Basic – Computer Crime and Digital Evidence

Basic – Computer Crime and Digital Evidence

Overview

This program does not require approval by Private Training Institutions Branch (PTIB) of the Ministry of Advanced Education and Skills Training. As such, PTIB did not review this program.

This 10 module program will introduce students to the more common criminal offences in which a computer or network is the tool, target or place of the crime. Students will gain an understanding of the creation, movement and storage of digital information in an information technology infrastructure, the methodology used to obtain digital evidence and the legal requirements involved in the search and seizure of such evidence. The course will deal with the various methods utilized in the tracing of email and web site postings as well as the search and seizure of the evidence in the preparation for a criminal prosecution. On completion of the course the student will know how to recognize common computer crimes and locate the source of digital evidence. The student will also gain an understanding of the search and seizure requirements during the course of a criminal investigation involving computer crime.

Entry Requirements
Students must complete an intake with recruitment team.

  • Applicants must hold a high school diploma or be at least 19 years of age
  • Students under the age of 19 require their parent or guardian’s signature
  • Student must complete an intake with Admissions team member

Admission Requirements:

  • Applicants must provide a valid photo ID or birth certificate
  • Applicants must hold a high school diploma or be at least 19 years of age
  • Students under the age of 19 require their parent or guardian’s signature
  • Student must complete an intake with Admissions team member

Some of your career options:

  • computer systems analyst
  • informatics consultant
  • informatics security analyst
  • information systems business analyst
  • information systems quality assurance analyst
  • IT (information technology) consultant
  • management information systems (MIS) analyst
  • systems auditor
  • systems consultant
  • systems security analyst

Course Prerequisites
None

Course Duration
8 Weeks / 48 hours

Cost
CAD 850

Delivery Methods
Online| On-campus| Combined

Completion
Certificate

Learning Outcomes
Upon completion of this course the successful student will have reliably demonstrated the ability to:

  • Articulate the use of computers in committing criminal offenses and the movement and storage of digital information on the internet.
  • Explain the criminal offenses of Defamatory Libel, unauthorized use of a computer, and threatening.
  • Identify and locate email and web site identifiers used in locating source.
  • Trace email and web postings to source.
  • Determine when to use a Search Warrant as opposed to a Production Order and why.
  • Explain the importance of utilizing other investigative methods in support of the digital evidence obtained.

 

Student Progression and Reporting
Students will be assessed by daily attendance, assignments, and completion of in class activities.

Classroom Decorum 15%
Attendance 15%
In-Class Activities & Participation 10%
Quiz 10%
Assignment  30%
Final Exam  20%

Completion Requirements:
An overall grade of 70% must be achieved to successfully complete this course.

 

Minimum Technology Requirement:

Component Specification
Processor Intel Core i5 or AMD Ryzen 5 (or better)
RAM At least 8 GB
Storage Minimum 256 GB (SSD recommended)
Internet High-speed connection
Peripherals Webcam, Microphone, Headphones/Earbuds
Operating System Windows 10 or newer, macOS 10.14 or newer
Software Web browser (Chrome, Firefox, Safari, or Edge), Video conferencing tools (e.g., Zoom, Microsoft Teams)

 

 Course Schedule:

Modules Topics
1 Foundations of Digital Forensics

Language of Computer Crime Investigation

2 Digital Evidence in the Courtroom

Cybercrime Law

3 Conducting Digital Investigations

Handling a Digital Crime Scene

4 Investigative Reconstruction with Digital Evidence

Motive, and Technology

5 Violent Crime and Digital Evidence

Digital Evidence as Alibi

6 Sex Offenders on the Internet

Computer Intrusions

7 Cyber stalking

Computer Basics for Digital Investigators

8 Applying Forensic Science to Computers

Digital Evidence on Windows Systems

9 Digital Evidence on UNIX Systems
Digital Evidence on Macintosh Systems
Digital Evidence on Mobile Devices
10 Network Basics for Digital Investigators
Applying Forensic Science to Networks
Digital Evidence on the Internet
11 Review
12 Final Exam and wrap up.

 

 

Tuition & Fees

Tuition International: CAD 850 Domestic: CAD 850
Admin
(only if applicable)
Course retake: CAD 850 per course Copy of Transcript: CAD 20 per copy

Are you ready to take the next step toward your future career?

footer woman2 e1607543467282 testDamyan.jpg

Our Alumni Network