Cybersecurity and Criminal Law: What you need to know
4.2 (25 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
149 students enrolled

Cybersecurity and Criminal Law: What you need to know

Don't be in the dark when it comes to understanding cybercrime
4.2 (25 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
149 students enrolled
Created by Victoria Sutton
Last updated 4/2017
English [Auto-generated]
Current price: $16.99 Original price: $24.99 Discount: 32% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2.5 hours on-demand video
  • 18 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Students will be able to identify cybercrimes and elements of cybercrimes.
  • Students will be able to spot legal issues in cybercrime scenarios.
  • Students will be familiar with some cases involving cybercrime.
  • Cybersecurity Law & Policy

Cybercrime describes the major types of crimes involving computers and the internet that are of two types: (1) traditional crimes committed using computers and/or the internet; and (2) new crimes created because of the internet. This course will cover crimes in both areas, including the major federal laws that control cybercrime and criminal procedure and how it applies in a cybercrime context. Cybercrimes involving hacking, cyberbullying, bitcoin and the internet of things and law will be included in this course.

In this course, for each of the twelve legal topics and segments, there is a reading assignment, a video lecture followed by a five-question quiz to test your knowledge and comprehension. You will be able to re-watch any video lecture, and retake the quizzes as you would like. 

You may never look at your computer the same again.

Who this course is for:
  • Anyone who wants to enhance their knowledge of cybercrime and what they should know about the law.
Course content
Expand all 12 lectures 02:29:01
+ Introduction to Cybercrime
2 lectures 17:09

This lecture includes an overview of cybercrimes and what you can expect in this course.

Preview 03:50
2 questions

This lecture introduces all of the cybercrimes, how they will be presented, criminal procedural issues, then emerging technologies and cybercrimes.

Preview 13:19
Introduction to cybercrime
5 questions
+ Cybercrime Federal Laws
4 lectures 01:01:54

This lecture follows the text of the major cybercrime federal statute, 18 USC 1030, and 18 USC 2701(a), including how these statutes have evolved over time with the advances in the internet.

Cybercrime federal law 18 U.S.C. 1030 and 2701(a)
Cybercrime Federal Law 18 USC 1030
5 questions

The crimes of mail and wire fraud are applied to developments of the internet, despite the early beginning of mail fraud applying to postal mailings.

Cybercrime: Mail and Wire Fraud
Cybercrime: Mail and Wire Fraud
5 questions

The crime of identity theft is an old crime that has a place to grow --- the internet. This lecture examines the federal law that is used to control identity theft. 

Cybercrime: Identity Theft
Cybercrime: Identity Theft
5 questions

This lecture covers cybercrimes that have evolved with the opportunities on the internet, like cyberbullying, cyberstalking and child pornography.  Some case studies in this lecture also help in understanding the criminal statutes that control these crimes.  

5 questions
+ Cybercrime and Criminal Procedural Law
3 lectures 38:34

This lecture covers the basics of warrants and the constitutional concept of probable cause in relation to computers and cyberspace.

Cybercrime: Warrants, Part 1
Cybercrime: Warrants, Pt. 1
5 questions

This lecture applies the constitutional concept of protection against search and seizure without probable cause, and shows through cases how this principle is applied in a cybercrime context.

Cybercrime: Warrants, Part 2
Cybercrime: Warrants, Pt. 2
5 questions

This lecture begins the criminal procedure section of this course, and explores the unique aspects of self-incrimination and computers. First, the basic constitutional concept of the right of protection against self-incrimination is discussed, then the application of that constitutional concept to computers shows why the 5th Amendment protection against self-incrimination is unique, in this context.

Cybercrime: 5th Amendment Protection
Cybercrime: Taking the 5th
5 questions
+ Cybercrime and Emerging Technologies
3 lectures 31:24

This lecture provides an overview of the digital currency, bitcoin, with humor and then explains how this presents unique problems in cybercrime. The case of Silk Road and Ross Ulbricht is examined.

Cybercrime: Bitcoin, Part 1
Cybercrime: Bitcoin, Part 1
5 questions

This lecture continues to examine the digital currency, bitcoin, and to look at the Silk Road case and the Ross Ulbricht case in state court.

Cybercrime: Bitcoin, Part 2
Cybercrime: Bitcoin, Part 2
5 questions

This lecture examines a new cybercrime of hacking into the internet of things, and taking control of devices that are reliant on the internet to function. This can range from a mild annoyance to a deadly event. See how one federal agency used their regulatory power to try to control a dangerous situation with medical devices and hacking into the internet of things.

Cybercrime: Internet of Things
Cybercrime: Internet of Things
5 questions