Course Overview

Doing research for possible merger and acquisition deals used to be a simple matter of deciding whether or not joining forces with another company made any business or financial sense.  Nowadays, in the age of Information Technology, things become much more complicated.  

In this course, you’ll learn how to ensure that data and communications about either a proposed or ongoing M&A deal remain protected against data thieves and eavesdroppers.  You’ll also learn about ensuring that the IT systems of the two involved companies can be integrated with each other, and about the importance of ensuring that the target companies have a good cybersecurity program in place.

Upon completion of this course, you’ll be better informed about how to help guide your company through the cybersecurity minefield that’s always part of a merger and acquisition process.

What You Will Learn

  • How to assess the viability of joining the IT systems of both companies together while still maintaining proper cybersecurity.
  • How to audit the target company’s systems to ensure that proper cybersecurity can be maintained after the merger.
  • How to protect sensitive data about the M&A deal.
  • How to eliminate vulnerabilities during the M&A process.
  • How to integrate security and risk management processes for the combined companies.
  • How to ensure smooth integration of the network infrastructures.

Program Curriculum

  • Understanding the Importance of Cybersecurity Throughout the M&A Lifecycle
  • Understanding Due Diligence
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Protecting Sensitive Data about the M&A Deal
  • Using Virtual Data Rooms
  • Maintaining Cybersecurity for the Legal Teams
  • Performing a Risk Assessment
  • Understanding the Risk Profile
  • Investigating the Target Company’s History of Fines, Legal Problems, and Data Breaches
  • Investigating the Legal Requirements
  • Determining Data Ownership
  • Investigating the Target Company’s Culture
  • Case Study - Mapping Target Corporation
  • Chapter 2 Quiz

  • Reviewing the Target Company’s Plans and Policies
  • Creating an Asset Inventory for the Target Company
  • Investigating the Target Company’s Software Escrow
  • Performing Risk Assessment for the Target Company’s Supply Chain
  • Investigating Vendor Management
  • Investigate the Target Company’s Access Controls
  • Investigating the Target Company’s Technical Infrastructure
  • Investigating the Target Company’s Physical Security
  • Vulnerability Scanning and Penetration Testing
  • Chapter 3 Quiz

  • Aligning Information Security and Human Resources Policies
  • Training Employees about the New Policies
  • Enforcing the Requirements
  • Establishing a New Information Security Baseline
  • Performing Annual Risk Assessments
  • Updating Audit and Compliance Plans to Include New Assets
  • Updating the Scope on Certifications and Attestations
  • Communicating Changes to Outside Auditors
  • Chapter 4 Quiz

Instructor

Donald Tevault

Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006 and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes globally from the comfort of his living room. He's also a Linux security researcher for an IoT security company.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8