Section 1 : Introduction

Lecture 1 The Cyber World 00:25:31 Duration
Lecture 2 Types of Cybercrime 00:15:52 Duration

Section 2 : Hardware!

Lecture 1 How a computer works The Basics 00:18:19 Duration
Lecture 2 Data Storage

Section 3 : Investigations

Lecture 1 Law Enforcement and Cybercrime 00:17:29 Duration
Lecture 2 Civil and International Investigations 00:19:22 Duration

Section 4 : Hacking

Lecture 1 The History of Hacking and Hackers 00:42:17 Duration
Lecture 2 Modern Hackers 00:23:09 Duration

Section 5 : Malware

Lecture 1 Types of Malware 00:25:29 Duration
Lecture 2 Malware Writers 00:14:39 Duration

Section 6 : Intellectual Property Violations

Lecture 1 Digital Piracy 00:18:48 Duration
Lecture 2 Who are Digital Pirates 00:14:47 Duration

Section 7 : Fraud and Other Economic Crimes

Lecture 1 Economic Crimes 00:17:29 Duration
Lecture 2 Identity Theft

Section 8 : Sex Crimes

Lecture 1 Pornography
Lecture 2 Prostitution 00:13:07 Duration

Section 9 : Child Pornography Investigations

Lecture 1 Child Pornography 00:29:32 Duration
Lecture 2 Child Porn Typologies 00:17:56 Duration

Section 10 : Networking!

Lecture 1 How Computers Talk to Each Other 00:46:01 Duration

Section 11 : Cyber Bullying, Stalking, and Harassment

Lecture 1 Cyber Bullying 00:17:12 Duration
Lecture 2 Cyber Stalking and Harassment 00:15:51 Duration

Section 12 : Cyber Terror and Cyber War

Lecture 1 Cyber Terrorism 00:32:08 Duration
Lecture 2 Cyber War 00:20:58 Duration

Section 13 : Criminological Theories Applied to Cybercriminals

Lecture 1 Criminology 00:19:36 Duration
Lecture 2 Criminology part 2 Electric Boogaloo! 00:16:03 Duration

Section 14 : Digital Forensics

Lecture 1 Digital Forensics The Basics

Section 15 : Digital Forensics Analysis

Lecture 1 Analysis 00:28:15 Duration
Lecture 2 Digital Evidence 00:22:39 Duration

Section 16 : Legal Aspects of Cybercrime

Lecture 1 The Fourth Amendment 00:19:53 Duration
Lecture 2 The Fifth Amendment and Daubert 00:16:57 Duration

Section 17 : Encryption!

Lecture 1 Encryption 00:18:53 Duration
Lecture 2 Steganography 00:11:17 Duration

Section 18 : Passwords!

Lecture 1 Password Cracking 00:36:42 Duration
Lecture 2 Password Policies and Best Practices

Section 19 : The Future of Cybercrime

Lecture 1 The Future 00:21:08 Duration