Course Title : Business Resilience and Data Protection Best Practices 
Course Duration : 2 Day Face-to-Face Classroom and 2 Day Online Intructor Led Workshop
Online workshop is delivered in two days, two units each day between 10:30 am to 1 pm and 3 pm to 5:30 pm
Course Fee : Available upon request (Write to us at
Course Location : TLC (Karachi), Customer On-site and Online
Course Code : TN185
Deliverables : Comprehensive Student Guide and Workshop Certificate
Data protection contains much more than just adopting basic backup and recovery techniques, extending to issues related to data corruption, retention and data loss, data accessibility and availability, data confidentiality and sanitization, and compliance. In a nut-shell, this workshop shall cover factors to consider for data protection at the storage level and offers detailed best practices to:
  • Safeguarding of physical and logical data following SNIA best practices
  • Restore critical data in the event of a disaster
  • Determine appropriate backup retention periods using DLM and ILM
  • Classify and archive sensitive data according to regulatory and policy requirements 
  • Ensure securing data to meet appropriate compliance regulations
In a nut-shell, this workshop summarizes the techniques used for storage data protection and business resilience methodologies to ensure continuity of operations by using backup recovery tools in the light of DP best practices recommended by SNIA. 

Also understand how to avoid data corruption due to malware or ransomware attacks with tape solutions that physically isolate data from a local area network.

Perform a “Cost of Data Breach” assessment to evaluate your current needs, identify gaps, strengths and weaknesses, and receive recommendations to build an effective Data Protection resilience plan.

Furthermore, this workshop  is designed on the basis that you have got nothing to lose and everything to gain.

This workshop is equally beneficial for fresh universities graduates and for those who want to start their career as technology professional. This workshop is a prerequsite of the following job roles.

  • Want to start their career as a Storage Solution Architect, Data Security Design, and Storage Presales Specialists. 
  • Want to develop skills in the space of storage data protection and business resilience as Technology Consultants and Systems Integrators. 
  • Senior IT Managers and Leaders who want to refresh their knowledge in the field of storage data protection technologies. 
  • Project Managers and Enterprise Architects.
  • Technology vendors and their Business Partners. 
  • End-users to expand their knowledge enabling them to better communicate with their technology vendors during presales cycle, preparing RPFs etc. 
  • Data Center Operation Managers, System and Storage Administrators.
  • Audit and Compliance experts.
Participants should have basic level of understandings of Information Technology. 

Unit 1: Business Resilience, Data Protection and Strorage Challenges
  • Understanding new challenges of Digital Transformation.
  • Defining Strategy and Strategic Planning – The Key Difference.
  • What is Business Resilience and why you need a BR Strategy?
  • Global barriers to achieving Business Resilience – The Four Domains.
  • Understanding Fault Tolerant and Fault Resilience.
  • How to calculate your IT Operations Uptime? – SLA and OLA.
  • Knowing the “Three Categories of Risks”.
  • Business Resilience Strategy and ISO 22301.
  • Benefits of a Business Continuity Management System.
  • Nine step process to implementing a BCMS based on ISO22301.
  • The impact of Business Resilience and Data Protection.
  • Storage types/subsystems & knowing Which storage technology is best?
  • Critical facts about storage that you cannot ignore.
  • Pressure on IT and senior management teams.
  • Reduce cost, minimize risk and improve services. 
  • Employing a 3-2-1 backup strategy – A Backup recovery strategy. 
  • Consideration prior investing in new storage solution.
  • Latency – Why it is an important fact to consider?
  • Unit 1 Assessment. 

Unit 2: Information Infrastructure Challenges and Storage Securities
  • Differentiate between Security & Information Security.
  • Business and Technology needs and priorities.
  • Consequences of data security breaches.
  • Types of threats to Information Security.
  • What is information infrastructure and its challenges.
  • Information Infrastructure model.
  • Critical Characteristics of Information.
  • Components of information infrastructure solution.
  • Data protection technologies.
  • Data replication technologies.
  • Access Control – Authentication and Authorization.
  • Understanding Encryption – Symmetric and Asymmetric.
  • Fabric-based encryption for data-at-rest.
  • About Self-Encrypting Devices.
  • Understand what is Latency, Storage legacy and Storage Subsystems.
  • Unit 2 Assessment. 

Unit 3: Storage and Data Management Methodologies
  • Why Storage Management.
  • Removing the storage silo's.
  • The Data-driven Enterprise and its Challenges.
  • Five ways to optimize Data strategy.
  • Storage Management Challenges.
  • SMI-S and Benefits.
  • Storage Vs Data Classification.
  • Understand Information Lifecycle Management and Data Lifecycle Management.
  • ILM – Three Storage Strategies.
  • Data Classification details.
  • Key difference between ILM and DLM.
  • Importance of Virtual Tape Library and Data Protection technologies.
  • Data-Debuplication and its example.
  • Unit 3 Assessment

Unit 4: Data Protection Best Practices using Common Data Protection Technologies

  • Data Protection Overview
  • Personal Data Defined
  • Five phases of the data protection life cycle
  • The two faces of Data Protection
  • Data Protection and Digital Archives
  • Drivers of Data Protection
  • Data Corruption and Data Loss, Data Protection Algorithms
  • Continuous Data Protection, Replication and Mirroring
  • Data Protection in the Cloud
  • Accessibility and Availability , Replication – Multi-Site
  • Business Continuity Management
  • Basic Infrastructure Resiliency
  • Data Compliance, Data Retention and Disposition
  • Data Authenticity, Data Integrity, Data Confidentiality and Sanitization
  • Using storage backup recovery tools following SNIA data protection best practices and knowing their complete set of pros and cons.
  • Data Monitoring, Auditing and Reporting
  • Unit 4 Assessment


Following are the customers who have attended this workshop.


Group Photographs of students attended our Business Resilience & Data Protection Best Practices Workshop


1Link (Guarantee) Ltd, Central Depository Company, GBM Pakistan and 
Lotte Chemical Pakistan has attended a workshop on "Business Resilience 
and Data Protection Best Practices" on January 17, 2018.

Bank AL Habib, English Biscuit Manufacturers, ETSS, Lotte Chemicls Pakistan
and TPS Pakistan has attended a workshop on "Business Resilience and 
Data Protection Best Practices" on  November 28, 2019.

Getz Pharma (Pvt) Ltd, NIFT, IBM Canada, and Byco Petroleum Pakistan has
attended a two day online workshop on "Business Resilience and Data 
Protection Best Practices" on September 23 - 24, 2020.


Habib Bank Ltd and Central Depository Company Pakistan has attended a two-day

online workshop on "Business Resilience and Data Protection Best Practices"
on November 3 - 4, 2021.

List of IBM AIX Operating System 
Standard Courses

AIX 7 Basics

Power Systems for AIX II - AIX Implementation and Administration

Power Systems for AIX III - Advanced Administration and Problem Determination

Introduction to AIX Korn Shell Scripting - AIX 7,1, AIX 6.1, AIX 5.3 and Linux

AIX 7 Jumpstart for UNIX Professionals

Security for Power Systems AIX

IBM POWER Virtualization Technologies

AIX Disk Storage Management and Recovery Procedures

AIX Performance Monitoring and Management

Introduction to IT Infrastructure Technologies

Understanding the Role of Storage Technologies and Big Data

Linux Basics for Users


List of IBM AIX Operating System 
Short-Term Courses

AIX System Configuration Devices & AIX System Storage Overview

AIX Disk Storage Management & Recovery Procedures

AIX Performance Monitoring & Management

Understanding & Managing AIX ODM (Object Data Manager)

Security for Power Systems AIX

AIX Software Installation Maintenance & Backup & Restotore

Working with Logical Volume Manager & File System Administration

AIX Error Monitoring & System Dump Facility and AIX Scheduling

AIX Security & User Administration