Insights into cybercrime and electronic evidence
4.2 (162 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,306 students enrolled

Insights into cybercrime and electronic evidence

A basic introduction for non-technicians with a background or interest in criminal justice.
4.2 (162 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
5,306 students enrolled
Last updated 4/2018
English
English
Price: Free
This course includes
  • 6 hours on-demand video
  • 29 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What you'll learn
  • By following this course, participants can expect to acquire a firm grasp and understanding of the nature and impact of cybercrime in today's world.
  • Participants will know and appreciate the considerations, adjustments and accommodations that traditional criminal justice systems must make in order to address the new challenges created by digital/electronic evidence.

  • Real life examples will be given and some of the shortcomings in current approaches will be discussed.

Requirements
  • An understanding of the principles of evidence will be helpful, but not essential - all technical concepts are explained and nothing more than a basic knowledge or understanding of computers is either required or expected..
Description

This is a brief and basic introduction to cybercrime and electronic evidence aimed primarily at those criminal justice professionals who are not computer experts, but who find themselves confronted and confounded by the technological realities of our time. The course may also appeal to students and others who are just curious about the subject too.

The course introduces the main themes, threats, challenges and conundrums posed by this most modern of crime phenomena and explores some of the solutions adopted by criminal justice to try to cope with them.

This is an introductory course and seeks to explain technical concepts in terms of every day, common experience. For this reason some of technical areas have been simplified and rationalised to make them more accessible to and understandable by the uninitiated.

It consists of a series of ten 'Chapters' subdivided into videos that explore key topics. They are supported by a number of quizzes to help learners to check their progress and understanding.


Who this course is for:
  • This is NOT a course for computer experts. It is a BASIC, ENTRY-LEVEL introduction to the subject of cybercrime and electronic evidence for all criminal justice professionals and students (or those simply interested in the subject) who find themselves confronted and confounded by the technological realities of our time.
Course content
Expand all 35 lectures 06:01:40
+ Introduction and Overview
1 lecture 04:31

This lecture provides an overview of the course, describing the different chapters or lectures.

Introduction
04:31
+ 01 Defining Cybercrime
4 lectures 51:58

Quantifying the extent and size of the threat from cybercrime.

01.1 Is there a problem?
04:24

Towards a definition of the criminal behaviour charactersied as cybercrime and how it is variously defined.

01.2 What is Cybercrime?
11:05
01.2
1 question

How the legal definitions translate into real life experience.

01.3 What does that mean in real life?
19:42
01.3
2 questions

A description of some of the most common types of cyber attack.

01.4 Common types of attack
16:47
01.4
4 questions
+ 02 What is Evidence?
4 lectures 47:34

Notions of evidence have developed over centuries, but the advent of digital evidence has created an uncomfortable tension between traditional approaches and modern needs. Here we explore some of the causes for that discomfort.

02.1.1 Traditional v Digital Evidence? Part 1
11:19

Notions of evidence have developed over centuries, but the advent of digital evidence has created an uncomfortable tension between traditional approaches and modern needs. Here we explore some of the causes for that discomfort (Part Two)

02.1.2 Traditional v Digital Evidence Part Two
16:29
02.1
3 questions

Devices (and therefore sources of evidence) are increasingly connected. The potential connections and their implications are discussed in this video.

02.2 The Big Connection
11:01

This video looks at different evidential sources.

02.3 Sources of Evidence
08:45
02.3
5 questions
+ 03 Bits and Pieces
6 lectures 47:01

Computers can be thought of as presumptuous adding machines. This lecture explains why.

03.1 Just Calculators
07:31

A brief overview of the different systems used to file data.

03.2 Filing Systems
06:42

How does computer memory work? Here are the basics.

03.3 Memorising
07:30
03.1-03.3
7 questions

This is a virtual exercise and your chance to see if you can spot sources of electronic evidence in a mock crime scene.

03.4 Spot the memory
10:41

Why was the Internet created and how does it work?

03.5 The Internet
09:34

Who invented the World Wide Web and how does it differ from the Internet?

03.6 World Wide Web
05:03
03.4-03.6
5 questions
+ 04 The Computer Chronicles
1 lecture 15:29

From log tables through weaving and Babbage to the Colossus and everything with Chips.

04.1 A Historical Perspective
15:29
+ 05 Who Hacks?
3 lectures 26:44

An overview of the hacking cycle and the types of hackers.

05.1 The Criminals
06:17

Why governments hack and the concept of 'hacking back'.

05.2 Nation States
08:46

Hacking Back: a few examples  and some of the potential consequences

05.3 Hacking Back
11:41
04.1 - 05.2
5 questions
+ 06 Delving in the Digitals
7 lectures 01:04:23

What to expect at a digital crime scene and some of the ways to manage it.

06.1 Crime Scene
09:03

The connectivity of devices also raises the risk that electronic evidence can be altered or deleted from rogue signals. That's where Faraday Bags can be put to good effect.

06.2 Faraday Bags
06:27

Your device keeps a record of your Internet behaviour. Here are some of the places where those records are stored.

06.3 Who are you looking at?
11:37

The history of your activity on the Internet is also logged on the server. Here's how to read one type of server log.

06.4 Web Server Logs.
05:56

Like in any post-mortem examination, a lot of really useful evidence is found when the body is dissected ... but it isn't quite that easy when you are talking zeros and ones. Here are a few of the steps taken  when examining a 'dead' box.

06.5 Dead Forensics
10:46

The way data is stored on a device also has consequences for data retrieval. This video reveals some of them.

06.6 Stored Data
04:33

Criminals try to cover their tracks. Electronic evidence can be hidden in many ways. Here are just a few of them.

06.7 Hide & Seek
16:01
06.1 - 06.7
10 questions
+ 07 Knowing your onions
2 lectures 16:21

A look at how it is possible to remain anonymous on the Internet and use that anonymity to access the Dark Net.

07.1 TOR to the Dark Net
08:03

The Dark Net hides it's sites, but, with a little extra effort, a parallel web of unscrupulous activity and illegal wares can be accessed. This is a dangerous, criminal hub for information and for obtaining illegal products.

07.2 Hidden Sites
08:18
07.1-07.2
3 questions
+ 08 Spamming
1 lecture 08:47

Everyone who has an email account has suffered from unwanted and unsolicited messages in their inbox. It is a nuisance, but behind spamming is an 'impressive' level of criminal enterprise. In particular, this video considers the use of spamming by the illicit pharma industry,

08.1 Spam Business
08:47
+ 09 Passwords
1 lecture 18:01

There is a lot of advice on how to construct a good password, but it is often ignored. This video reviews the advice and describes the reasons for password complexity.

09.1 Passwords, Codes and Hacking.
18:01