Section 1 : Introduction
|
Lecture 1 | The Cyber World | 00:25:31 Duration |
|
Lecture 2 | Types of Cybercrime | 00:15:52 Duration |
Section 2 : Hardware!
|
Lecture 1 | How a computer works The Basics | 00:18:19 Duration |
|
Lecture 2 | Data Storage |
Section 3 : Investigations
|
Lecture 1 | Law Enforcement and Cybercrime | 00:17:29 Duration |
|
Lecture 2 | Civil and International Investigations | 00:19:22 Duration |
Section 4 : Hacking
|
Lecture 1 | The History of Hacking and Hackers | 00:42:17 Duration |
|
Lecture 2 | Modern Hackers | 00:23:09 Duration |
Section 5 : Malware
|
Lecture 1 | Types of Malware | 00:25:29 Duration |
|
Lecture 2 | Malware Writers | 00:14:39 Duration |
Section 6 : Intellectual Property Violations
|
Lecture 1 | Digital Piracy | 00:18:48 Duration |
|
Lecture 2 | Who are Digital Pirates | 00:14:47 Duration |
Section 7 : Fraud and Other Economic Crimes
|
Lecture 1 | Economic Crimes | 00:17:29 Duration |
|
Lecture 2 | Identity Theft |
Section 8 : Sex Crimes
|
Lecture 1 | Pornography | |
|
Lecture 2 | Prostitution | 00:13:07 Duration |
Section 9 : Child Pornography Investigations
|
Lecture 1 | Child Pornography | 00:29:32 Duration |
|
Lecture 2 | Child Porn Typologies | 00:17:56 Duration |
Section 10 : Networking!
|
Lecture 1 | How Computers Talk to Each Other | 00:46:01 Duration |
Section 11 : Cyber Bullying, Stalking, and Harassment
|
Lecture 1 | Cyber Bullying | 00:17:12 Duration |
|
Lecture 2 | Cyber Stalking and Harassment | 00:15:51 Duration |
Section 12 : Cyber Terror and Cyber War
|
Lecture 1 | Cyber Terrorism | 00:32:08 Duration |
|
Lecture 2 | Cyber War | 00:20:58 Duration |
Section 13 : Criminological Theories Applied to Cybercriminals
|
Lecture 1 | Criminology | 00:19:36 Duration |
|
Lecture 2 | Criminology part 2 Electric Boogaloo! | 00:16:03 Duration |
Section 14 : Digital Forensics
|
Lecture 1 | Digital Forensics The Basics |
Section 15 : Digital Forensics Analysis
|
Lecture 1 | Analysis | 00:28:15 Duration |
|
Lecture 2 | Digital Evidence | 00:22:39 Duration |
Section 16 : Legal Aspects of Cybercrime
|
Lecture 1 | The Fourth Amendment | 00:19:53 Duration |
|
Lecture 2 | The Fifth Amendment and Daubert | 00:16:57 Duration |
Section 17 : Encryption!
|
Lecture 1 | Encryption | 00:18:53 Duration |
|
Lecture 2 | Steganography | 00:11:17 Duration |
Section 18 : Passwords!
|
Lecture 1 | Password Cracking | 00:36:42 Duration |
|
Lecture 2 | Password Policies and Best Practices |
Section 19 : The Future of Cybercrime
|
Lecture 1 | The Future | 00:21:08 Duration |