Insights into cybercrime and electronic evidence
4.5 (52 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,947 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Insights into cybercrime and electronic evidence to your Wishlist.

Add to Wishlist

Insights into cybercrime and electronic evidence

A basic introduction for non-technicians with a background or interest in criminal justice.
4.5 (52 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,947 students enrolled
Last updated 7/2017
Price: Free
  • 5.5 hours on-demand video
  • 23 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • By following this course, participants can expect to acquire a firm grasp and understanding of the nature and impact of cybercrime in today's world.
  • Participants will know and appreciate the considerations, adjustments and accommodations that traditional criminal justice systems must make in order to address the new challenges created by digital/electronic evidence.
  • Real life examples will be given and some of the shortcomings in current approaches will be discussed.
View Curriculum
  • An understanding of the principles of evidence will be helpful, but not essential - all technical concepts are explained and nothing more than a basic knowledge or understanding of computers is either required or expected..

This is a brief and basic introduction to cybercrime and electronic evidence aimed primarily at those criminal justice professionals who are not computer experts, but who find themselves confronted and confounded by the technological realities of our time. The course may also appeal to students and others who are just curious about the subject too.

The course introduces the main themes, threats, challenges and conundrums posed by this most modern of crime phenomena and explores some of the solutions adopted by criminal justice to try to cope with them.

This is an introductory course and seeks to explain technical concepts in terms of every day, common experience. For this reason some of technical areas have been simplified and rationalised to make them more accessible to and understandable by the uninitiated.

It consists of a series of ten 'Chapters' subdivided into videos that explore key topics. They are supported by a number of quizzes to help learners to check their progress and understanding.

Who is the target audience?
  • This is not a course for computer experts. It is a BASIC introduction to the subject of cybercrime and electronic evidence for all criminal justice professionals and students (or those simply interested in the subject) who find themselves confronted and confounded by the technological realities of our time.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
33 Lectures
Introduction and Overview
1 Lecture 04:24

This lecture provides an overview of the course, describing the different chapters or lectures.

01 Defining Cybercrime
4 Lectures 49:37

Quantifying the extent and size of the threat from cybercrime.

01.1 Is there a problem?

Towards a definition of the criminal behaviour charactersied as cybercrime and how it is variously defined.

01.2 What is Cybercrime?

1 question

How the legal definitions translate into real life experience.

01.3 What does that mean in real life?

2 questions

A description of some of the most common types of cyber attack.

01.4 Common types of attack

4 questions
02 What is Evidence?
3 Lectures 35:02

Notions of evidence have developed over centuries, but the advent of digital evidence has created an uncomfortable tension between traditional approaches and modern needs. Here we explore some of the causes for that discomfort.

02.1 Traditional v Digital Evidence?

3 questions

Devices (and therefore soruces of evidence) are increasingly connected. The potential connections and their implications are discussed in this video.

02.2 The Big Connection

This video looks at different evidential sources.

02.3 Sources of Evidence

5 questions
03 Bits and Pieces
6 Lectures 46:44

Computers can be thought of as presumptuous adding machines. This lecture explains why.

03.1 Just Calculators

A brief overview of the different systems used to file data.

03.2 Filing Systems

How does computer memory work? Here are the basics.

03.3 Memorising

7 questions

This is a virtual exercise and your chance to see if you can spot sources of electronic evidence in a mock crime scene.

03.4 Spot the memory

Why was the Internet created and how does it work?

03.5 The Internet

Who invented the World Wide Web and how does it differ from the Internet?

03.6 World Wide Web

5 questions
04 The Computer Chronicles
1 Lecture 15:29

From log tables through weaving and Babbage to the Colossus and everything with Chips.

04.1 A Historical Perspective
05 Who Hacks?
2 Lectures 21:51

An overview of the hacking cycle and the types of hackers.

05.1 The Criminals

Why governments hack and the concept of 'hacking back'.

05.2 Nation States

04.1 - 05.2
5 questions
06 Delving in the Digitals
7 Lectures 01:01:50

What to expect at a digital crime scene and some of the ways to manage it.

06.1 Crime Scene

The connectivity of devices also raises the risk that electronic evidence can be altered or deleted from rogue signals. That's where Faraday Bags can be put to good effect.

06.2 Faraday Bags

Your device keeps a record of your Internet behaviour. Here are some of the places where those records are stored.

06.3 Who are you looking at?

The history of your activity on the Internet is also logged on the server. Here's how to read one type of server log.

06.4 Web Server Logs.

Like in any post-mortem examination, a lot of really useful evidence is found when the body is dissected ... but it isn't quite that easy when you are talking zeros and ones. Here are a few of the steps taken  when examining a 'dead' box.

06.5 Dead Forensics

The data is stored on a device also has consequences for data retrieval. This video reveals some of them.

06.6 Stored Data

Criminals try to cover their tracks. Electronic evidence can be hidden in many ways. Here are just a few of them.

06.7 Hide & Seek

06.1 - 06.7
10 questions
07 Knowing your onions
2 Lectures 14:39

A look at how it is possible to remain anonymous on the Internet and use that anonymity to access the Dark Net.

07.1 TOR to the Dark Net

The Dark Net hides it's sites, but, with a little extra effort, a parallel web of unscrupulous activity and illegal wares can be accessed. This is a dangerous, criminal hub for information and for obtaining illegal products.

07.2 Hidden Sites

3 questions
08 Spamming
1 Lecture 08:47

Everyone who has an email account has suffered from unwanted and unsolicited messages in their inbox. It is a nuisance, but behind spamming is an 'impressive' level of criminal enterprise. In particular, this video considers the use of spamming by the illicit pharma industry,

08.1 Spam Business
09 Passwords
1 Lecture 14:39

There is a lot of advice on how to construct a good password, but it is often ignored. This video reviews the advice and describes the reasons for password complexity.

09.1 Passwords, Codes and Hacking.
3 More Sections
About the Instructor
Steven David Brown
4.5 Average rating
52 Reviews
1,947 Students
1 Course

Steven David Brown is a barrister of the Inner Temple, but no longer practises law. He left the Bar to become a police officer with London's Metropolitan Police Service later serving with the National Criminal Intelligence Service and Europol. He is a Certified Fraud Examiner and holds a Graduate Diploma in Financial Crime Prevention from the International Compliance Association. He has worked in international capacity building and technical assistance since 2005 including periods as the Senior Law Enforcement Adviser for the UN Office on Drugs and Crime in Central Asia, as policy adviser on law enforcement to the EU Advisory Group in Armenia and, more recently, as project manager for the EU/Council of Europe's Global Action on Cybercrime. During this latter role, Steven was closely involved in delivering guidance and training on substantive and practical areas of combating cybercrime and providing advice on the new challenges implicit in electronic evidence.

Steven has had a number of articles published in peer reviewed journals and is the editor of and major contributor to the textbook, "Combating International Crime: The longer arm of the law" (Routledge, 2008).