Jump to

At a glance

Security breaches can transform calm working environments into high-stress battle zones. Informed executives can be better equipped to understand the threat and make corresponding decisions intelligently and quickly.

This course is designed to educate senior leaders about cyber crime and incident response. Learners can review a scenario based on real-world intrusions by a sophisticated attacker, examining tactics and technologies from both the attacker’s and victim’s perspectives. This scenario illustrates a common method that attackers use to establish a foothold and remain undetected in the victim’s network.

The course also covers the pros and cons of follow-up actions available to the victim and provides insight into issues investigators and victim organizations face when defending networks and responding to security breaches.

Course goals

After completing this course, learners should be able to:

  • Understand how attackers defeat defenses and compromise networks
  • Explore common network defense posture assumed by victims
  • Collect electronic evidence
  • Understand how investigators analyze data and use findings to resolve incidents
  • Grasp the challenges an organization faces after its computer security defenses are breached

Who this course helps

Executives, security staff, corporate investigators, or other staff who need a general understanding of network security and network operations.

How it works

Delivery methods

In-classroom or virtual instructor-led training.

Duration

  • 1 day (in-person delivery)
  • 1 day (virtual delivery)