24/7/365 Dispatch Center
- Edmonton:
- Calgary:
- Vancouver:
- Toronto:
- Winnipeg
- Saskatoon
Cyber Crime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent a terrorist interest. You need only read the media to appreciate the current state of affairs of incidents which are made public, let alone those which go undisclosed. The increased use of automated attack tools by cyber criminals has overwhelmed some current methodologies used for tracking Internet cyber attacks, and vulnerabilities of a nations critical infrastructure, could possibly attract cyber attacks to extort money, or damage a commercial or national interest.
The threat is widespread and global, and effects individuals, commercial organisations and nation states alike. The ability to safeguard from attacks, identify, analyse and investigate cyber attacks as a security breach is paramount. Digital and related forensic evidence is a complex issue, spanning networks, organisations and international jurisdictions. The ability to effectively identify a security breach, investigate causation and mitigate risk is a must. Furthermore, to effectively detect and deter any cyber attack, you need to understand the nature, motive and ways of perceived cyber terrorists. In doing so and utilising appropriate countermeasures, best practice and management techniques will mitigate the risk of cyber attack and abuse and enhance protection to your assets.
Module 1. Discover the difference between computer crime and cyber terrorism
Module 2. Learn how to effectively identify a security breach as a cyber crime
Module 3. Review tools and methodologies for reviewing cyber terrorism
Module 4. Appreciate different classes of cyber crime
Module 5. Understand the nature motive ways of a cyber criminal and terrorist
Module 6. Gain familiarity with key legislation and international provisions for cyber terrorism
Module 7. Appreciate the effects of cyber terrorism on different organisations/users.
Module 8. Appreciate Information Security risk assessment and Information Security Management Frameworks
Module 9. Realise the importance of inter agency co-operation at a local, national and international level.