Cybersecurity Law & Policy

Domestic and International Cybersecurity Law
4.5 (5 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
19 students enrolled
$19
$30
37% off
Take This Course
  • Lectures 10
  • Length 2.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2016 English

Course Description

Cybersecurity Law is one of the most rapidly growing areas of law, and issues like privacy, cybercrime, bitcoin banking, international legal issues and internet governance are some of the important areas that will be covered in this course.

This course includes reading materials with each video-lecture followed by a five-question quiz to keep you on track with what you should be learning before going on to the next lecture, throughout the course.

This course is about now and the future of cybersecurity law. It includes written materials, video lectures, and quizzes to test your comprehension along the way. When you have finished this course, you will have been introduced to the skill of spotting important cybersecurity legal issues and presented with the basic knowledge to know when you need to consult with an attorney.

What are the requirements?

  • All materials will be provided.

What am I going to get from this course?

  • Spot legal issues in cybersecurity situations
  • Analyze the pros and cons of bitcoin, the digital currency
  • Be aware of social media implications for litigation
  • Explore cyber-attacks both internationally and domestically

What is the target audience?

  • law students, lawyers
  • engineers, scientists
  • policymakers
  • users of the internet

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Foundations in Cybersecurity Law
12:32

In Lecture One, you will be introduced to the topic of cybersecurity law by defining what that means as well as a brief description of the legal areas that will be covered in the scope of this course. You will learn about the history of the development of the internet, as well as the basics of how the internet works. A quiz follows this lecture to help focus on a few of the things you should get from this lecture.

Please read the material provided in "resources" before watching the video-lecture.

1.0 Introduction
5 questions
06:50

This lecture defines cybersecurity law and explores the basics of internet governance. With a global system of communication developed without the involvement of international agreements, it is not obvious where jurisdiction might be for crimes or damages occurring through the internet. How international management of the domain name system, and the governance of this system is explored and governmental involvement is explained as well as the role of non-governmental organizations and the United Nations.

Please read the material provided in "resources" before watching the video-lecture.

07:59

The introduction of net neutrality is a functional aspect of the internet that is explained; however it is the introduction of net neutrality that led to the decision to regulate this aspect of the internet like a public utility by the Federal Communications Commission. Could this be used to better police criminal behavior on the internet or help to identify disruptions for law enforcement? This lecture explores the question of whether increased government involvement is a good thing or a bad thing.
Please read the material provided in "resources" at 2.1 before watching the video lectures.

04:16
The International Corporation for Assigned Names and Numbers (ICANN) is currently managed by the U.S. Department of Commerce but is currently on track to be shifted to global governance with different concepts of free speech than those held in the United States and protected by the U.S. Constitution. How will that process work and when is it happening?

Please read the material provided in "resources" at 2.1 before watching these video-lectures.

The 2.0 Quiz is next, covering all the lectures 2.1, 2.2 and 2.3.

2.0 Internet Governance Quiz
5 questions
13:03

Lecture 3.0, addresses two foundation cases in internet governance, the Yahoo! cases, which, in the first line of cases, led to an international conflict under French law. Questions of comity (recognition of foreign judgments in U.S. courts) and questions of jurisdiction are analyzed in this case. In the second case, also involving Yahoo!, individual privacy disclosure led to imprisonment of the individual Yahoo! user, raising questions about U.S. companies operating in foreign countries acting contradictory to the protection of individual rights.

Please read the material provided in "resources" before watching the video-lecture.

Quiz 3.0 follows this lecture.

3.0 The Yahoo! Cases
5 questions
Section 2: Privacy, Cyberattacks and Cybercrimes
17:07

Lecture 4.1, Cybersecurity Bitcoin Basics, walks you through the definition of bitcoin and how it works as a digital currency. Concepts of digital currencies, blockchain and smart contracts are explored and analyzed for their benefits but also examined for their weaknesses and dangers.

Please read the material provided in "resources" before watching the video-lecture.

Quiz 4.1 follows the lecture.

4.1 Bitcoin Basics Quiz
5 questions
12:19

Known as the preferential currency for criminals, the misuse of bitcoin is explored in Lecture 4.2. The methods of transferring bitcoin and the international transfer capability are features used in crimes. The early criminal case, "Silk Road" is examined as a case study in criminal behavior using bitcoin; as well as the "MTGOX" case which resulted in the loss of bitcoin owned by its users. Banking laws and moneylaundering is explained in the context of using bitcoin.

.Please read the material provided in "resources" before watching the video-lecture.

Quiz 4.2 follows this lecture.

4.2 Bitcoin Cybercrime Quiz
5 questions
15:44
Lecture 5.0, Social Media and Law, addresses some of the questions of privacy and anonymity that may be lost through social media. In the practice of law, this becomes important in several ways that will be discussed. One of those ways is in the use of discovery in litigation and what can be taken from social media both for your client as well as opposing parties. Specific cases which help define what Free Speech means in social media in the context of employment are explored and analyzed.

Please read the material provided in "resources" before watching the video-lecture. Quiz 5.0 follows.

5.0 Social Media Law
5 questions
14:45

Lecture 6.0 looks at threats to the U.S. critical infrastructure and the challenges to criminal investigation of cyberthreats to them. Beginning this discussion is a look at the federal government's definition of critical infrastructure and its role in protecting critical infrastructure. Recent cyber-attacks are identified, followed by a closer examination of one of the cyber-attacks which resulted in criminal convictions.

Please read the material provided in "resources" before watching the video-lecture.

Quiz 6.0 follows.

6.0 Critical Infrastructure Cybersecurity Quiz
5 questions
15:24

Lecture 7.0, Cybercrime, begins with a lexicon of cybercrime developed by the federal government's General Accounting Office (GAO). The investigation of some of the cases that have involved the use of cyber attacks in international conflicts begins with an investigation of the case, Stuxnet. The developing environment of "the internet of things" also poses new challenges that has resulted in the U.S. FDA taking legal action to protect users of devices that may be vulnerable to cyber-attacks. In the final part of this lecture, a description of the Dark Net leaves you with the thought of the vast criminal enterprise that inhabits this dark space on the internet.

Please read the material provided in "resources" before watching the video-lecture.

Quiz 7.0 follows.

I hope you have enjoyed the course.

7.0 Cybercrimes and the Internet of Things Quiz
5 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Victoria Sutton, Law Professor

Victoria Sutton, MPA, PhD, JD is a distinguished law professor at Texas Tech University School of Law and is author of eight law books and numerous law articles, and winner of several book awards. She is also a filmmaker. She teaches courses in emerging technologies law, nanotechnology law, biosecurity law, space law, environmental law and cybersecurity law. She has also served as an advisor on cybersecurity and biosecurity for government agencies.

Ready to start learning?
Take This Course