We may earn an affiliate commission when you visit our partners.
Course image
Konstantinos Mersinas

This course introduces fundamental notions of cybercrime. Namely, what cybercrime is, the main questions surrounding cybercrime, how cybercrime can be defined, and how it can be studied.

Read more

This course introduces fundamental notions of cybercrime. Namely, what cybercrime is, the main questions surrounding cybercrime, how cybercrime can be defined, and how it can be studied.

You will learn about the difficulties in measuring the occurrence, the frequency and the impact of cybercrime, and build a scepticism on the reliability and the interpretation of cybercrime reports.

You will be introduced to discussion about human aspects of cybercrime, in particular, the actors related to cybercrime, that is, the criminals, the victims, and law enforcement.

You will also learn about aspects such as personality, national and organisational culture, security culture, training, and other components which affect cybercriminal activity. Finally, you will dive into what is arguably the most important attack vector in cybercrime, that is, social engineering. You will gain an understanding of how it occurs, which techniques social engineers utilise, and which are the underlying psychological principles which make all of us – as humans – susceptible to social engineering attacks.

By the end of the course you should be able to:

• Reflect on the main questions related to cybercrime.

• Explain the meaning, definitions, importance, and impact of cybercrime.

• Assess the reliability and the interpretation of reports and surveys related to cybercrime.

• Identify the various classifications of cybercrime, the related threats, and threat actors.

• Explain the key role of human aspects in cybercrime.

• Differentiate between the various actors involved in cybercrime and their associated perspectives.

• Evaluate the underlying psychological principles which make social engineering the most successful attack vector in cybercrime.

• Describe how deception and social engineering manifest and how they can be defended against.

Enroll now

Two deals to help you save

What's inside

Syllabus

Introduction to Cybercrime
In Week 1 we explain the concept of cybercrime and provide the various definitions of it. Some important cybercrime reports, surveys and guides (e.g. from Europol) are introduced. You will learn about cyber vs traditional crime and the threats that we face.
Read more
Cybercrime threats, actors and surveys
In this week we identify the approaches for classifying related crimes and threat actors and we discuss various reports and surveys on the manifestation, frequency and impact of cybercrime. We elaborate on the accuracy and the statistics of such reports and we compare and contrast traditional and cyber or online crime.
Humans and cybercrime
This week we explain the importance of human aspects in cybercrime. We look primarily at introducing the breadth of the offensive and criminal activity, the types of threats, and the crimes which are observed. We also discuss the various types of offenders, criminals and hackers, that is, the threat actors. We also discuss some of the big issues relating to cyber threats, at individual, organisational and national level. 
Social engineering
In this week you will be introduced to social engineering in cybercrime that is as a manipulation technique where cyber criminals exploit human trust to obtain confidential information, enabling further cyber crimes. Using disguised communication such as emails or calls, they trick individuals into revealing passwords or personal details.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces fundamental notions in the field of cybercrime
Combines theoretical knowledge and practical examples to enhance understanding
In-depth exploration of social engineering techniques and their implications
Taught by Konstantinos Mersinas, an expert in cybercrime
Suitable as a foundational course or refresher for individuals interested in cybercrime
May require prerequisites in computer science or information technology for deeper understanding

Save this course

Save Cybercrime to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybercrime with these activities:
Review Network Security Concepts
Strengthen your knowledge of network security concepts before starting the course to better understand the impact of cybercrime.
Show steps
  • Revisit lecture notes or online resources on network security.
  • Take practice quizzes or review questions.
Review cybercrime definitions
It will help you establish a solid foundation in understanding the basics of cybercrime and its various definitions.
Show steps
  • Read the course syllabus and introduction
  • Review the provided readings on cybercrime definitions
  • Summarize the key concepts in your own words
Follow a tutorial on Cybercrime Terminology
Provides a deeper understanding of the technical terms used in cybercrime.
Browse courses on Cybersecurity Terminology
Show steps
  • Search for a reputable tutorial on cybercrime terminology.
  • Follow the steps outlined in the tutorial.
  • Take notes and Clarify any unfamiliar terms.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Explore Cybercrime Investigations
Enhance your understanding of cybercrime investigations by following guided tutorials and case studies to learn best practices.
Show steps
  • Identify reputable sources for cybercrime investigation tutorials and case studies.
  • Select a tutorial or case study that aligns with your interests.
  • Follow the instructions carefully and take notes.
Complete Cybercrime Simulation Exercises
Enhances your ability to identify and respond to cyber threats.
Browse courses on Penetration Testing
Show steps
  • Locate online simulations or exercises related to cybercrime.
  • Set up a safe testing environment.
  • Follow the instructions provided and complete the exercises.
  • Analyze the results and identify areas for improvement.
Develop a Cybersecurity Incident Response Plan
Enhances your ability to respond effectively to cyber incidents.
Show steps
  • Gather information on best practices for cybersecurity incident response.
  • Identify potential threats and vulnerabilities.
  • Develop a step-by-step response plan, including roles and responsibilities.
  • Document the plan and ensure it is accessible to all relevant stakeholders.
  • Test the plan through simulations or exercises.
Contribute to Open-Source Cybercrime Detection Tools
Provides hands-on experience in analyzing and detecting cybercrime threats.
Browse courses on Cybersecurity Tools
Show steps
  • Identify open-source cybercrime detection tools.
  • Review the documentation and familiarize yourself with their capabilities.
  • Locate opportunities to contribute, such as bug fixes, feature enhancements, or documentation updates.
  • Fork the repository, make changes, and submit a pull request.
  • Collaborate with the community to improve the tool's effectiveness.
Develop a cybersecurity awareness training program
It will challenge you to apply your understanding of cybercrime to create a practical solution for preventing and mitigating its impact.
Browse courses on Cybersecurity Awareness
Show steps
  • Research best practices and guidelines for cybersecurity awareness training
  • Design the training program, including modules on cybercrime threats, prevention measures, and incident response
  • Develop training materials, such as slides, handouts, and interactive exercises
  • Test and evaluate the training program's effectiveness

Career center

Learners who complete Cybercrime will develop knowledge and skills that may be useful to these careers:
Security Analyst
Understanding the nature of cybercrime is fundamental to understanding the role of a Security Analyst. This course defines and explains this role, exploring its threats, and discussing its related surveys and reports. It helps build a foundation for success in this career by providing a deep examination of the human element of cybercrime, which Security Analysts frequently engage with in their work.
Cybersecurity Engineer
Cybersecurity Engineers need a comprehensive knowledge of cybercrime to defend against it. This course provides that knowledge, defining cybercrime, discussing its impact, and identifying its threat actors. It also dives into the psychological principles that contribute to social engineering, a common attack vector. As such, it may be useful to Cybersecurity Engineers looking to strengthen their defenses against cybercrime.
Forensic Computer Analyst
Forensic Computer Analysts investigate cybercrimes, so understanding the nature of those crimes is crucial. This course provides that understanding, exploring the definitions, threats, actors, and impact of cybercrime. Additionally, it delves into the human aspects of cybercrime, providing Forensic Computer Analysts with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their investigations.
Cybercrime Investigator
Cybercrime Investigators specialize in investigating cybercrimes. This course provides them with the foundational knowledge they need to succeed in this role, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, including the psychological principles behind social engineering. This knowledge may be useful for Cybercrime Investigators as they work to understand and prevent cybercrimes.
Digital Forensics Analyst
Digital Forensics Analysts examine digital devices to uncover evidence of cybercrimes. This course provides them with a deep understanding of cybercrime, including its definitions, threats, actors, and impact. It also explores the human aspects of cybercrime, providing Digital Forensics Analysts with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their investigations.
Incident Responder
Incident Responders handle the aftermath of cybercrimes. This course provides them with the knowledge they need to understand and respond to these incidents, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, including the psychological principles behind social engineering. This knowledge may be useful for Incident Responders as they work to mitigate the damage caused by cybercrimes.
Cybersecurity Consultant
Cybersecurity Consultants advise organizations on how to protect themselves from cybercrimes. This course provides them with the knowledge they need to understand and assess cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing Cybersecurity Consultants with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their recommendations to clients.
Penetration Tester
Penetration Testers identify vulnerabilities in computer systems and networks. This course provides them with the knowledge they need to understand and exploit these vulnerabilities, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, including the psychological principles behind social engineering. This knowledge may be useful for Penetration Testers as they work to improve the security of computer systems and networks.
Cybersecurity Architect
Cybersecurity Architects design and implement security solutions for organizations. This course provides them with the knowledge they need to understand and address cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing Cybersecurity Architects with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their design and implementation decisions.
Chief Information Security Officer
Chief Information Security Officers (CISOs) are responsible for overseeing the security of an organization's information systems. This course provides them with the knowledge they need to understand and manage cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing CISOs with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their security strategies and decisions.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures for organizations. This course provides them with the knowledge they need to understand and manage cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing Information Security Managers with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their security strategies and decisions.
IT Auditor
IT Auditors evaluate the security of an organization's information systems. This course provides them with the knowledge they need to understand and assess cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing IT Auditors with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their audit procedures and findings.
Risk Manager
Risk Managers identify and assess risks to organizations, including cybercrime risks. This course provides them with the knowledge they need to understand and manage cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing Risk Managers with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their risk assessments and mitigation strategies.
Compliance Officer
Compliance Officers ensure that organizations comply with applicable laws and regulations, including cybersecurity laws and regulations. This course provides them with the knowledge they need to understand and manage cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing Compliance Officers with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their compliance strategies and decisions.
Cyber Insurance Underwriter
Cyber Insurance Underwriters assess and price cyber insurance risks. This course provides them with the knowledge they need to understand and manage cybercrime risks, defining cybercrime, discussing its impact, and identifying its threat actors. It also explores the human aspects of cybercrime, providing Cyber Insurance Underwriters with insights into the psychology behind cybercriminal behavior. This knowledge may be useful for informing their underwriting decisions.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybercrime.
Provides a comprehensive overview of cybercrime and its impact on individuals, organizations, and nations. It valuable resource for students, professionals, and anyone interested in understanding the legal, technical, and social aspects of cybercrime.
Provides a comprehensive overview of social engineering techniques and their application to cybercrime. It valuable resource for students, professionals, and anyone interested in understanding the human side of cybercrime.
Explores the psychological factors that contribute to cybercrime, including the motivations of cybercriminals and the vulnerabilities of victims. It valuable resource for students, researchers, and anyone interested in understanding the human side of cybercrime.
Explores the social and economic impact of cybercrime, including the victimization of individuals and organizations. It valuable resource for students, researchers, and anyone interested in understanding the broader societal implications of cybercrime.
Explores the challenges and opportunities of cloud computing for cybercrime, including the security risks of cloud computing and the use of cloud computing for cybercrime investigations.
Examines the role of cybersecurity in global politics, including the challenges and opportunities it presents for states, businesses, and individuals. It valuable resource for students, policymakers, and anyone interested in understanding the geopolitical implications of cybercrime.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybercrime.
Introduction to Cybercrime
International Cyber Conflicts
Ethical Hacking: Social Engineering
Engineering Practices for Building Quality Software
The Importance of Project Management in the Global...
Deploying the circular economy within organisations
Cyber Security Basics: A Hands-on Approach
Take Action: From Protest to Policy
New Energy Technologies: Energy Transition and...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser