Lecture 1 - Introduction to Internet and Crimes
Lecture 2 - Introduction to Internet and (Cyber) Crimes - Part A
Lecture 3 - Introduction to Internet and (Cyber) Crimes - Part B
Lecture 4 - Cyber War and Use of Internet by Terrorists - Part - I
Lecture 5 - Cyber War and Use of Internet by Terrorists - Part - II
Lecture 6 - Crimes Against Women in Internet
Lecture 7 - Deep Web and Dark Web
Lecture 8 - Internet and Child Sexual Abuse in India: Policy and Laws
Lecture 9 - Information Technology Act-An Overview - Part A
Lecture 10 - Information Technology Act-An Overview - Part B
Lecture 11 - Law of Digital Evidence and its Admissibility in Courts
Lecture 12 - Liability of Internet Service Providers and Case studies
Lecture 13 - Cyber Fraud - Part A
Lecture 14 - Cyber Fraud - Part B
Lecture 15 - Emerging Issues and Crimes in Internet and Data Protection (Privacy)
Lecture 16 - Introduction to Cyberspace and Cyber Security
Lecture 17 - Basics of Cyber Control Systems
Lecture 18 - Understanding Digital Data and Digital Footprints
Lecture 19 - Introduction to Cyber Threats and Attacks
Lecture 20 - Cyber Threats and Attacks : Technical Understandings
Lecture 21 - Introduction to tools and techniques to Counter Cyber Attacks using VAPT Services
Lecture 22 - Tools and Techniques for Vulnerability Assessment
Lecture 23 - Tools and Techniques for Penetration Testing
Lecture 24 - Understanding Social Media Crimes
Lecture 25 - SOCMINT Investigation for Social Media Crimes
Lecture 26 - Fake News Analysis : Social media Crimes
Lecture 27 - Understanding Threats from Deep web - Part 1
Lecture 28 - Understanding Threats from Dark web - Part 2
Lecture 29 - Basics of Cyber Forensics
Lecture 30 - Introduction to Cyber Threat Intelligence
Lecture 31 - Modus operandi of criminal, Investigation Process, Forensics - Part 1
Lecture 32 - Modus operandi of criminal, Investigation Process, Forensics - Part 2
Lecture 33 - Difficulties in Cyber Crimes Investigation
Lecture 34 - Probative value of Digital Evidence - Part 1
Lecture 35 - Probative value of Digital Evidence - Part 2
Lecture 36 - Live Forensics Using Encase FTK
Lecture 37 - Digital Artifact Sources and Investigation
Lecture 38 - Understanding Extracted Logs, Reports of Digital Artifacts
Lecture 39 - Introduction to Cyber Crimes
Lecture 40 - Digital Evidence Preservation and Chain of Custody
Lecture 41 - Challenges to Cybercrime Investigation