Cohort · 4 weeks · cohort
Backups That Survive Audits
Restore drills, encryption choices, and documentation peers can verify.
BRL 760 · informational only
Responsible mentor
Carla Menezes
Linux instructor with a background in municipal IT documentation.
Program narrative
You corrupt data on purpose, measure restore times honestly, and build evidence packs. Mentors poke holes in your assumptions about off-site copies.
Included drills
- Restore race exercises
- Encryption at-rest comparisons
- Evidence binder templates
- Tabletop exercises with fictional auditors
- Mentor red-team questions
- Checksum verification habits
- Bandwidth math for rural uplinks
Outcomes we expect you to evidence
- Run a timed restore with witnesses
- List encryption gaps without jargon pile-ons
- Ship an evidence checklist for leadership
FAQ for this track
We discuss rclone patterns conceptually; vendor credits are not included.
Experience notes
“Backups That Survive Audits forced us to time restores with a stopwatch—humbling and useful.”
— Viviane S. , Sysadmin · Trustpilot · 5/5
“Evidence binder template became our internal wiki page verbatim after a few edits.”
— Client in logistics