Cybersecurity and Criminal Law: What you need to know
- 2.5 hours on-demand video
- 18 downloadable resources
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Students will be able to identify cybercrimes and elements of cybercrimes.
- Students will be able to spot legal issues in cybercrime scenarios.
- Students will be familiar with some cases involving cybercrime.
- Cybersecurity Law & Policy
Cybercrime describes the major types of crimes involving computers and the internet that are of two types: (1) traditional crimes committed using computers and/or the internet; and (2) new crimes created because of the internet. This course will cover crimes in both areas, including the major federal laws that control cybercrime and criminal procedure and how it applies in a cybercrime context. Cybercrimes involving hacking, cyberbullying, bitcoin and the internet of things and law will be included in this course.
In this course, for each of the twelve legal topics and segments, there is a reading assignment, a video lecture followed by a five-question quiz to test your knowledge and comprehension. You will be able to re-watch any video lecture, and retake the quizzes as you would like.
You may never look at your computer the same again.
- Anyone who wants to enhance their knowledge of cybercrime and what they should know about the law.
This lecture includes an overview of cybercrimes and what you can expect in this course.
This lecture introduces all of the cybercrimes, how they will be presented, criminal procedural issues, then emerging technologies and cybercrimes.
This lecture begins the criminal procedure section of this course, and explores the unique aspects of self-incrimination and computers. First, the basic constitutional concept of the right of protection against self-incrimination is discussed, then the application of that constitutional concept to computers shows why the 5th Amendment protection against self-incrimination is unique, in this context.
This lecture examines a new cybercrime of hacking into the internet of things, and taking control of devices that are reliant on the internet to function. This can range from a mild annoyance to a deadly event. See how one federal agency used their regulatory power to try to control a dangerous situation with medical devices and hacking into the internet of things.