Services
  • State and Local Governments
  • Public Utilities and Departments
  • Hospitals
  • Blood Banks
  • Medical Laboratories
  • Food Banks
  • Fire Fighting Service
  • Waste/ Debris Management
  • Police
  • Armed Forces
  • Public Transportation
  • Water Supply System
  • Electricity Department
  • Information & Public Relations Department
  • IT Service Providers





























Organizations Providing Services during Disasters

  • Organizations Providing Services during Disasters
  • Relief Organizations
  • International Committee of the Red Cross (ICRC)
  • International Federation of Red Cross and Red Crescent Societies (IFRC)
  • United Nations Children's Fund (UNICEF)
  • National Emergency Response Team (NERT)
  • CARE
  • Ananda Marga Universal Relief Team (AMURT)
  • Action Against Hunger (AAH)
  • Emergency Nutrition Network (ENN)
  • Doctors Without Borders
  • Hunger Plus, Inc.
  • InterAction
  • International Rescue Committee (IRC)
  • Mennonite Central Committee (MCC)
  • Mercy Corps (MC)
  • Refugees International
  • Relief International
  • Save the Children
  • Project HOPE





















Organizations Providing Disaster Recovery Solutions


  • Organizations Providing Disaster Recovery Solutions
  • Symantec
  • System Sizing
  • System Sizing: Practices
  • Disk-based Backup
  • Manual System Recovery
  • Disadvantages
  • Automated System Recovery
  • IBM
  • Human Capital Resilience
  • Human Capital Risks in Crisis Situations
  • Business Resilience
  • Elements of Business Resilience
  • Framework for Business Resilience
  • Causes of E-Mail Outages
  • E-Mail Continuity
  • DELL
  • Oracle Data Guard Utility
  • RMAN Utility for Database Backup
  • NAS (Network Attached Storage)
  • Sun Microsystems
  • Integrated Solutions of Sun and Vignette
  • Sun Cluster Geographic Edition
  • Infosys Business Continuity Planning Solution
  • Infosys BCP solution
  • Sybase Business Continuity Planning Solution
  • Sybase Model
  • HP Business Continuity and Availability solutions
  • HP 3-tiered Service Levels Balance Investment with Risk
  • PricewaterhouseCoopers Fast Track BCP
  • AT&T's Business Continuity and Disaster Recovery