High Tech Crimes and Insider Threats
- Contents | Additional Info
- Delivery Methods:
Live
You Will Learn:
- The types of high tech crimes and how to recognize them.
- How to build policies that will allow your organization to effectively investigate suspicious activities
- How to assess risk of insider threats, and build mitigating controls.
- How to conduct a basic investigation without destroying critical evidence.
- How to work with Law Enforcement to reduce the business impact of criminal investigations.
| Course Contents |
|---|
| HST.1: Introduction and Concepts |
|
CPE/CMU Credits: 6 Topics
|
| HST.2: Putting it all together |
|
CPE/CMU Credits: 6 Topics
|
| Additional Information |
| Laptop Recommended |
|
Laptop not required, but strongly suggested. Supplementary materials will require a Windows based workstation or VM. If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org. |
| Who Should Attend |
|
| Prerequisites |
|
| What You Will Receive |
|
| You Will Be Able To |
|
*CPE/CMU credits not offered for the SelfStudy delivery method
