Search

Filter

All Certificate and Diploma Programs Pathway Programs Online Programs

Basic – Computer Crime and Digital Evidence

This 10 module program will introducestudents to the more common criminal offences in which a computer or network is the tool, target or place of thecrime. Students will gain an understanding of the creation, movement and storage of digital information in an information technology infrastructure, the methodology used to obtain digital evidence andthe legal requirements involved in the search and seizure of such evidence. The course will deal with the various methods utilized inthe tracing of email and web site postings as well as the search and seizure of the evidence in the preparation for a criminal prosecution. On completion of the course the student will know how to recognize common computer crimes and locate the source of digital evidence. The student will also gain an understanding of the search and seizure requirements during the course of a criminal investigation involving computer crime.

ENTRY REQUIREMENTS
Students must complete an intake with recruitment team.
• Applicants must provide a valid photo ID or birth certificate
• Applicants must hold a high school diploma or be at least 19 years of age
• Students under the age of 19 require their parent or guardian’s signature
• Student must complete an intake with Admissions team member

COURSE PREREQUISITES
None

COURSE DURATION
40 hours

COST
$850

DELIVERY METHODS

Online| On-campus| Combined

COMPLETION
Certificate

LEARNING OUTCOMES
Upon completion of this course the successful student will have reliably demonstrated the ability to:

  • Articulate the use of computers in committing criminal offenses and the movement and storage of digital information on the internet.
  • Explain the criminal offenses of Defamatory Libel, unauthorized use of a computer, and threatening.
  • Identify and locate email and web site identifiers used in locating source.
  • Trace email and web postings to source.
  • Determine when to use a Search Warrant as opposed to a Production Order and why.
  • Explain the importance of utilizing other investigative methods in support of the digital evidence obtained.

STUDENT PROGRESSION AND REPORTING
Students will be assessed by daily attendance, assignments, and completion of in class activities.

Classroom Decorum 15%
Attendance 15%
In-Class Activities & Participation 10%
Quiz 10%
Assignment  30%
Final Exam  20%

 

COMPLETION REQUIREMENTS:

An overall grade of 70% must be achieved to successfully complete this course.

 

COURSE SCHEDULE:

Modules Topics
1 Foundations of Digital Forensics

Language of Computer Crime Investigation

2

Digital Evidence in the Courtroom

Cybercrime Law

3

Conducting Digital Investigations

Handling a Digital Crime Scene

4 Investigative Reconstruction with Digital Evidence

Motive, and Technology

5

Violent Crime and Digital Evidence

Digital Evidence as Alibi

6

Sex Offenders on the Internet

Computer Intrusions

7 Cyber stalking

Computer Basics for Digital Investigators

8

Applying Forensic Science to Computers

Digital Evidence on Windows Systems

9 Digital Evidence on UNIX Systems

Digital Evidence on Macintosh Systems

Digital Evidence on Mobile Devices

10

Network Basics for Digital Investigators

Applying Forensic Science to Networks

Digital Evidence on the Internet

11 Review
12 Final Exam and wrap up.

 

 

Micro-Credentials

Call 1-604-677-3866
to speak with an Eton College representative.

PATHWAY INFORMATION

ACADEMIC PROGRAMS AT PARTNER UNIVERSITY

CONTACT US ​

GET IN TOUCH :

604-677-ETON (3866) or 604-569-3896

CONTACT US

GET IN TOUCH :

604-677-ETON (3866) or 604-569-3896