Overview
This program does not require approval by Private Training Institutions Branch (PTIB) of the Ministry of Advanced Education and Skills Training. As such, PTIB did not review this program.
This 10 module program will introduce students to the more common criminal offences in which a computer or network is the tool, target or place of the crime. Students will gain an understanding of the creation, movement and storage of digital information in an information technology infrastructure, the methodology used to obtain digital evidence and the legal requirements involved in the search and seizure of such evidence. The course will deal with the various methods utilized in the tracing of email and web site postings as well as the search and seizure of the evidence in the preparation for a criminal prosecution. On completion of the course the student will know how to recognize common computer crimes and locate the source of digital evidence. The student will also gain an understanding of the search and seizure requirements during the course of a criminal investigation involving computer crime.
Entry Requirements
Students must complete an intake with recruitment team.
- Applicants must hold a high school diploma or be at least 19 years of age
- Students under the age of 19 require their parent or guardian’s signature
- Student must complete an intake with Admissions team member
Admission Requirements:
- Applicants must provide a valid photo ID or birth certificate
- Applicants must hold a high school diploma or be at least 19 years of age
- Students under the age of 19 require their parent or guardian’s signature
- Student must complete an intake with Admissions team member
Some of your career options:
- computer systems analyst
- informatics consultant
- informatics security analyst
- information systems business analyst
- information systems quality assurance analyst
- IT (information technology) consultant
- management information systems (MIS) analyst
- systems auditor
- systems consultant
- systems security analyst
Course Prerequisites
None
Course Duration
8 Weeks / 48 hours
Cost
CAD 850
Delivery Methods
Online| On-campus| Combined
Completion
Certificate
Learning Outcomes
Upon completion of this course the successful student will have reliably demonstrated the ability to:
- Articulate the use of computers in committing criminal offenses and the movement and storage of digital information on the internet.
- Explain the criminal offenses of Defamatory Libel, unauthorized use of a computer, and threatening.
- Identify and locate email and web site identifiers used in locating source.
- Trace email and web postings to source.
- Determine when to use a Search Warrant as opposed to a Production Order and why.
- Explain the importance of utilizing other investigative methods in support of the digital evidence obtained.
Student Progression and Reporting
Students will be assessed by daily attendance, assignments, and completion of in class activities.
Classroom Decorum | 15% |
Attendance | 15% |
In-Class Activities & Participation | 10% |
Quiz | 10% |
Assignment | 30% |
Final Exam | 20% |
Completion Requirements:
An overall grade of 70% must be achieved to successfully complete this course.
Minimum Technology Requirement:
Component | Specification |
Processor | Intel Core i5 or AMD Ryzen 5 (or better) |
RAM | At least 8 GB |
Storage | Minimum 256 GB (SSD recommended) |
Internet | High-speed connection |
Peripherals | Webcam, Microphone, Headphones/Earbuds |
Operating System | Windows 10 or newer, macOS 10.14 or newer |
Software | Web browser (Chrome, Firefox, Safari, or Edge), Video conferencing tools (e.g., Zoom, Microsoft Teams) |
Course Schedule:
Modules | Topics |
1 | Foundations of Digital Forensics
Language of Computer Crime Investigation |
2 | Digital Evidence in the Courtroom
Cybercrime Law |
3 | Conducting Digital Investigations
Handling a Digital Crime Scene |
4 | Investigative Reconstruction with Digital Evidence
Motive, and Technology |
5 | Violent Crime and Digital Evidence
Digital Evidence as Alibi |
6 | Sex Offenders on the Internet
Computer Intrusions |
7 | Cyber stalking
Computer Basics for Digital Investigators |
8 | Applying Forensic Science to Computers
Digital Evidence on Windows Systems |
9 | Digital Evidence on UNIX Systems Digital Evidence on Macintosh Systems Digital Evidence on Mobile Devices |
10 | Network Basics for Digital Investigators Applying Forensic Science to Networks Digital Evidence on the Internet |
11 | Review |
12 | Final Exam and wrap up. |
Tuition & Fees
Tuition | International: CAD 850 | Domestic: CAD 850 |
Admin (only if applicable) |
Course retake: CAD 850 per course | Copy of Transcript: CAD 20 per copy |