Introduction to Cyber Crime for Executives

Security breaches transform calm working environments into high-stress battle zones. Informed executives are better equipped to understand the threat and make corresponding decisions smartly and quickly.

This course is designed to educate senior leaders about cyber crime and incident response. Learners will review a scenario based on real-world intrusions by a sophisticated attacker, examining tactics and technologies from both the attacker’s and victim’s perspectives. This scenario illustrates the most common method that attackers use to establish a foothold and remain undetected in the victim’s network.

The course also covers the pros and cons of follow-up actions available to the victim and provide critical insight into the many issues investigators and victim organizations face when defending networks and responding to security breaches.

Learning Objectives

After completing this course, learners should be able to:

  • Understand how attackers defeat defenses and compromise networks
  • Explore the most common network defense posture assumed by victims
  • Collect electronic evidence
  • Understand how investigators analyze data and use findings to resolve incidents
  • Grasp the challenges an organization faces after its computer security defenses are breached

Who Should Attend

Executives, security staff, corporate investigators or other staff who need a general understanding of network security and network operations.

Duration

1 day

Instructor-Led Training Instructor-Led Training

Courses cannot be purchased or accessed from this site.

If you would like to register for this course, please contact your FireEye account manager.

Thank you.