An intensive professional development training course on
Cyber Crime: Prevention & Detection
Why Choose Cyber Crime: Prevention & Detection Training Course?
The Course
Cyber Crime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent a terrorist interest. You need only read the media to appreciate the current state of affairs of incidents which are made public, let alone those which go undisclosed. The increased use of automated attack tools by cyber criminals has overwhelmed some current methodologies used for tracking Internet cyber attacks, and vulnerabilities of a nations critical infrastructure, could possibly attract cyber attacks to extort money, or damage a commercial or national interest.
The threat is widespread and global, and effects individuals, commercial organisations and nation states alike. The ability to safeguard from attacks, identify, analyse and investigate cyber attacks as a security breach is paramount. Digital and related forensic evidence is a complex issue, spanning networks, organisations and international jurisdictions. The ability to effectively identify a security breach, investigate causation and mitigate risk is a must. Furthermore, to effectively detect and deter any cyber attack, you need to understand the nature, motive and ways of perceived cyber terrorists. In doing so and utilising appropriate countermeasures, best practice and management techniques will mitigate the risk of cyber attack and abuse and enhance protection to your assets.
The Goals
During the five days seminar, delegates will:
- Discover the difference between computer crime and cyber terrorism
- Learn how to effectively identify a security breach as a cyber crime
- Review tools and methodologies for reviewing cyber terrorism
- Appreciate different classes of cyber crime
- Understand the nature motive ways of a cyber criminal and terrorist
- Gain familiarity with key legislation and international provisions for cyber terrorism
- Appreciate the effects of cyber terrorism on different organisations/users.
- Appreciate Information Security risk assessment and Information Security Management Frameworks
- Realise the importance of inter agency co-operation at a local, national and international level.
The Delegates
This seminar has been designed for individuals involved in Information Security and Management of IT Systems. It is particular benefit to Application Service Providers, Network Architecture Personnel, individuals in regards to IT Risk, Policy and Compliance in addition to Security Service Vendors and specialist investigators and those with a responsibility for managing and securing information assets.
It is expected that delegates have a good technical understanding of technology, electronic risk and security considerations, both technical and management.
The Process
Participants will gain detailed knowledge by active participation in seminars, group discussions and real life case studies.
Delivery will be by presentation, group syndicate investigations, training DVD and interactive seminars.
The Benefits
The seminar will provide delegates with an understanding of the range of cyber attacks that are undertaken today, and their likely evolution. Using real life case studies, delegates will become aware of the nature, motives and ways of a cyber terrorist, and the methods of digital and management prevention strategies and techniques. The seminar will also provide delegates with an overview of key regulations, statutory provisions and the commercial challenges which this brings.
The Results
Organisations will be better educated in relation to technology, legal risks and associated obligations in regards to identification of a cyber attack, security breach and appropriate defences that can be considered as a preventative solution. Appreciation and implementation of Information Security Management Framework, can seek to ensure adequate safeguards are implemented to mitigate identified risks of cyber attack or similar.
This in turn will allow organisations to place good reliance on controls which safeguard and utilise data for relevant business processes. Being able to adapt current best practice will ensure that corporations can understand and mitigate legal risks and challenges which are encountered, both nationally and internationally whilst benefiting from leading and effective solutions. Moreover, effective investigation may likely lead to a reduction in investigative lead time and apprehension of a cyber terrorist.
The Course Content
Day One
Cyber Crime Elements
- Overview of Computer Crime and Cyber Crime
- Key Elements of Cyber Crime
- Technology, Policing, and Investigation of Electronic Crime
- Ethical Hacking and Cyber Crime
- Civil and Criminal Considerations
- Case Study
Day Two
Criminal Exploits and Vulnerabilities
- Current Trends in Cyber Crime
- Identity Fraud & Identity Theft
- Financial Fraud
- Offences Against the Person
- Computer Misuse
- Sexual Offences
- Intellectual Property
Day Three
How to Identify and Respond to Cyber Vulnerability
- Cyber Vulnerability Risk Assessment
- Ensuring Information Security
- Integrity
- Availability
- Authenticity
- Non Repudiation of Data
- Where to design and place effective computer and management controls
- Steps to Identify and Investigate Security Breach
- Digital and Physical Evidence
- Classifying Cyber Attacks
- Inter Agency Plans for Investigation and Responding to Cyber Incidents
- Electronic and Physical Surveillance (Ethical Hacking and Industrial Espionage)
- Commercial Considerations
- Case Study
Day Four
Investigation and Prevention of Cyber Crime
- Characteristics of Cyber terrorist
- Nature, Motive and Ways of Cyber terrorist
- Organised Crime and Terrorism
- Key Legislative and International Provisions for Computer Crime
- Key Steps to Use Legislation to Your Advantage
- Management Mitigation and Control
- Case Study
Day Five
Legal Considerations of Cyber Crime
- Code of Practice for Information Security Management Overview
- Commercial Assistance for Effected Personnel
- Dealing with Legal Technicalities, Vulnerabilities and Policy Considerations
The Certificate
- AZTech Certificate of Completion for delegates who attend and complete the course.
DO YOU WANT TOLEARN MORE ABOUT THIS COURSE?
© 2024. Material published by AZTech shown here is copyrighted. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.