This module is a resource for lecturers
Possible class structure
The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.
Introduction and learning outcomes
Lecture (10 minutes):
- Provide a brief introduction to the class and its contents
- Identify and discuss the learning outcomes of the class
Cybercrime reporting
Lecture (30 minutes):
- Discuss and assess cybercrime reporting practices
- Have students complete " Exercise # 1 - Who Are You Going to Call?" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].
Who conducts cybercrime investigations?
Lecture (40 minutes):
- Identify and discuss the stakeholders involved in cybercrime investigations
- Have students complete " Homework # 1 ~ National Security Agencies and their Roles in Cybercrime Investigations" under the "Student Assessment" section of this Module before class and have them discuss their findings during the lecture.
Break
Time: 10 minutes
Obstacles to cybercrime investigations
Lecture (50 minutes):
- Explain and critically evaluate the obstacles encountered during cybercrime investigations
- Assign students to complete " Exercise # 2 ~ Hypothetical Cybercrime Investigation" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].
[ Optional: Have students complete " Homework # 2 ~ Regional Internet Registry" under the "Student Assessment" section of this Module before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or merely come prepared to discuss their findings in class].
[ Optional: Instruct students to complete " Exercise # 4 ~ GDPR and WHOIS" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or merely come prepared to discuss their findings in class].
Knowledge management
Lecture (40 minutes):
- Describe the role of knowledge management in cybercrime investigations
- Have students complete " Exercise # 3 ~ Who Responds?" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].
Next: Core reading
Back to top