Home / courses / Backups That Survive Audits
BR · BRL

Cohort · 4 weeks · cohort

Backups That Survive Audits

Restore drills, encryption choices, and documentation peers can verify.

BRL 760 · informational only

Backups That Survive Audits

Responsible mentor

Carla Menezes

Carla Menezes

Linux instructor with a background in municipal IT documentation.

Program narrative

You corrupt data on purpose, measure restore times honestly, and build evidence packs. Mentors poke holes in your assumptions about off-site copies.

Included drills

  • Restore race exercises
  • Encryption at-rest comparisons
  • Evidence binder templates
  • Tabletop exercises with fictional auditors
  • Mentor red-team questions
  • Checksum verification habits
  • Bandwidth math for rural uplinks

Outcomes we expect you to evidence

  1. Run a timed restore with witnesses
  2. List encryption gaps without jargon pile-ons
  3. Ship an evidence checklist for leadership

FAQ for this track

We discuss rclone patterns conceptually; vendor credits are not included.

Experience notes

“Backups That Survive Audits forced us to time restores with a stopwatch—humbling and useful.”

— Viviane S. , Sysadmin · Trustpilot · 5/5

“Evidence binder template became our internal wiki page verbatim after a few edits.”

— Client in logistics

Request enrollment details