Introduction to Cybercrime

Dates: TBD

Cybercrime graphicThis 16 hour course offers an introduction to cybercrime, including: computer hacking, malware, data theft, identity theft, spam, harassment, stalking, child porn/exploitation, prostitution, revenge porn, and extremism. The class will also include information on computer hardware and software used to commit cybercrime as well as techniques for identification of basic investigative information such as IP addresses, MAC addresses, and email headers.

  • Objectives & Goals
    •  At the completion of training the trainee will be able to:
      • identify the differences between the Internet and World Wide Web
      • identify basic points of information to support investigations, including IP addresses and email headers
      • differentiate between the various forms of malware circulating on-line
      • identify common email fraud schemes and the language techniques used by scammers to entice victims
      • recognize the basic technologies (applications and equipment) employed by individuals to share sexual content with others, and how those devices are subverted to engage in child sexual exploitation
      • recognize differences between stalking on and off-line
      • identify the negative consequences associated with cyberbullying
      • recognize the ways that domestic and international terror groups utilize technology
  • Course Outline
    • students will learn the basic hardware, software, and devices that compose the Internet, World Wide Web, the IoT, and the Darkweb (90 minutes)
    • the basic cybercrime typology (60 minutes)
    • the fundamental social dynamics of hacking, and tools used by hackers (150 minutes)
    • identify the range of malicious software used by computer attackers (120 minutes)
    • understand the various email scam types, and the role of social engineering in fraud (90 minutes)
    • identify the technologies used in sexting, pornography production, and child porn distribution (120 minutes)
    • understand the role of on-line communications platforms used by sex workers and the clients to solicit paid sexual encounters  (90 minutes)
    • identify the differences between cyberbullying and cyberstalking (120 minutes)
    • understand the use of on-line communications platforms as a basis for radicalization, fundraising, and cyberattacks by extremist groups (120 minutes)
  • Completion Requirements – students must attend 80% of training
  • Course Location –

Computer Center Rm 403
450 Auditorium Road
Michigan State University
East Lansing, MI 48824

  • Cost – $400.00

Registration is now closed.

Thomas Holt

Photo of Thomas HoltDr. Thomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University specializing in cybercrime, technology, and deviance. His research focuses on computer hacking, malware, and the role that technology and the Internet play in facilitating all manner of crime and terror. Dr. Holt has been published in a variety of academic journals, including British Journal of Criminology, Crime and Delinquency, Deviant Behavior, and the Journal of Criminal Justice. He is also a coauthor of the books Cybercrime and Digital Forensics: An Introduction (2015) and Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses (2016), both published through Routledge. Dr. Holt's work on cybercrime and cyberterror has been funded by the National Institute of Justice and the National Science Foundation. He is also the current director of the International Interdisciplinary Research Consortium on Cybercrime, a global initiative to link cybercrime and cybersecurity researchers from both the technical and social sciences together to improve the state of research on these issues.