On the successful completion of the course, students will be able to:
1.Identify and describe techniques for cyber-fraud, online deception and scams
2. Distinguish between criminal hacking, and non-criminal hacking.
3. Describe how computer technologies have altered the ways in which theft, terrorism, ransoming, fraud, and identity crimes are committed.
4. Identify and distinguish the various types of viruses and malicious code.
5. Identify and define the primary security technologies used to protect information.
6. Explain the conflicting roles within law enforcement pertaining to investigation vs. intelligence gathering.
7. Identify the legal issues related to various cybercrime activities both domestically and internationally.
8. Describe social issues related to cybercrime including cyberbullying and harassment.