IT Security & Cyber-Crime Prevention
- 8 weeks Online
- 1 to 4 Weeks Classroom
- 258 Student Enrolled
Course Overview
Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy miscreants’ opportunities for online fraud, identity theft and other cyber-attacks. Denial of service (DDOS), botnets and malware are just a few of the techniques being used to target critical corporate data and business IT users. You will be introduced to a full range of cyber-security risks facing corporate business and other large organisations. Using practical examples you will see how cyber-crime is committed and the impact it can have.
Importantly you will gain a practical understanding of the role you can play in identifying key vulnerability and gaps in business processes, and specifying the most appropriate control frameworks to reduce exposure
Course Outcomes
- Best practices and industry standards for data security
- Firewalls, data encryption, and other preventative methods
- Digital forensic tools and forensic analysis procedures
- Legal protocols for collecting and protecting digital evidence
- The criminal justice system in relation to cybercrimes
Certification
At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio.
Aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto. Sam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt.
Course Outline
Risk Analysis–Approved Risk Analysis Methods
- Risk Analysis for Facilities and Structures
- Many Interested Stakeholders and Agendas
- Commercially Available Software Tools
- Risk Analysis Basics
- Risk Assessment Steps
- Which Methodology to Use?
Risk Analysis Skills and Tools
- Skill #1: Gathering Data
- Skill #2: Research and Evidence Gathering
- Skill #3: Critical Thinking in the Risk Analysis Process
- Skill #4: Quantitative Analysis
- Skill #5: Qualitative Analysis
- Skill #6: Countermeasure Selection
- Skill #7: Report Writing
Commercially Available Software Tools
- Lesser Software Tools
- Affordable Tool Examples
Critical Thinking and the Risk Analysis Process
- Overview of Critical Thinking
- The Importance of Critical Thinking
- Analysis Requires Critical Thinking
- The Eight Elements That Make Up the Thinking Process
- The Concepts, Goals, Principles, and Elements of Critical Thinking
Define Scenarios and Evaluate Specific Consequences
- Asset / Attack Matrix
- Threat / Target Nexus Matrix
- Weapons / Target Nexus Matrix
- Adversary Sequence Diagram Path Analysis
- Surveillance Opportunities Matrix
- Evaluate Vulnerability
- Survey Points
- Quantitative Analysis Matrices
- Determine Accessibility
- Identify Intrinsic Vulnerabilities
- Natural Countermeasures
Evaluate Effectiveness of Existing Security Measures
- The Vulnerability Calculation Spread sheet
- Qualitative Analysis Section
- Vulnerability Detail Spread sheet
- Vulnerability Detail Matrix
Resources for Likelihood
- Viewing the Range of Possible Threat Actors
- Criminal versus Terrorism Likelihood Resources
- General Comparison for Resources
- Terrorism Asset Target Value Estimates
- Criminal Incident Likelihood Estimates
- Criminal Statistics
- Economic Crime Asset Target Value Estimate
- Non-terrorism Violent Crime Asset Target Value Estimate
- Petty Crimes Asset Target Value Estimate
The Risk Analysis Process
- The Complete Risk Analysis Process
- The Risk Analysis Process
- Diagram Analysis
- Asset Target Value Matrices
- Probability Summary Matrix
- Vulnerability Components
- Prioritizing Risk
- Prioritization Criteria
- Natural Prioritization (Prioritizing by Formula)
- Prioritization of Risk
- Communicating Priorities Effectively
- Best Practices Ranking Risk Results
Security Policy Introduction
- The Hierarchy of Security Program Development
- What Are Policies, Standards, Guidelines, and Procedures?
- Other Key Documents
- The Key Role in Policies in the Overall Security Program
- Benefits to Having Proper Policies
- Security Policy and Countermeasure Goals
- The Role of Policies in the Security Program
The Role of Countermeasures in the Security Program
- Why Should Policies Precede Countermeasures?
- Security Policy Goals
- Security Countermeasure Goals
- Policy Support for Countermeasures
- Key Policies
Process for Developing and Introducing Security Policies
- Triggers for Policy Changes
- Policy Request Review
- Policy Impact Statement
- Subject Matter Expert and Management Review Process
- Policy Requirements
- Basic Security Policies
- Security Policy Implementation Guidelines
- Regulatory-Driven Policies
- Non-regulatory-Driven Policies
Countermeasure Goals and Strategies
- Countermeasure Objectives, Goals, and Strategies
- Access Control
- Deterrence
- Detection
- Assessment
- Response (Including Delay)
- Evidence Gathering
- Comply with the Business Culture of the Organization
- Minimize Impediments to Normal Business Operations
- Safe and Secure Environments
- Design Programs to Mitigate Possible Harm from Hazards and Threat Actors
Types of Countermeasures
- Baseline Security Program
- Specific Countermeasures
- Countermeasure Selection Basics
- The Challenge
- Countermeasure Effectiveness
- Functions of Countermeasures
- Countermeasure Effectiveness
- Helping Decision Makers Reach a Consensus on Countermeasure Alternatives
Security Effectiveness Metrics
- A Useful Commercial Model
- What Kind of Information Do We Need to Evaluate to Determine Security
Program Effectiveness?
- What Kind of Metrics Can Help Us Analyse Security Program Effectiveness?
- Adversary Sequence Diagrams
- Vulnerability / Countermeasure Matrix
- Security Event Logs
- Patrol Logs (Vulnerabilities Spotting / Violations Spotting)
- Annual Risk Analysis
Cost-Effectiveness Metrics
- What Are the Limitations of Cost-Effectiveness Metrics?
- What Metrics Can Be Used to Determine Cost-Effectiveness?
- Communicating Priorities Effectively
- Basis of Argument
- Complete Cost-Effectiveness Matrix
- Complete Cost-Effectiveness Matrix Elements
Writing Effective Reports
- The Comprehensive Risk Analysis Report
- Asset / Attack Matrix
- Threat / Target Nexus Matrix
- Weapon / Target Nexus Matrix
- Surveillance Opportunities
- Risk Calculation
- Baseline Security Program
- Identifying Key Assets for Special Consideration
- Develop Countermeasure Budgets
- Countermeasure Implementation Recommendations
- Report Supplements
- Risk Register
Item Reviews - 3
Submit Reviews

$ 250.00
Consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore.
- 7787 Views
- 8 Weeks Online
- 1-4 Weeks Class
- Certified
Josaph Manrty27 Oct 2019
" Commodo est luctus eget. Proin in nunc laoreet justo volutpat blandit enim. Sem felis, ullamcorper vel aliquam non, varius eget justo. Duis quis nunc tellus sollicitudin mauris. "
Rita Chawla2 Nov May 2019
" Commodo est luctus eget. Proin in nunc laoreet justo volutpat blandit enim. Sem felis, ullamcorper vel aliquam non, varius eget justo. Duis quis nunc tellus sollicitudin mauris. "
Adam Wilsom10 Nov 2019
" Commodo est luctus eget. Proin in nunc laoreet justo volutpat blandit enim. Sem felis, ullamcorper vel aliquam non, varius eget justo. Duis quis nunc tellus sollicitudin mauris. "