Section 1 : Introduction

Lecture 1 The Cyber World 25:31
Lecture 2 Types of Cybercrime 15:52

Section 2 : Hardware!

Lecture 3 How a computer works The Basics 18:19
Lecture 4 Data Storage

Section 3 : Investigations

Lecture 5 Law Enforcement and Cybercrime 17:29
Lecture 6 Civil and International Investigations 19:22

Section 4 : Hacking

Lecture 7 The History of Hacking and Hackers 42:17
Lecture 8 Modern Hackers 23:9

Section 5 : Malware

Lecture 9 Types of Malware 25:29
Lecture 10 Malware Writers 14:39

Section 6 : Intellectual Property Violations

Lecture 11 Digital Piracy 18:48
Lecture 12 Who are Digital Pirates 14:47

Section 7 : Fraud and Other Economic Crimes

Lecture 13 Economic Crimes 17:29
Lecture 14 Identity Theft

Section 8 : Sex Crimes

Lecture 15 Pornography
Lecture 16 Prostitution 13:7

Section 9 : Child Pornography Investigations

Lecture 17 Child Pornography 29:32
Lecture 18 Child Porn Typologies 17:56

Section 10 : Networking!

Lecture 19 How Computers Talk to Each Other 46:1

Section 11 : Cyber Bullying, Stalking, and Harassment

Lecture 20 Cyber Bullying 17:12
Lecture 21 Cyber Stalking and Harassment 15:51

Section 12 : Cyber Terror and Cyber War

Lecture 22 Cyber Terrorism 32:8
Lecture 23 Cyber War 20:58

Section 13 : Criminological Theories Applied to Cybercriminals

Lecture 24 Criminology 19:36
Lecture 25 Criminology part 2 Electric Boogaloo! 16:3

Section 14 : Digital Forensics

Lecture 26 Digital Forensics The Basics

Section 15 : Digital Forensics Analysis

Lecture 27 Analysis 28:15
Lecture 28 Digital Evidence 22:39

Section 16 : Legal Aspects of Cybercrime

Lecture 29 The Fourth Amendment 19:53
Lecture 30 The Fifth Amendment and Daubert 16:57

Section 17 : Encryption!

Lecture 31 Encryption 18:53
Lecture 32 Steganography 11:17

Section 18 : Passwords!

Lecture 33 Password Cracking 36:42
Lecture 34 Password Policies and Best Practices

Section 19 : The Future of Cybercrime

Lecture 35 The Future 21:8