Legal Considerations and Cybercrime Investigations

Cybersecurity    |    Beginner
  • 22 videos | 55m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 91 users Rating 4.4 of 91 users (91)
Cybercrime laws apply to incidents in which a crime was directed at a computer, or crimes committed using a computer. In this course, you'll explore aspects of service-level agreements (SLA) and privacy-level agreements (PLA), and discover considerations when dealing with international regulatory compliance. You'll also learn how cybercrime intersects with different legal fields including intellectual property, privacy laws, jurisdiction, criminal, and civil, and explore methods in which to investigate cybercrime activity. Explore key considerations when dealing with criminal, civil law, and administrative laws, and learn to differentiate between civil, common, statutory, and religious legal systems. Lastly, explore tools used to perform a cybercrime investigation, and discover cybercrime investigative best practices, including how to notify management and protect the crime scene. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of regulatory compliance and discuss how they can apply to contractual types such as sla and pla
    Provide an overview of change management processes that can be used to evaluate the need for change
    Recognize external entities such as business to government (b2g), business to business (b2b), and business to employee (b2e)
    Discuss aspects of the contract management field
    Describe when to use service-level agreements (sla)
    Provide an overview of privacy-level agreements (pla)
    Recognize considerations when dealing with international regulatory compliance
    Describe the relationship between a cloud environment and its corresponding local environment
    Differentiate between legal and ethical activities
    Recognize how cybercrime intersects with different legal fields including intellectual property, privacy laws, jurisdiction, criminal, and civil
  • Discuss considerations as they relate to cybercrimes and the jurisdiction in which they take place
    Describe methods in which to investigate cybercrime activity
    Differentiate between cybercrime attack types such as technical and social
    Discuss key considerations when dealing with criminal, civil law, and administrative laws
    Differentiate between civil, common, statutory, and religious legal systems
    Discuss considerations when contemplating reporting a cybercrime to the authorities
    Contact the appropriate entity after a cybercrime incident
    List tools available to law enforcement agencies to investigate a cybercrime incident
    Use cybercrime investigation tools such as encase
    Discuss the potential impacts of a cybercrime investigation
    Describe cybercrime investigative tips, including how to notify management and protect the crime scene

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 6282 users Rating 4.5 of 6282 users (6282)
Rating 4.6 of 893 users Rating 4.6 of 893 users (893)
Rating 4.4 of 237 users Rating 4.4 of 237 users (237)