Cybercrime and Cybersecurity

(CYBERCRIME.AV1) / ISBN : 978-1-64459-597-8
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Preface

2

Introduction

  • CIA Triad
  • Confidentiality
  • Integrity
  • Availability
  • Conclusion
3

Risk Management

  • Introduction
  • Risk Assessment Scope
  • Analysing Data
  • Risk Mitigation or Acceptance?
  • Case Study: Which Country Is Most Likely to Attack?
  • Conclusion
4

Threats

  • Introduction
  • Mistakes
  • Stealing and Fraud
  • Employee Sabotage
  • Supporting Infrastructure Loss
  • Hacking
  • Espionage (Commercial and Government)
  • Malicious Code (Malware)
  • Scams
  • Case Study: Data Loss in the British Government
  • Conclusion
5

Organisational Responses

  • Introduction
  • The Cybersecurity Strategy
  • Case Study: Monitoring the Underground Economy
  • Conclusion
6

Operational Security: Users

  • Introduction
  • Staffing
  • Managing Users
  • Psychological Factors
  • Modifying User Behaviour
  • Case Study: A Non-Associative Model of Phishing
  • Conclusion
7

Operational Security: Systems

  • Introduction
  • Physical Security
  • Conclusion
8

Operational Security: Threat Response

  • Introduction
  • Situational Crime Prevention
  • Incident Response
  • Disaster Response
  • Conclusion
9

Technical Responses: Securing Systems

  • Introduction
  • Identification and Authentication
  • Authorisation and Access Control
  • Cryptography
  • Steganography
  • Antivirus
  • Conclusion
10

Technical Responses: Forensics

  • Introduction
  • Conclusion
11

Technical Responses: Penetration Testing

  • Introduction
  • Breaking into Your Own Network
  • Breaking Your Own Applications
  • Conclusion
12

Regulatory and Legal Responses

  • Introduction
  • Expert Juries
  • Conclusion
13

Honeypots and Deception

  • Introduction
  • Child Exploitation as a Cybercrime
  • Technical Mechanisms for Warning Message Delivery
  • The Classic Case
  • The Broader Case
  • Legal Issues
  • Conclusion

1

Introduction

  • Simulating the DDoS Attack
  • Creating and Verifying the Digital Signature
2

Threats

  • Exploiting a Website Using SQL Injection
  • Cracking Passwords Using Cain and Abel
  • Performing Social Engineering Attack
  • Examining Spyware
  • Cracking a Linux Password Using John the Ripper
  • Scanning and Classifying Different Types of Viruses
  • Creating a Remote Access Trojan (RAT)
3

Organisational Responses

  • Enforcing Password Policies
4

Operational Security: Systems

  • Identifying Access Badge Areas
  • Implementing Physical Security
5

Technical Responses: Securing Systems

  • Creating File Hashes
  • Understanding SHA Hash Algorithms
  • Changing the Permissions of a File Using the chmod Command
  • Enabling an Access Control List
  • Creating Linux Users and Groups
  • Using Symmetric Encryption
  • Creating Asymmetric Key Pairs
  • Performing Steganography Using OpenStego
  • Installing Antivirus Software
6

Technical Responses: Forensics

  • Converting an NTFS Partition to FAT32 Using Disk Management
7

Technical Responses: Penetration Testing

  • Conducting Vulnerability Scanning Using Nessus
  • Sniffing a Network with Wireshark
  • Performing Nmap Port Scanning
  • Attacking a Website Using XSS Injection
  • Configuring a Network Firewall
8

Honeypots and Deception

  • Setting up a Honeypot

Cybercrime and Cybersecurity

$ 431.35

Buy Now

Related Courses

All Course
scroll to top