Overview/Description
To identify the types and characteristics of computer crime, distinguish between the laws relating to information technology, and recognize the investigative and ethical considerations involved in dealing with computer crime; to prepare candidates for one of the ten knowledge domains assessed in (ISC)2's CISSP certification exam
Target Audience
Mid-level and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers
Prerequisites
A minimum of four years of professional experience in the information security field or three years plus a college degree