Solutions Review has compiled the top business continuity courses on LinkedIn Learning for data protection and business continuity architects of all skill levels.
Are you an IT professional looking to brush up on your business continuity skills? Looking to earn some certifications but unsure of where to start prepping for them? Online courses are a great way to gain knowledge in any field of technology, and business continuity is no exception. However, with so many platforms, it can be difficult to narrow down which ones are right for you. To help simplify the search for solid business continuity training, we’ve highlighted these courses on LinkedIn Learning that are essential for any beginner, intermediate, or proficient business continuity professional. Click GO TO TRAINING to learn more and register.
Note: Courses are listed in no particular order.
“Organizations need to ensure that their data stays safe—even when accidents and disasters strike. In this course, learn how to help your organization overcome unexpected or challenging events by implementing an effective business continuity plan using options in Microsoft Azure. Using practical examples, instructor Matt Hester demonstrates how to implement a business continuity and disaster recovery (BCDR) strategy, regardless of whether your infrastructure is on-premises, in the cloud, or a hybrid setup. Matt details how to use Azure Backup Server and Site Recovery to keep data safe and recoverable. Plus, he shows how to configure your systems to remain continuously available during planned or unplanned downtime.”
“Learn about information security and risk management practices needed to complete the first domain of the 2021 Certified Information Systems Security Professional (CISSP) exam. CISSP is the industry’s gold standard certification, necessary for many mid- and senior-level positions. This course includes coverage of key exam topics from the Security and Risk Management domain: security governance, compliance and policy issues, personnel security, threat modeling, and vendor management. Author Mike Chapple also covers the trifecta of information confidentiality, integrity, and availability. He reviews business continuity and risk management strategies, and highlights the importance of ongoing security awareness and education in any organization.”
“Learn how to design a successful strategy around high availability, data archiving, and site recovery solutions in Microsoft Azure. This course can also prepare you for Exam AZ-301: Microsoft Azure Architect Design. Instructor Sharon Bennett covers key considerations around planned and unplanned failover and failback, designing for network redundancy, and identifying requirements for data archiving. Along the way, she covers key processes that can help architects charged with pulling a strategy together and making recommendations to an organization’s stakeholders.”
“Curious about why leaders at your organization decided not to fund your project? In this course, get an inside look at how cybersecurity and information technology (IT) managers use a preliminary risk analysis to determine which projects to pass on and which ones to support with funding. Instructor Jason Dion goes over the terms used by executives and managers when discussing risk management, including what it means to mitigate, transfer, avoid, and accept risk. He also digs into the two methods you can use to calculate risk: qualitative and quantitative risk measurement. To lend these concepts a real-world context, Jason dives into a case study. Upon wrapping up this course, you’ll have the knowledge you need to build a more compelling business case for your projects.”
“Risk management is a key element in any organization’s information security and privacy program. The National Institute of Standards and Technology (NIST) provides a Risk Management Framework (RMF) that outlines a process for effectively managing organizational risk. In this course, learn how to implement the NIST RMF to help your organization categorize and effectively manage your security and privacy program throughout the system management lifecycle. Instructor Ronald Woerner provides an in-depth look at each of the seven steps in the NIST RMF process, covering everything from how to prepare for a risk-based approach to security to how to monitor and assess security controls in a system on an ongoing basis. Along the way, he demonstrates how each step is applied in the real world by providing a case study.”
“A slew of factors are set to change the business landscape over the next few decades. AI, social media, globalization, and other developments have introduced risks that CEOs, business owners, or anyone responsible for business continuity must grapple with. In this course, Dan Weedin shares a practical approach to risk management, helping you think strategically about some of the most pressing risks of the 21st century. Learn how to protect your assets, people, and valuation from risks introduced by globalization and emerging technologies such as autonomous vehicles. Learn how climate change and extreme weather can hurt businesses, explore the issues introduced by cryptocurrency, learn how insurance may change in the future and why it’s important to business leaders, and more.”
“The cloud is a force multiplier for business, allowing companies large and small to scale quickly and efficiently. However, running your workloads in the cloud doesn’t mean they’re immune to disruptions. In the event of a disaster that interrupts services—whether a large-scale event or an incident impacting your business specifically—you need to have a plan in place for minimizing your downtime and the resulting loss of revenue. In this course, instructor David Linthicum reviews best practices and approaches for building a strategy around business continuity (BC) as well as disaster recovery (DR). Examine real-world case studies and explore specific technologies available for BC/DR across Amazon Web Services, Microsoft Azure, and Google Cloud Platform. This practical course helps you identify the requirements specific to your business and translate them into a real-world BC/DR strategy and toolset.”
Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.
Latest posts by Tess Hanna (see all)
- Solutions Review’s Vendors to Know in DRaaS, 2021 - June 24, 2021
- Solutions Review’s Vendors to Know in Backup and Disaster Recovery, 2021 - June 22, 2021
- Cobalt Iron Earns Patent For Authorization Control and Threat Response - June 21, 2021