Security breaches transform calm working environments into
high-stress battle zones. Informed executives are better equipped to
understand the threat and make corresponding decisions smartly and quickly.
This course is designed to educate senior leaders about cyber crime
and incident response. Learners will review a scenario based on
real-world intrusions by a sophisticated attacker, examining tactics
and technologies from both the attacker’s and victim’s perspectives.
This scenario illustrates the most common method that attackers use to
establish a foothold and remain undetected in the victim’s network.
The course also covers the pros and cons of follow-up actions
available to the victim and provide critical insight into the many
issues investigators and victim organizations face when defending
networks and responding to security breaches.
After completing this course, learners should be able to:
- Understand how attackers defeat defenses and compromise
- Explore the most common network defense posture
assumed by victims
- Collect electronic evidence
- Understand how investigators analyze data and use findings to
- Grasp the challenges an organization
faces after its computer security defenses are breached
Who Should Attend
Executives, security staff, corporate investigators or other staff
who need a general understanding of network security and network operations.