This course highlights a range of cyber crimes and the appropriate response by first responders and other local, state and federal agencies that may encounter them. Participants will identify legislative, organizational and suggested personal efforts to control or prevent cyber crimes. This course examines cyber and cyber facilitated non-violent white-collar crimes, fraud and financial crimes, and violent crimes. The broad landscape of the cyber crimes discussed in this course illustrates the fact that almost all crimes can either be directly committed or indirectly facilitated through the cyber domain-a result of society’s increasing integration and dependence on the Internet and computers into nearly every aspect of daily life. Participants will also be able to identify legislative, organizational and suggested personal efforts to control or prevent cyber crimes.
Objectives
- Demonstrate knowledge of Internet regulation (Federal, state and self-regulations)
- Demonstrate knowledge of online contracting
- Demonstrate knowledge of consumer protection and employee privacy
- Demonstrate knowledge of the Federal Trade Commission (FTC) and online marketing
- Demonstrate knowledge of the Computer Fraud and Abuse Act (CFAA)
- Demonstrate knowledge of the Wire Fraud Act
- Demonstrate knowledge of the National Stolen Property Act
- Demonstrate knowledge of copyrights and intellectual property
- Demonstrate knowledge of website domain names and ICANN
- Demonstrate knowledge of the legality of hyperlinking
Target Audience
This course is applicable to any participant interested in learning more about cyber crimes.
Prerequisites
To have a good understanding of the topics discussed, we recommend taking the following NCPC courses:
- AWR-173 Information Security Basics
- AWR-174 Cyber Ethics
- OR, you should have a good understanding of: Cyber Ethics; Ethical Business Practices; Privacy Laws and Principles; Intellectual Property, Copyright Laws, Patents, Trademarks and Trade Secrets; Code of Ethics and Professional Practices; Freedom of Speech and the Internet; Ethical Hacking; Patching and updating; Firewalls; Malware; Confidentiality, Integrity and Availability; Disclosure, Alteration and Denial; Vulnerabilities, Attacks and Controls; Types of Attacks and Attackers; Controls; Access Control; TCP/IP Networking; Networking Basics and Security; Operating System Security; Encryption.