(Click Category to List Courses)

41 - IT-S Information Technology - Security and Audit

IT-S 205 - Cybersecurity Law and Regulation

Code Start Date Duration Venue
IT-S 205 10 July 2023 5 Days Istanbul Registration Form Link
IT-S 205 04 September 2023 5 Days Istanbul Registration Form Link
IT-S 205 30 October 2023 5 Days Istanbul Registration Form Link
IT-S 205 25 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees


Course Description

As crime increasingly has a digital component, legislators have to respond by strengthening and broadening legislation to address the threats.  Center researchers examine the impact of proposed laws and regulation on cybercrime, asking whether particular provisions achieve their desired results and/or produce costly, unintended side effects.  In this course, participants will be able to improve government security practices and restrict public disclosure of sensitive government cybersecurity information.

Course Objectives

  • Getting Familiar with Cybersecurity Laws
  • Demonstrating understanding of the legal policy framework
  • Implementing system-level security principles enhance an organizations security
  • Understand the related policy and guidelines supporting each law
  • Developing investigative hypothesis

Who Should Attend?

  • Investigators
  • Security and IT professionals
  • Technology managers
  • Compliance officers
  • Law enforcement personnel

Course Details/Schedule

Day 1

  • Fundamentals of data security law and policy
  • Impact of law and regulation on cybercrime
  • International cyber law framework
  • Human factors in security
  • Social, legal and ethical issues

Day 2

  • Business law issues in cypber space
  • Intellectual property issues in cyber space
  • Copyright issues in cyber space
  • Software licenses
  • Trademark issues in cyber space
  • Data privacy law in cyber space

Day 3

  • How to conduct cyber security investiations?
  • Initial risk assessment
  • Determining the scope of a breach
  • Retrace past activity within database systems
  • Recover previously deleted data
  • Determine pre- and post-state of information

Day 4

  • Protection of computing resources:
  • Protection of source code
  • Protection of databases 
  • Registration and protection of domain names 
  • Digital signatures
  • Public/private key infrastructure
  • Certificate authorities
  • Encryption implementations their relative weaknesses and strengths

Day 5

  • Applying law to emerging dangers:
  • Cyber terrorism
  • Cyber frauds
  • Cyber attacks
  • Cyber hacking
  • Data privacy & confidentiality