Cybercrime

This course is part of Cyber Security – Technology and Governance Specialization

Instructor: Konstantinos Mersinas

Skills you'll gain

  •   Cyber Threat Intelligence
  •   Culture
  •   Human Factors (Security)
  •   Cybersecurity
  •   Survey Creation
  •   Psychology
  •   Investigation
  •   Social Sciences
  •   Cyber Attacks
  •   Threat Modeling
  •   Research
  •   Security Awareness
  • There are 4 modules in this course

    You will learn about the difficulties in measuring the occurrence, the frequency and the impact of cybercrime, and build a scepticism on the reliability and the interpretation of cybercrime reports. You will be introduced to discussion about human aspects of cybercrime, in particular, the actors related to cybercrime, that is, the criminals, the victims, and law enforcement. You will also learn about aspects such as personality, national and organisational culture, security culture, training, and other components which affect cybercriminal activity. Finally, you will dive into what is arguably the most important attack vector in cybercrime, that is, social engineering. You will gain an understanding of how it occurs, which techniques social engineers utilise, and which are the underlying psychological principles which make all of us – as humans – susceptible to social engineering attacks. By the end of the course you should be able to: • Reflect on the main questions related to cybercrime. • Explain the meaning, definitions, importance, and impact of cybercrime. • Assess the reliability and the interpretation of reports and surveys related to cybercrime. • Identify the various classifications of cybercrime, the related threats, and threat actors. • Explain the key role of human aspects in cybercrime. • Differentiate between the various actors involved in cybercrime and their associated perspectives. • Evaluate the underlying psychological principles which make social engineering the most successful attack vector in cybercrime. • Describe how deception and social engineering manifest and how they can be defended against.

    Cybercrime threats, actors and surveys

    Humans and cybercrime

    Social engineering

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved