CIC Training Stage 1

(CIS-ST1)
Lessons
TestPrep
Get A Free Trial

Skills You’ll Get

1

Understanding the Concept of Cyberspace and Cybercrime

  • Lesson 1: Definition of Cybercrime and Computer Crime
  • Definitions
  • Cybercrime vs. Computer Crime
  • Lesson 2: Routine Activities Theory: Understanding Jurisdiction over Cybercrime
  • [Lab1] Google Takeout
  • Spatiality and Temporality in Cyberspace
  • Three Core Concepts: Routine Activity Theory
  • Motivated Offender
  • Suitable Target in Cyberspace
  • Capable Guardianship in Cyberspace
2

Hacking and ID Theft

  • Lesson 1: Research on Hackers
  • Descriptive Statistics: Hacking and Internet Fraud
  • Hacking and Cracking
  • Classifications of Hackers
  • Forms of Hacking
  • [Lab2] Vistumbler
  • Lesson 2: ID Theft
  • Definitions
  • Types of identity theft
  • How to Identity Theft Occurs
  • The Cost & Victims of Identity Theft
  • Laws on Identity Theft
  • Prevention
3

Criminological Theories and Cybercrimes

  • Classical Theories
  • Lesson 1: Criminological Theories and Cybercrimes
  • Biological and Psychological/Trait Theories of Crime
  • Control Theories
  • Social Learning Theories
  • Social Structure Theories
  • Lesson 2: Online Interpersonal Violence: Cyberbullying, Grooming, & Romance Fraud
  • Concepts and Definitions
  • Online Interpersonal Violence: Theoretical Application
  • [Lab3] mIRC
  • Offending and Victimization
4

The Concept of Cybercrime Victimization

  • Types of Cybercrime Victimization
  • How Cybercrime Happens
  • Cyberstalking
  • [Lab4] Social Media
  • Other Online Victimization Issues
  • Crime Victimization: Empirical Explanation
  • Cyber-Routine Activities Theory: (Choi, 2008)
  • Model Specification: The Conceptual Model of Cyber-Routine Activities Theory
  • Cyber-Routine Activities Theory: Empirical Delineation on Computer Crime Victimization
  • Profiles of Computer-Crime Victimization
  • Crime Prevention Strategies
  • Exercises
5

Criminal Procedure, Digital Evidence, and Cybercrime Management

  • Lesson1: Principles of Digital Evidence: Search and Seizure
  • Hardware
  • Information
  • Session1: Evidence Collection and Warrants
  • Search and Seizure of Digital Evidence
  • The Search Warrant Requirement
  • The Search Warrant Requirement (Answer)
  • [Lab5] Filemind (Metadata)
  • Preplanning Associated with the Search Warrant
  • Search Warrant Answer
  • ECPA
  • PPA
  • Session2: Warrantless Searches
  • Warrantless Search Doctrines and Technological Evidence (Answer)
  • Summary
  • Lession2: Formal Guardianship in the Social Control of Cybercrime
  • Intellectual Property
  • Copyright Law
  • Federal Laws against Cybercrime
  • Formal Control Agents: Government Regulations
  • Hacking & Internet Fraud Category
6

Cybercrime Prevention and Summary

  • Lesson1: Computer Ethics and Cybercrime Investigation
  • Definitions and key elements of computer ethics
  • Computer ethics
  • Computer Ethics (Continue)
  • Cyberforce and cyber-weapon
  • Digital forensic investigation and case study
  • Digital forensic investigation and computer ethics
  • Summary
  • Lesson2: Cybercrime Prevention and Summary
  • Course Summary (Continue)
  • Digital Guardianship
  • Digital Guardianship (Continue)
  • Course Accomplishments
scroll to top