CompTIA Security+ 2011: BC, DR, Security Training, and Forensics

This course is included in our On-demand training solution.


Business continuity, disaster recovery, and computer forensics go hand in hand when a security professional trains on ways to create, maintain, and repair network security. This course examines business continuity plans along with risk assessment techniques and the strategies used when creating a risk management process. This course also examines security training for end users and the methodologies and tools used when performing computer forensics. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target Audience

Individuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.


Expected Duration

120 min.

Course Objectives

Business Continuity

  • identify activities that occur during the project initiation phase of business continuity planning
  • perform a business impact analysis on given business functions
  • recognize key considerations when conducting a business impact analysis
  • Security Training for End Users

  • identify best practices for user habits
  • identify the best practices for data handling
  • Risk Assessment and Management

  • distinguish between the results of qualitative and quantitative risk assessments
  • match stages of the risk assessment process with corresponding descriptions
  • label examples of actions taken by a company in response to a risk as either avoidance, transfer, mitigation, or acceptance
  • Disaster Recovery Planning and Implementation

  • identify key considerations for fault tolerance
  • describe key considerations for the various backup methods
  • describe the ways in which you can verify backups
  • Continuity Planning and Disaster Recovery

    Incident Response and Computer Forensics

  • recognize how to manage IT-related risk through incident response and computer forensics
  • Forensics and Security Training