Decide whether the issue is data loss, service loss, boot failure, or misconfiguration.
Backup, Restore, and Recovery Decision Flow
Understand when to inspect, restore, repair, or roll back instead of jumping straight to the biggest recovery action.
Backup, Restore, and Recovery Decision Flow
Recovery work becomes dangerous when people skip evidence collection and jump straight to restore or rollback. This visual keeps recovery decisions disciplined.
Logs, timestamps, and affected systems define the real recovery need.
Repair, rollback, restore, or rebuild based on impact and confidence.
Apply the chosen recovery action with rollback awareness and the right source data.
Confirm the real workload and data are healthy after recovery.
- Recovery starts with scope and evidence, not with the restore button.
- Repair, rollback, restore, and rebuild are different levels of intervention.
- Verification after recovery is as important as the recovery step itself.
- Using full restore when a smaller repair would work.
- Starting recovery before confirming what data or service is actually affected.
- Stopping after the system boots without verifying the real workload.
Use Event Viewer, Get-WinEvent, and journalctl to narrow system problems by time, severity, service, and recent activity.
M48 - Boot & StartupExplain the major boot stages on Windows and Linux and use a few practical tools to investigate slow or unhealthy startup behavior.
M49 - System Updates & PatchingExplain a safe update workflow for Windows and Linux, apply updates deliberately, and verify whether a reboot is still required afterward.
M51 - Backup & Recovery: Full WorkflowDistinguish file backups, snapshots, and full-system recovery plans, and understand which recovery method fits which failure.
M52 - Systematic Troubleshooting: PDIVETUse a structured troubleshooting flow so you can define the problem clearly, gather evidence, test carefully, and verify the fix.
Use journalctl to view recent logs, filter by service and time, and run one non-interactive error query.
LAB-SEC-03 - SSH Key AuthenticationGenerate an SSH key pair, authorize the public key, and verify key-based login before changing server authentication settings.
LAB-SEC-04 - Hardening with chattrUse chattr and lsattr on disposable files so you understand immutable and append-only attributes without risking important data.