• Classroom
Course Description

The objective of this seminar is to provide practical and immediately usable information to professionals on how to protect both data and infrastructure from the ravages of electronic terrorism and associated cyber crimes. Once only a topic for made-for-television thrillers, cyber terrorism has captured global front page headlines and reported top news stories from every facet of commerce. Individuals engaged in international, industrial espionage, organized crime, competitive intelligence gathering, political warfare, and destruction of critical infrastructure pose a threat to governments, organizations and citizens alike.

This seminar is designed to provide the attendee with a fresh examination of the inherent risks associated with individuals or groups, who use cyberspace to threaten international governments, interfere with domestic operations, terrorize the citizens of a country, and attempt to disrupt corporate operations and how to minimize exposure to these risks.

Learning Objectives

  • Recognize and identify the differences between cyber crimes, cyber warfare, cyber terrorism and cyber threats.
  • Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces.
  • Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted.
  • Identify existing exposures and weaknesses within their organization's operations, which would make the organization an easy target for cyber terrorists.
  • Be prepared to assist their organization in securing its operations, minimizing its security exposure, and mitigating the possibility of becoming the victim of a cyber-based attack.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.