Legal Considerations and Cybercrime Investigations
Cybersecurity
| Beginner
- 22 videos | 55m 27s
- Includes Assessment
- Earns a Badge
Cybercrime laws apply to incidents in which a crime was directed at a computer, or crimes committed using a computer. In this course, you'll explore aspects of service-level agreements (SLA) and privacy-level agreements (PLA), and discover considerations when dealing with international regulatory compliance. You'll also learn how cybercrime intersects with different legal fields including intellectual property, privacy laws, jurisdiction, criminal, and civil, and explore methods in which to investigate cybercrime activity. Explore key considerations when dealing with criminal, civil law, and administrative laws, and learn to differentiate between civil, common, statutory, and religious legal systems. Lastly, explore tools used to perform a cybercrime investigation, and discover cybercrime investigative best practices, including how to notify management and protect the crime scene. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of regulatory compliance and discuss how they can apply to contractual types such as sla and plaProvide an overview of change management processes that can be used to evaluate the need for changeRecognize external entities such as business to government (b2g), business to business (b2b), and business to employee (b2e)Discuss aspects of the contract management fieldDescribe when to use service-level agreements (sla)Provide an overview of privacy-level agreements (pla)Recognize considerations when dealing with international regulatory complianceDescribe the relationship between a cloud environment and its corresponding local environmentDifferentiate between legal and ethical activitiesRecognize how cybercrime intersects with different legal fields including intellectual property, privacy laws, jurisdiction, criminal, and civil
-
Discuss considerations as they relate to cybercrimes and the jurisdiction in which they take placeDescribe methods in which to investigate cybercrime activityDifferentiate between cybercrime attack types such as technical and socialDiscuss key considerations when dealing with criminal, civil law, and administrative lawsDifferentiate between civil, common, statutory, and religious legal systemsDiscuss considerations when contemplating reporting a cybercrime to the authoritiesContact the appropriate entity after a cybercrime incidentList tools available to law enforcement agencies to investigate a cybercrime incidentUse cybercrime investigation tools such as encaseDiscuss the potential impacts of a cybercrime investigationDescribe cybercrime investigative tips, including how to notify management and protect the crime scene
IN THIS COURSE
-
58s
-
1m 43s
-
2m 7s
-
2m 8s
-
1m 33s
-
1m 33s
-
2m 5s
-
2m 42s
-
2m 2s
-
2m
-
2m 28s
-
2m 56s
-
6m 17s
-
1m 15s
-
3m 33s
-
2m 21s
-
1m 51s
-
1m 50s
-
1m 24s
-
2m 44s
-
3m 58s
-
5m 58s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.