Royal Holloway University of London - Cybercrime
- Offered byCoursera
Cybercrime at Coursera Overview
Duration | 25 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Cybercrime at Coursera Highlights
- Earn a certificate of completion
- Add to your LinkedIn profile
- 8 quizzes
Cybercrime at Coursera Course details
- This course introduces fundamental notions of cybercrime. Namely, what cybercrime is, the main questions surrounding cybercrime, how cybercrime can be defined, and how it can be studied.
- You will learn about the difficulties in measuring the occurrence, the frequency and the impact of cybercrime, and build a scepticism on the reliability and the interpretation of cybercrime reports.
- You will be introduced to discussion about human aspects of cybercrime, in particular, the actors related to cybercrime, that is, the criminals, the victims, and law enforcement.
- You will also learn about aspects such as personality, national and organisational culture, security culture, training, and other components which affect cybercriminal activity. Finally, you will dive into what is arguably the most important attack vector in cybercrime, that is, social engineering. You will gain an understanding of how it occurs, which techniques social engineers utilise, and which are the underlying psychological principles which make all of us - as humans - susceptible to social engineering attacks.
- By the end of the course you should be able to:
- Reflect on the main questions related to cybercrime.
- Explain the meaning, definitions, importance, and impact of cybercrime.
- Assess the reliability and the interpretation of reports and surveys related to cybercrime.
- Identify the various classifications of cybercrime, the related threats, and threat actors.
- Explain the key role of human aspects in cybercrime.
- Differentiate between the various actors involved in cybercrime and their associated perspectives.
- Evaluate the underlying psychological principles which make social engineering the most successful attack vector in cybercrime.
- Describe how deception and social engineering manifest and how they can be defended against.
Cybercrime at Coursera Curriculum
Introduction to Cybercrime
Introduction to the course
Introduction to cybercrime
Defining cybercrime
Why is combating cybercrime challenging?
Course syllabus
Starting your studies
Study journal reflection – expectations
Principles of good peer feedback in peer review assignment
Cyber enabled and cyber dependent crimes: CPS guidance
Critical thinking activity: The World Economic Forum (WEC) interactive diagram
The impact of cybercrime
End of week 1 quiz: Understanding cybercrime
Getting to know each other
England and Wales crime survey 2022 – Report and data tables
Cybercrime threats, actors and surveys
Types of cybercrime threats
How to measure and study cybercrime
Internet organised crime threat assessment (IOCTA) 2021
Cybercrime: reviewing the evidence
Critical thinking activity: Reflections on reported impacts
End of week 2 quiz: Characteristics of cybercrime
Associating threats with threat actors
Humans and cybercrime
The importance of human aspects in cybercrime
Attackers, victims, and law enforcement – different perspectives
The importance of humans, rationality and decision-making
Critical thinking activity: The psychology of security and the focus of the security community
Cyber-attacks, behaviours, and impacts
End of week 3 quiz: Human aspects in cybercrime
Attacks and victimisation
Social engineering
Introduction to social engineering
Psychological principles of social engineering
The art and science of influencing people
A reverse social engineering scenario
Course summary and reflection
Check your understanding: Social engineering
Check your understanding: Psychological principles of social engineering
Check your understanding: The art and science of influencing people
Check your understanding: A reverse social engineering scenario
End of week 4 quiz: Social engineering
A real-world ransomware group analysis
Investigating a case of social engineering in the news