Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Roosevelt University
  4. Cyber Ethics, Privacy, and Legal Issues

Cyber Ethics, Privacy, and Legal Issues

IT professionals, security professionals, and organizational leaders face new and challenging legal and ethical issues created by escalating security issues as a result of the incredible impact of information technology on businesses, other organizations, and society as a whole. This course explores many of these issues and provides an opportunity for students to discuss their ramifications in depth. This course is organized in a seminar format with a focus on class discussion. Discussion will take place using electronic forums and discussion papers. Real and hypothetical situations will be explored to provide opportunities for discussion and debate.

Course Overview

Overall Proficiency Level
4 - Expert
Training Purpose
Management Development
Specific Audience
All
Delivery Method
Online, Self-Paced
National CAE Designated Institution
  • Online, Self-Paced

Learning Objectives

Students will understand the complex legal ethical issues involved in cyber security and information assurance including best practices, standard, obligations, reputation maintenance, and liability mitigation; Students will be familiar with current events in case-law, legislation, regulation and industry standard setting; Students will be familiar with current laws such as HIPAA, FERPA, Sarbanes-Oxley, etc. Students will understand how these apply in practice, in the enterprise

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Legal Advice and Advocacy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: