Disaster Recovery Professional | EDRP

Disaster Recovery Professional | EDRP

EC Council Disaster Recovery Professional (EDRP) is a compressive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans.

It teaches professionals various methods of identifying vulnerabilities and taking countermeasures against the said vulnerabilities. The professionals will learn how to secure their data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster.

EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan.

Meet your Instructor:

iLabs Demo:


  • The program is developed after a thorough job task analysis and market research.
  • It is designed and developed by experienced SMEs and business continuity/ disaster recovery experts
  • A complete vendor neutral course covering business continuity/ disaster recovery techniques and solutions
  • Detailed labs for hands-on learning experience
  • EDRP covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, ISO 22301, ISO 22313, NFPA 1600, ISO/ IEC 27005, ISO 31000, ISO 31010, INCITS 483-2012, and the NICE Framework
  • The student kit contains large number of white papers for additional reading
  • The course includes case studies for better explanation of concepts
  • The program includes templates so that the students get a practical idea on how to perform the various analyses and assessments
  • The program comes with cloud-based virtual labs enabling students to practice various business continuity/ disaster recovery techniques in a real time and simulated environment


The EDRP course will give participants the necessary skills to develop enterprise-wide business continuity and disaster recovery plans
Prerequisites: Min 2 yrs experience in the BC/DR domain
Duration: 5 days (40 hours)

Course Outline

  • Introduction to  Disaster Recovery and Business Continuity
  • Business Continuity Management
  • Risk Assessment
  • Business Impact Analysis
  • Business Continuity Plan
  • Data Backup
  • Data Recovery Strategies
  • Virtualization Bases Disaster Recovery
  • System Recovery
  • Centralized and Decentralized Computing
  • Disaster Recovery Planning Process
  • BCP Testing, Maintenance, and Training

What You will Learn

  • Design a BCM framework
  • Create a risk assessment report
  • Create a BIA report
  • Create a business continuity strategy
  • Apply the concept of Disk-to-Disk-to-Disaster Recovery (3DR)
  • Implement the various infrastructure technologies used in data recovery
  • Apply virtualization in disaster recovery
  • Implement the various virtualization techniques
  • Create a backup of virtual machines running on VMware and Hyper-V
  • Implement system recovery in several operating systems (Windows 10, Linux, and Mac)
  • Demonstrate the recovery of various servers running on different OSs
  • Apply centralized and decentralized computing architecture
  • Implement PASIS architecture
  • Implement key disaster recovery documentation activities
  • Execute disaster recovery testing
  • Implement the various BCP testing methods
  • Implement BCP training

About the Exam

Number of Questions: 150

Required Passing Score: 70%

Test Duration: 4 Hours

Test Format: Multiple Choice

Test Delivery: ECC Exam Portal

Add the Mobile Security Tool Kit to Your Training

For the past several years we have offered our training on a mobile device so that you can take your training with you and eliminate the need to stream the videos. This device is the next generation mobile device. This is a fully loaded pen test tool kit comes equipped with a custom Linux Hacking OS and, wait for it… we can load your course (or 2) onto the device. In the sage words of Ray Bradbury, “Something Wicked This Way Comes.”

Terms of Use

Getting Started

Terms of Use

Note: The STORM mobile security tool kit contains the STORM Linux (a Raspbian based, customized distro of Linux) including all of the associated security tools. These tools are very powerful and all proper precautions should be adhered to at all times.

Always remember that the difference between illegal and ethical hacking comes down to one word; permission. It is illegal to utilize these or any other pen testing tools on a network or website without permission.

As stated in the terms and conditions, EC-Council is not responsible for illegal use of these tools and you accept the full liability for its usage. The entire code of ethics can be found here.


  • Broadcom BCM2837B0, Cortex-A53 (ARMv8) 64-bit SoC @ 1.4GHz Mobile System with Case
  • 7 inch Touch Screen Display
  • 2.4GHz and 5GHz IEEE 802.11.b/g/n/ac wireless LAN, Bluetooth 4.2, BLE
  • Gigabit Ethernet over USB 2.0 (maximum throughput 300 Mbps)
  • Extended 40-pin GPIO header
  • Full-size HDMI
  • 4 USB 2.0 ports
  • CSI camera port for connecting a Raspberry Pi camera

  • DSI display port for connecting a Raspberry Pi touchscreen display
  • 4-pole stereo output and composite video port
  • Micro SD port for loading your operating system and storing data, with Hacker StormOS, Raspbian-based OS included.
  • 5V/2.5A DC power input
  • USB 2.0 A to B Micro Power Cable. [The Storm can be powered from a 5V micro-USB source, Power Supply not included with base package.]
  • Power-over-Ethernet (PoE) support (requires separate PoE HAT)
  • Rollup Water Resistant Keyboard
  • Field Case Organizer for all your gear

Introducing the STORM!

Hack like the Pros

Take Your Hacking by STORM!

Still have questions?

1-888-330-HACK Mon – Fri / 8:00 AM – 5:00 PM