This 10 module program will introducestudents to the more common criminal offences in which a computer or network is the tool, target or place of thecrime. Students will gain an understanding of the creation, movement and storage of digital information in an information technology infrastructure, the methodology used to obtain digital evidence andthe legal requirements involved in the search and seizure of such evidence. The course will deal with the various methods utilized inthe tracing of email and web site postings as well as the search and seizure of the evidence in the preparation for a criminal prosecution. On completion of the course the student will know how to recognize common computer crimes and locate the source of digital evidence. The student will also gain an understanding of the search and seizure requirements during the course of a criminal investigation involving computer crime.
Students must complete an intake with recruitment team.
- Applicants must hold a high school diploma or be at least 19 years of age
- Students under the age of 19 require their parent or guardian’s signature
- Student must complete an intake with Admissions team member
Online| On-campus| Combined
Upon completion of this course the successful student will have reliably demonstrated the ability to:
- Articulate the use of computers in committing criminal offenses and the movement and storage of digital information on the internet.
- Explain the criminal offenses of Defamatory Libel, unauthorized use of a computer, and threatening.
- Identify and locate email and web site identifiers used in locating source.
- Trace email and web postings to source.
- Determine when to use a Search Warrant as opposed to a Production Order and why.
- Explain the importance of utilizing other investigative methods in support of the digital evidence obtained.
Student Progression and Reporting
Students will be assessed by daily attendance, assignments, and completion of in class activities.
|In-Class Activities & Participation||10%|
An overall grade of 70% must be achieved to successfully complete this course.
|1||Foundations of Digital Forensics
Language of Computer Crime Investigation
Digital Evidence in the Courtroom
Conducting Digital Investigations
Handling a Digital Crime Scene
|4||Investigative Reconstruction with Digital Evidence
Motive, and Technology
Violent Crime and Digital Evidence
Digital Evidence as Alibi
Sex Offenders on the Internet
Computer Basics for Digital Investigators
Applying Forensic Science to Computers
Digital Evidence on Windows Systems
|9||Digital Evidence on UNIX Systems
Digital Evidence on Macintosh Systems
Digital Evidence on Mobile Devices
Network Basics for Digital Investigators
Applying Forensic Science to Networks
Digital Evidence on the Internet
|12||Final Exam and wrap up.|