Skip to main content
Technology-Enabled Learning Lounge
Guest
Log in
Help
Social networks
Page path
Home
Courses
ICT Skills
Computer Security, Forensics and Ethical Hacking
Unit 1: Introduction
Discussion Forum: Cyber Crime
Search
Search forums
Computer Security, Forensics and Ethical Hacking
Discussion Forum: Cyber Crime
Return to: Unit 1: Introdu...
Discuss two examples of cyber crime and elaborate on each.
Discussion
Started by
Replies
Last post
Examples of Cyber Crime
Prince Kwame Avornyo
0
Prince Kwame Avornyo
Sat, 9 Jan 2021, 2:26 PM
Examples of Cyber Crime & its Elaboration
VINOD VERMA
0
VINOD VERMA
Thu, 3 Dec 2020, 10:40 AM
Examples of Cyber Crime and its Ellaboration
Abraham Selby
0
Abraham Selby
Wed, 2 Dec 2020, 6:31 AM
Identity theft and Fraud.
Francis Kanene
1
Francis Kanene
Wed, 4 Nov 2020, 2:17 AM
Cyber Crime and digital forensic
Ibrahim Uthman
0
Ibrahim Uthman
Sat, 3 Oct 2020, 2:42 AM
Internet of Things
Jim Burnette
0
Jim Burnette
Sat, 20 Jun 2020, 10:10 AM
◄ Unit 1: Introduction to Computer Forensics(PDF Format)
Jump to...
Jump to...
Course Learning Objectives
Course Structure
Course Assessment
Announcements
Unit 1: Introduction to Computer Forensics(PDF Format)
Report Writing: Cyber Crime
Discussion Forum: Disk Defragmentation
References & Further Readings
Unit Summary
Unit 2: COL Memory Forensics (PDF Format)
Discussion Forum: Forensics Investigation
Learning Activity 1: Forensic Examiner
Learning Activity 2: Forensic Examination
References & Further Readings
Unit Summary
Unit 3: Computer Forensics Tools (PDF Format)
Discussion Forum: File System
Learning Activity 1: File Recovery
Learning Activity 2: Forensic Investigation
References & Further Readings
Unit Summary
Unit 4: COL Investigation Process (PDF Format)
Learning Activity 1: Incidents
Discussion Forum: Data & Evidences
References & Further Readings
Unit Summary
Unit 5: Ethical Hacking (PDF Format)
Learning Activity 1: Hackers and Hacking Process
Learning Activity 2: Malwares
Online Quiz: Ethical Hacking
References & Further Readings
Unit Summary
Submission Box
Report Writing: Cyber Crime ►
Social networks