LearnKey Training

CISSP Law, Regulation, Compliance, & Investigations Course 2008

CISSP Law, Regulation, Compliance, & Investigations Course 2008

Back to Product Page

CISSP Law, Regulation, Compliance, & Investigations Course 2008

1 Sessions -
2 Hours of Interactive Training

Law, Regulation, Compliance, & Investigations is one of 10 domains comprising the Certified Information Systems Security Professional (CISSP) Common Body of Knowledge (CBK). In this CISSP certification prep course from LearnKey, expert instructor Michael Solomon helps you become familiar with principles of computer law and crime, incident handling, evidence, investigation and ethics. At the conclusion of this course, you will be familiar with the issues and concepts of the Law, Regulation, Compliance, & Investigations domain required to pass the CISSP exam.

  • One of the valuable domains which leads to CISSP certification
  • Boost your earning potential through accreditation in CISSP
  • Information security skills are in demand throughout the world

About The Author
Michael Solomon, CISSP, PMP®, TICSA, is a speaker, consultant and trainer who specializes in project management and database application-level security topics. Since 1987 Solomon has worked on IT projects or instructed for more than 60 organizations including EarthLink, Nike, Lucent Technologies, BellSouth, UPS, Boart Longyear, and the U.S. Coast Guard. Solomon holds an MS in Computer Science from Emory University (1998), and a BS in Computer Science from Kennesaw State University (1987) where he was also an instructor from 1998 - 2001. He has been a contributor to various certification books.

Session 1

Section A: Types of Computer Crime

  • Overview
  • Military Attacks
  • Business Attacks
  • Financial Attacks
  • Terrorist Attacks
  • Grudge Attacks
  • Fun Attacks
  • Hacking/Cracking

Section B: Categories of Law

  • Criminal Law
  • Civil Law
  • Admin/Regulatory Law
  • Categories of Law
  • Intellectual Property Law
  • Trade Secrets
  • Copyrights
  • Trademarks
  • Patents

Section C: Computer Laws

  • Technology Threat
  • Government Intervention
  • Fraud and Abuse Act
  • Computer Security Act
  • Amended Security Act
  • Security Reform Act
  • Privacy Acts
  • USA Patriot Act
  • Liability

Section D: Types of Incidents

  • Overview
  • Incident Categories
  • Scanning Incidents
  • Compromise Incidents
  • Malicious Code Incidents
  • DoS Incidents

Section E: Incident Handling

  • Knowledge
  • Response
  • Contain Damage
  • Reporting

Section F: Investigation and Evidence

  • Overview
  • Evidence Handling
  • Evidence Types
  • Evidence Admissibility
  • Search and Seizure