(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 205 - Cybersecurity Law and Regulation
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 205 | 28 October 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 205 | 25 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 205 | 23 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
As crime increasingly has a digital component, legislators have to respond by strengthening and broadening legislation to address the threats. Center researchers examine the impact of proposed laws and regulation on cybercrime, asking whether particular provisions achieve their desired results and/or produce costly, unintended side effects. In this course, participants will be able to improve government security practices and restrict public disclosure of sensitive government cybersecurity information.
Course Objectives
- Getting Familiar with Cybersecurity Laws
- Demonstrating understanding of the legal policy framework
- Implementing system-level security principles enhance an organizations security
- Understand the related policy and guidelines supporting each law
- Developing investigative hypothesis
Who Should Attend?
- Investigators
- Security and IT professionals
- Technology managers
- Compliance officers
- Law enforcement personnel
Course Details/Schedule
Day 1
- Fundamentals of data security law and policy
- Impact of law and regulation on cybercrime
- International cyber law framework
- Human factors in security
- Social, legal and ethical issues
Day 2
- Business law issues in cypber space
- Intellectual property issues in cyber space
- Copyright issues in cyber space
- Software licenses
- Trademark issues in cyber space
- Data privacy law in cyber space
Day 3
- How to conduct cyber security investiations?
- Initial risk assessment
- Determining the scope of a breach
- Retrace past activity within database systems
- Recover previously deleted data
- Determine pre- and post-state of information
Day 4
- Protection of computing resources:
- Protection of source code
- Protection of databases
- Registration and protection of domain names
- Digital signatures
- Public/private key infrastructure
- Certificate authorities
- Encryption implementations their relative weaknesses and strengths
Day 5
- Applying law to emerging dangers:
- Cyber terrorism
- Cyber frauds
- Cyber attacks
- Cyber hacking
- Data privacy & confidentiality