Cybercrime: What you need to know
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
14 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cybercrime: What you need to know to your Wishlist.

Add to Wishlist

Cybercrime: What you need to know

Don't be in the dark when it comes to understanding cybercrime
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
14 students enrolled
Created by Victoria Sutton
Last updated 4/2017
English
Curiosity Sale
Current price: $10 Original price: $25 Discount: 60% off
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • 18 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Students will be able to identify cybercrimes and elements of cybercrimes.
  • Students will be able to spot legal issues in cybercrime scenarios.
  • Students will be familiar with some cases involving cybercrime.
View Curriculum
Requirements
  • Cybersecurity Law & Policy
Description

Cybercrime describes the major types of crimes involving computers and the internet that are of two types: (1) traditional crimes committed using computers and/or the internet; and (2) new crimes created because of the internet. This course will cover crimes in both areas, including the major federal laws that control cybercrime and criminal procedure and how it applies in a cybercrime context. Cybercrimes involving hacking, cyberbullying, bitcoin and the internet of things and law will be included in this course.

In this course, for each of the twelve legal topics and segments, there is a reading assignment, a video lecture followed by a five-question quiz to test your knowledge and comprehension. You will be able to re-watch any video lecture, and retake the quizzes as you would like. 

You may never look at your computer the same again.

Who is the target audience?
  • Anyone who wants to enhance their knowledge of cybercrime and what they should know about the law.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
12 Lectures
02:29:01
+
Introduction to Cybercrime
2 Lectures 17:09

This lecture includes an overview of cybercrimes and what you can expect in this course.

Preview 03:50

Introduction
2 questions

This lecture introduces all of the cybercrimes, how they will be presented, criminal procedural issues, then emerging technologies and cybercrimes.

Preview 13:19

Introduction to cybercrime
5 questions
+
Cybercrime Federal Laws
4 Lectures 01:01:54

This lecture follows the text of the major cybercrime federal statute, 18 USC 1030, and 18 USC 2701(a), including how these statutes have evolved over time with the advances in the internet.

Cybercrime federal law 18 U.S.C. 1030 and 2701(a)
19:53

Cybercrime Federal Law 18 USC 1030
5 questions

The crimes of mail and wire fraud are applied to developments of the internet, despite the early beginning of mail fraud applying to postal mailings.

Cybercrime: Mail and Wire Fraud
13:24

Cybercrime: Mail and Wire Fraud
5 questions

The crime of identity theft is an old crime that has a place to grow --- the internet. This lecture examines the federal law that is used to control identity theft. 

Cybercrime: Identity Theft
14:33

Cybercrime: Identity Theft
5 questions

This lecture covers cybercrimes that have evolved with the opportunities on the internet, like cyberbullying, cyberstalking and child pornography.  Some case studies in this lecture also help in understanding the criminal statutes that control these crimes.  

Cyberbullying
14:04

Cyberbullying
5 questions
+
Cybercrime and Criminal Procedural Law
3 Lectures 38:34

This lecture covers the basics of warrants and the constitutional concept of probable cause in relation to computers and cyberspace.

Cybercrime: Warrants, Part 1
13:30

Cybercrime: Warrants, Pt. 1
5 questions

This lecture applies the constitutional concept of protection against search and seizure without probable cause, and shows through cases how this principle is applied in a cybercrime context.

Cybercrime: Warrants, Part 2
13:38

Cybercrime: Warrants, Pt. 2
5 questions

This lecture begins the criminal procedure section of this course, and explores the unique aspects of self-incrimination and computers. First, the basic constitutional concept of the right of protection against self-incrimination is discussed, then the application of that constitutional concept to computers shows why the 5th Amendment protection against self-incrimination is unique, in this context.

Cybercrime: 5th Amendment Protection
11:26

Cybercrime: Taking the 5th
5 questions
+
Cybercrime and Emerging Technologies
3 Lectures 31:24

This lecture provides an overview of the digital currency, bitcoin, with humor and then explains how this presents unique problems in cybercrime. The case of Silk Road and Ross Ulbricht is examined.

Cybercrime: Bitcoin, Part 1
09:48

Cybercrime: Bitcoin, Part 1
5 questions

This lecture continues to examine the digital currency, bitcoin, and to look at the Silk Road case and the Ross Ulbricht case in state court.

Cybercrime: Bitcoin, Part 2
09:51

Cybercrime: Bitcoin, Part 2
5 questions

This lecture examines a new cybercrime of hacking into the internet of things, and taking control of devices that are reliant on the internet to function. This can range from a mild annoyance to a deadly event. See how one federal agency used their regulatory power to try to control a dangerous situation with medical devices and hacking into the internet of things.

Cybercrime: Internet of Things
11:45

Cybercrime: Internet of Things
5 questions
About the Instructor
Victoria Sutton
4.2 Average rating
35 Reviews
150 Students
6 Courses
Law Professor

Victoria Sutton, MPA, PhD, JD is a distinguished law professor at Texas Tech University School of Law and is author of eight law books and numerous law articles, and winner of several book awards. She is also a filmmaker. She teaches courses in emerging technologies law, nanotechnology law, biosecurity law, space law, environmental law and cybersecurity law. She has also served as an advisor on cybersecurity and biosecurity for government agencies.