Course Description
This course will provide the student a rudimentary understanding of the expanding field of computer crime investigation. Through the examination of the operations and interrelationship of computers, software and the internet, the unique challenges, limitations, liabilities and goals of the computer crime investigator will be revealed to the student. Also addressed will be the emerging forensic science field of forensic computer examination.
Prerequisite(s)
LAWF 1733 or consent of instructor - Must be completed prior to taking this course.
At the end of this course, students will be able to:
- Identify what constitutes a computer crime.
- Identify certifications available for forensic computer examination.
- Identify the unique traits of electronic evidence.
- Discuss the challenges to successful collection, storage and examination of electronic evidence.
- Discuss the relationship between investigators, forensic examiners, civilian experts and prosecutors engaged in a computer investigation.
- Discuss the role computers play in the exploitation of children.
- Explain the ECPA and PPA and how they effect computer crime investigation.
- Discuss the requirements and procedures for obtaining a subpoena and what information relating to computer crime investigation is available with this legal process.
- Discuss the type of hardware and software necessary for a forensic computer examination.
- Explain the process of a forensic computer examination.
- Identify the type of information obtainable through a forensic computer examination.
- Discuss the limitations of traditional law enforcement jurisdiction as it relates to the investigation of computer crime.
- Identify the unique aspects and challenges of computer crime investigation.
- Discuss the major goals of a computer crime investigation.
- Explain the necessary traits of a successful computer crime investigator.
- Explain the unique potential liabilities of a computer crime investigator.
- Discuss what constitutes a forensic computer examiner.
- Identify sources of computer crime investigation training.
- Identify resources available to the computer crime investigator.