Overview
This program does not require approval by Private Training Institution Regulatory Unit (PTIRU) of the Ministry of Advanced Education and Skills Training. As such, PTIRU did not review this program.
This 10 module program will introduce students to the more common criminal offences in which a computer or network is the tool, target or place of the crime. Students will gain an understanding of the creation, movement and storage of digital information in an information technology infrastructure, the methodology used to obtain digital evidence and the legal requirements involved in the search and seizure of such evidence. The course will deal with the various methods utilized in the tracing of email and web site postings as well as the search and seizure of the evidence in the preparation for a criminal prosecution. On completion of the course the student will know how to recognize common computer crimes and locate the source of digital evidence. The student will also gain an understanding of the search and seizure requirements during the course of a criminal investigation involving computer crime.
Entry Requirements
Students must complete an intake with recruitment team.
- Applicants must hold a high school diploma or be at least 19 years of age
- Students under the age of 19 require their parent or guardian’s signature
- Student must complete an intake with Admissions team member
Admission Requirements:
Basic Requirements
- High School Completion: Applicants must have a high school diploma or an equivalent qualification.
- Age Requirement: Minimum 19 years of age.
- Mature Student Status*: Applicants who have not completed high school and are at least 19 years of age, may apply as a mature student.
*Mature student status may be granted to applicants who are over 19 years old and have not completed high school or equivalent. The applicants will be considered for admission based on the skills and experience they have acquired since leaving school. The applicant is required to provide the most recent transcripts or proof of academic accomplishments, a resume or summary of professional accomplishments, and two letters of recommendation from both their current and previous employers. The applicant may be interviewed by the Registrar’s or Academic office to further assess their suitability for admission to the program of study.
Some of your career options:
- computer systems analyst
- informatics consultant
- informatics security analyst
- information systems business analyst
- information systems quality assurance analyst
- IT (information technology) consultant
- management information systems (MIS) analyst
- systems auditor
- systems consultant
- systems security analyst
Course Prerequisites
None
Course Duration
8 Weeks / 48 hours
Cost
CAD 850
Delivery Methods
Online| On-campus| Combined
Completion
Certificate
Learning Outcomes
Upon completion of this course the successful student will have reliably demonstrated the ability to:
- Articulate the use of computers in committing criminal offenses and the movement and storage of digital information on the internet.
- Explain the criminal offenses of Defamatory Libel, unauthorized use of a computer, and threatening.
- Identify and locate email and web site identifiers used in locating source.
- Trace email and web postings to source.
- Determine when to use a Search Warrant as opposed to a Production Order and why.
- Explain the importance of utilizing other investigative methods in support of the digital evidence obtained.
Student Progression and Reporting
Students will be assessed by daily attendance, assignments, and completion of in class activities.
Classroom Decorum | 15% |
Attendance | 15% |
In-Class Activities & Participation | 10% |
Quiz | 10% |
Assignment | 30% |
Final Exam | 20% |
Completion Requirements:
An overall grade of 70% must be achieved to successfully complete this course.
Minimum Technology Requirement:
Component | Specification |
Processor | Intel Core i5 or AMD Ryzen 5 (or better) |
RAM | At least 8 GB |
Storage | Minimum 256 GB (SSD recommended) |
Internet | High-speed connection |
Peripherals | Webcam, Microphone, Headphones/Earbuds |
Operating System | Windows 10 or newer, macOS 10.14 or newer |
Software | Web browser (Chrome, Firefox, Safari, or Edge), Video conferencing tools (e.g., Zoom, Microsoft Teams) |
Course Schedule:
Modules | Topics |
1 | Foundations of Digital Forensics
Language of Computer Crime Investigation |
2 | Digital Evidence in the Courtroom
Cybercrime Law |
3 | Conducting Digital Investigations
Handling a Digital Crime Scene |
4 | Investigative Reconstruction with Digital Evidence
Motive, and Technology |
5 | Violent Crime and Digital Evidence
Digital Evidence as Alibi |
6 | Sex Offenders on the Internet
Computer Intrusions |
7 | Cyber stalking
Computer Basics for Digital Investigators |
8 | Applying Forensic Science to Computers
Digital Evidence on Windows Systems |
9 | Digital Evidence on UNIX Systems Digital Evidence on Macintosh Systems Digital Evidence on Mobile Devices |
10 | Network Basics for Digital Investigators Applying Forensic Science to Networks Digital Evidence on the Internet |
11 | Review |
12 | Final Exam and wrap up. |
Tuition & Fees
Tuition | International: CAD 850 | Domestic: CAD 850 |
Admin (only if applicable) |
Course retake: CAD 850 per course | Copy of Transcript: CAD 20 per copy |