1Chapter 1. Computer Crimes
506.9 Exercise
21.1 Computer Crime
51Chapter 7. Cybersecurity Attacks
31.2 Cybercrime
527.1 Malware
41.3 Computer crime and cybercrime
537.2 SQL Injection
51.4 Distinction between Cyber Crime and
547.3 Denial-of-service
6Conventional Crimes
557.4 Man in the Middle Attacks
71.5 Cyber Forensics
567.5 Credential Reuse
81.6 Summary
577.6 Phishing
91.7 Exercise
587.7 Session Hijacking
10Chapter 2. Types of Cyber Crimes
597.8 Summary
112.1 Cyber TresPass
60Chapter 8. Copywriting Protection in Cyber World
122.2 Cyber Deceptions and Thefts
618.1 Components of cybersquatting definition
132.3 Cyber Pornography
628.2 Types of Cybersquatting
142.4 Cyber Violence
638.3 Prevention of Cybersquatting of
152.5 Classification of cyber crimes
64Your Domain
162.6 Summary
658.4 Copywriting Ownership and Assignment
172.7 Exercise
66the Internet
18Chapter 3. Cyber Criminals
678.8 Computer Software Piracy
193.1. Hackers
688.9 Summary
203.2 Organized Hackers
698.10 Exercise
213.3 Internet stalkers
70Chapter 9. Regulatory Framework
223.4 Disgruntled Employees
719.1 Introduction
233.5 Summary
729.2 Types of Cybersecurity Frameworks
243.6 Exercise
739.3 NIST Cybersecurity Framework
25Chapter 4. Identity Thefts
749.4 CIS Framework
264.1 Identity Thefts
759.5 The International Standards Organization
274.2 Types of Identity Theft
76(ISO) frameworks ISO/IEC 27001 and 27002
284.3 Techniques of Identity thefts
779.6 Summary
294.4 Steps of Prevention
789.7 Exercise
304.5 Summary
79Chapter 10. Cyber Protection Laws Worldwide
314.6 Exercise
8010.1 Data protection privacy laws
32Chapter 5. Cloud Computing
8110.2 Cybercrime laws
33 5.1 Introduction to cloud
8210.3 Consumer Protection Laws
345.2 Cloud Deployment Models
8310.4 Summary
355.3 Cloud Computing threats
8410.5 Exercise
365.4 Cloud Computing attacks
85Chapter 11. Case Studies
375.5 Cloud security control layers
8611.1 Case Study 1: Ransomware group LockBit
385.6 Penetration Testing
87attacks Bangkok Airways and releases
395.7 Summary
88passenger data, including passport and
405.8 Exercise
89credit card information
41Chapter 6. Cryptography
9011.2 Case Study 2: Defending The DA’s Office
426.1 Features of Cryptography
91Network Security Saves San Francisco Millions
436.3 Encryption Algorithms (pt. 1)
9211.3 Case Study 3: Uber Data Breach – 57
446.3 Encryption Algorithms (pt. 2)
93Million Records
456.4 Public Key Infrastructure
9411.4 Case Study 4: Colonial Pipeline
466.5 Email Encryption
9511.5 Summary
476.6 Disk Encryption
9611.6 Exercise
486.7 Cryptography Attacks
97Glossary (pt. 1)
496.8 Summary
98Glossary (pt. 2)