Introduction and Overview
  • Introduction
01 Defining Cybercrime
  • 01.1 Is there a problem?
  • 01.2 What is Cybercrime?
  • 01.2
  • 01.3 What does that mean in real life?
  • 01.3
  • 01.4 Common types of attack
  • 01.4
02 What is Evidence?
  • 02.1.1 Traditional v Digital Evidence? Part 1
  • 02.1.2 Traditional v Digital Evidence Part Two
  • 02.1
  • 02.2 The Big Connection
  • 02.3 Sources of Evidence
  • 02.3
03 Bits and Pieces
  • 03.1 Just Calculators
  • 03.2 Filing Systems
  • 03.3 Memorising
  • 03.1-03.3
  • 03.4 Spot the memory
  • 03.5 The Internet
  • 03.6 World Wide Web
  • 03.4-03.6
04 The Computer Chronicles
  • 04.1 A Historical Perspective
05 Who Hacks?
  • 05.1 The Criminals
  • 05.2 Nation States
  • 05.3 Hacking Back
  • 04.1 - 05.2
06 Delving in the Digitals
  • 06.1 Crime Scene
  • 06.2 Faraday Bags
  • 06.3 Who are you looking at?
  • 06.4 Web Server Logs.
  • 06.5 Dead Forensics
  • 06.6 Stored Data
  • 06.7 Hide & Seek
  • 06.1 - 06.7
07 Knowing your onions
  • 07.1 TOR to the Dark Net
  • 07.2 Hidden Sites
  • 07.1-07.2
08 Spamming
  • 08.1 Spam Business
09 Passwords
  • 09.1 Passwords, Codes and Hacking.
10 Currency in Bits
  • 10.1 Bitcoinisticism
  • 08.1 - 10.1
11 Afterword.
  • 11.1 Afterword Part 1
  • 11.1 The Ultimate Quiz
  • 11.1 Afterword Part 2
BONUS SECTION - Update
  • Bonus Lecture 1 Update to Autumn 2017 PART ONE
  • Bonus Lecture 2 Update to Autumn 2017 PART TWO