Cybersecurity Intro for Criminal Justice
  • Home
  • Modules
    • Introduction to Cybersecurity
      • Cybersecurity Overview
      • Computer Security, Internet Security, and Privacy
      • Terminology
      • Passwords
      • Review
      • Knowledge Check
      • Case Study
      • References and Resources
    • Computer Security
      • Computer Security Overview
      • Malware Overview
      • Data Kidnapping
      • Eavesdropping
      • Masquerading
      • Launchpads
      • Sidestepping
      • Malware Defense Overview
      • Security Updates
      • Antimalware
      • Firewalls
      • Ransomware Prevention
      • Incident Response
      • Detection and Analysis
      • Containment Strategies
      • Eradication and Recovery
      • Digital Forensics
      • Documentation
      • Review
      • Knowledge Check
      • Case Study
      • References and Resources
    • Internet Security
      • Internet Security Overview
      • Digital Evidence
      • Internet Layers
      • Internet Security Risks
      • Online Threats
      • Online Attacks
      • Strategies and Signals
      • Security-Related Indicators
      • Strategies for Internet Defense
      • Review
      • Knowledge Check
      • Case Study
      • References and Resources
    • Privacy
      • Privacy Overview
      • Data Theft
      • Cryptology Overview
      • Benefits of Cryptologys
      • Types of Cryptology
      • Cryptoanalysis
      • Cryptographic Protection
      • Encryption
      • Cookies
      • Review
      • Knowledge Check
      • Case Study
      • References and Resources
  • Virtual Labs
    • Risk Management
    • Ransomware
    • Cybersecurity Lab
    • Phishing Quiz
    • Types of Attacks
    • AES
    • Hash Functions
  • Contact Us
  • ChatBot
  • Module 1: Introduction to Cybersecurity
    • 1.0: Cybersecurity for Criminal Justice
    • 1.1: Computer Security, Internet Security, and Privacy
    • 1.2: Terminology
    • 1.3: Passwords
    • Module 1 Review
    • Virtual Lab: Risk Management
    • Module 1 Knowledge Check
    • Case Study
    • References
  • Module 2: Computer Security
    • 2.0: Introduction to Computer Security
    • 2.1: Malware
    • 2.2: Defending Against Malware
    • 2.3: Incident Response
    • Module 2 Review
    • Virtual Lab: Ransomware
    • Virtual Lab: Cybersecurity lab
    • Module 2 Knowledge Check
    • Case Study
    • References
  • Module 3: Internet Security
    • 3.0 Introduction to Internet Security
    • 3.1 Digital Evidence
    • 3.2 Internet Layers
    • 3.3 Internet Security Risks
    • 3.4 Internet Defense
    • Module 3 Review
    • Virtual Lab: Phishing Quiz
    • Virtual Lab: Types of Attacks
    • Module 3 Knowledge Check
    • Case Study
    • References
  • Module 4: Privacy
    • 4.0: Introduction to Privacy
    • 4.1: Understanding Data Theft
    • 4.2: Intro to Cryptography
    • 4.3: Cookies
    • Module 4 Review
    • Virtual Lab: AES
    • Virtual Lab: Hash Functions
    • Module 4 Knowledge Check
    • Case Study
    • References