This course is a premium course it can be accessed either by individual purchase or through a premium subscription
Identity theft is a crime that 20 years ago was not on the radar for many businesses or individuals. Today, with the global economy and the prevalence of internet activity, it is one of the most recognized crimes in the U.S.
Identity theft is considered the use of one person’s identity or personally identifying information by another person without his/her permission. Identity theft can be committed against individuals as well as organizations.
Identity theft has become a major problem internationally. In 2006, President Bush issued an Executive Order which established the Identity Theft Task Force. Seventeen federal agencies and departments were appointed to create a national strategy to combat identity theft. This course focuses specifically on Business Identity Theft and processes companies can use to protect their information.
Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.
Learning Objectives
- Recognize the types of business identity theft
- Explore laws put into place to combat identity theft
- Explore why businesses are targeted
- Identify organizations that can help protect and save your business identity
- Explore methods to protect individuals and organizations against identity theft
Included In Certifications
This course is included in the following Certification Programs:
13 CoursesCorporate Cyber Security Certification
- Cyber Threat – The Modern-Day Fraud: Breaches and Actions
- A Primer on Cyber Security Programs and Roles
- Cyber Risk Frameworks And Concepts
- Cyber Risk Framework - Identify Assets
- Cyber Risk Framework - Prioritize Assets
- Cyber Risk Framework - Protect Assets
- Cyber Risk Framework - Detect Part One
- Cyber Risk Framework - Detect Threats Part Two
- Cyber Risk Framework - Respond
- Cyber Risk Framework - Recover
- Cyber Risk Framework - Utilizing The Tier Approach
- Fraud and Personal Identity Theft
- Fraud and Business Identity Theft
16 Reviews (54 ratings)
Prerequisites
No Advanced Preparation or Prerequisites are needed for this course.