Mar 05, 2026  
Elmira College Undergraduate Catalog for the 2025-2026 Academic Year 
    
Elmira College Undergraduate Catalog for the 2025-2026 Academic Year
Add to Favorites (opens a new window)

CYS 2010 - CYBERCRIME AND GOVERNANCE


credits: 3.0
Cybercrime is one of the biggest threats companies face on a daily basis, and they are constantly looking for new hires to help protect them. In this course, will get a firsthand look at the methods used to commit cybercrimes. Also will  learn how governments detect, investigate, and stop these crimes, and become familiar with the laws and policies in place to deter cybercriminals. This online class has optional live sessions. Cybercriminals: Students will learn how cybercriminals operate, focusing on how they plan cyber-attacks and hide their presence. Cybercrime Trends: Students will study trends in cybercrime, becoming informed on emerging schemes and present-day threats. Additionally, they will learn about the history of cybercrime, and review examples of the most notorious historical cybercrimes. Preventative Measures and Corrective Actions: Students will learn how to identify targets and potential victims of cybercriminals and will become familiar with the necessary steps to stop cyber attacks against said targets. Cryptocurrency in Cybercrime: Students will explore the role of cryptocurrency in funding and facilitating cybercrime and learn how cybercriminals buy and sell malware using the dark web. Objectives: A) Recommend countermeasures to protect networks and systems from being victimized by a cybercrime scheme by putting yourself in the shoes of a hacker and B) Detect, report, analyze, and mitigate cybercrimes using a combination of open- source intelligence and cyber tools; C) Identify the cyberspace practices that put you at risk for hacking and the possible consequences; D) Install free, open-source cyber tools that criminals use to commit cybercrimes. Install free, open-source defensive cyber tools to investigate cybercrimes; E) Use open-source intelligence to analyze cybercrime; F) Identify the different types of hackers, their motivations, and their subculture; G) Distinguish between the cyberthreats created by cyberwarfare and cyberterrorism, and the various nation-states posing the greatest threats to cybersecurity; H) Take actions to report, investigate, and mitigate cybercrimes; I) Explain the significant policies and laws that govern domestic and international cybercrime and privacy. Method of Evaluation: Onboarding Assignments 100  10%; Discussions  150  15%; Quizzes 200  20%; Labs  250  25%; and Final Project  300  30%.

Prerequisite(s): CYS 1010  



Add to Favorites (opens a new window)