Insights into cybercrime and electronic evidence
4.5 (38 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,517 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Insights into cybercrime and electronic evidence to your Wishlist.

Add to Wishlist

Insights into cybercrime and electronic evidence

A basic introduction for non-technicians with a background or interest in criminal justice.
4.5 (38 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,517 students enrolled
Last updated 3/2017
English
Price: Free
Includes:
  • 5.5 hours on-demand video
  • 23 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • By following this course, pariticpants can expect to acquire a firm grasp and understanding of the nature and impact of cybercrime in today's world.
  • Participants will know and appreciate the considerations, adjustments and accommodations that traditional criminal justice systems must make in order to address the new challenges created by digital/electronic evidence.
  • Real life examples will be given and some of the shortcomings in current approaches will be discussed.
View Curriculum
Requirements
  • An understanding of the principles of evidence will be helpful, but not essential - all technical concepts are explained and nothing more than a basic knowledge or understanding of computers is either required or expected..
Description

This is a brief and basic introduction to cybercrime and electronic evidence aimed primarily at those criminal justice professionals who are not computer experts, but who find themselves confronted and confounded by the technological realities of our time. The course may also appeal to students and others who are just curious about the subject too.

The course introduces the main themes, threats, challenges and conundrums posed by this most modern of crime phenomena and explores some of the solutions adopted by criminal justice to try to cope with them.

This is an introductory course and seeks to explain technical concepts in terms of every day, common experience. For this reason some of technical areas have been simplified and rationalised to make them more accessible to and understandable by the uninitiated.

It consists of a series of ten 'Chapters' subdivided into videos that explore key topics. They are supported by a number of quizzes to help learners to check their progress and understanding.


Who is the target audience?
  • This is not a course for computer experts. It is a BASIC introduction to the subject of cybercrime and electronic evidence for all criminal justice professionals and students (or those simply interested in the subject) who find themselves confronted and confounded by the technological realities of our time.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 33 Lectures Collapse All 33 Lectures 05:28:23
+
Introduction and Overview
1 Lecture 04:24

This lecture provides an overview of the course, describing the different chapters or lectures.

Introduction
04:24
+
01 Defining Cybercrime
4 Lectures 49:37

Quantifying the extent and size of the threat from cybercrime.

01.1 Is there a problem?
04:24

Towards a definition of the criminal behaviour charactersied as cybercrime and how it is variously defined.

01.2 What is Cybercrime?
11:05

01.2
1 question

How the legal definitions translate into real life experience.

01.3 What does that mean in real life?
19:38

01.3
2 questions

A description of some of the most common types of cyber attack.

01.4 Common types of attack
14:30

01.4
4 questions
+
02 What is Evidence?
3 Lectures 35:02

Notions of evidence have developed over centuries, but the advent of digital evidence has created an uncomfortable tension between traditional approaches and modern needs. Here we explore some of the causes for that discomfort.

02.1 Traditional v Digital Evidence?
17:53

02.1
3 questions

Devices (and therefore soruces of evidence) are increasingly connected. The potential connections and their implications are discussed in this video.

02.2 The Big Connection
11:01

This video looks at different evidential sources.

02.3 Sources of Evidence
06:08

02.3
5 questions
+
03 Bits and Pieces
6 Lectures 46:44

Computers can be thought of as presumptuous adding machines. This lecture explains why.

03.1 Just Calculators
07:31

A brief overview of the different systems used to file data.

03.2 Filing Systems
06:42

How does computer memory work? Here are the basics.

03.3 Memorising
07:13

03.1-03.3
7 questions

This is a virtual exercise and your chance to see if you can spot sources of electronic evidence in a mock crime scene.

03.4 Spot the memory
10:41

Why was the Internet created and how does it work?

03.5 The Internet
09:34

Who invented the World Wide Web and how does it differ from the Internet?

03.6 World Wide Web
05:03

03.4-03.6
5 questions
+
04 The Computer Chronicles
1 Lecture 15:29

From log tables through weaving and Babbage to the Colossus and everything with Chips.

04.1 A Historical Perspective
15:29
+
05 Who Hacks?
2 Lectures 21:51

An overview of the hacking cycle and the types of hackers.

05.1 The Criminals
06:17

Why governments hack and the concept of 'hacking back'.

05.2 Nation States
15:34

04.1 - 05.2
5 questions
+
06 Delving in the Digitals
7 Lectures 01:01:50

What to expect at a digital crime scene and some of the ways to manage it.

06.1 Crime Scene
09:03

The connectivity of devices also raises the risk that electronic evidence can be altered or deleted from rogue signals. That's where Faraday Bags can be put to good effect.

06.2 Faraday Bags
06:27

Your device keeps a record of your Internet behaviour. Here are some of the places where those records are stored.

06.3 Who are you looking at?
09:04

The history of your activity on the Internet is also logged on the server. Here's how to read one type of server log.

06.4 Web Server Logs.
05:56

Like in any post-mortem examination, a lot of really useful evidence is found when the body is dissected ... but it isn't quite that easy when you are talking zeros and ones. Here are a few of the steps taken  when examining a 'dead' box.

06.5 Dead Forensics
10:46

The data is stored on a device also has consequences for data retrieval. This video reveals some of them.

06.6 Stored Data
04:33

Criminals try to cover their tracks. Electronic evidence can be hidden in many ways. Here are just a few of them.

06.7 Hide & Seek
16:01

06.1 - 06.7
10 questions
+
07 Knowing your onions
2 Lectures 14:39

A look at how it is possible to remain anonymous on the Internet and use that anonymity to access the Dark Net.

07.1 TOR to the Dark Net
08:03

The Dark Net hides it's sites, but, with a little extra effort, a parallel web of unscrupulous activity and illegal wares can be accessed. This is a dangerous, criminal hub for information and for obtaining illegal products.

07.2 Hidden Sites
06:36

07.1-07.2
3 questions
+
08 Spamming
1 Lecture 08:47

Everyone who has an email account has suffered from unwanted and unsolicited messages in their inbox. It is a nuisance, but behind spamming is an 'impressive' level of criminal enterprise. In particular, this video considers the use of spamming by the illicit pharma industry,

08.1 Spam Business
08:47
+
09 Passwords
1 Lecture 14:39

There is a lot of advice on how to construct a good password, but it is often ignored. This video reviews the advice and describes the reasons for password complexity.

09.1 Passwords, Codes and Hacking.
14:39
3 More Sections
About the Instructor
Steven David Brown
4.5 Average rating
37 Reviews
1,517 Students
1 Course

Steven David Brown is a barrister of the Inner Temple, but no longer practises law. He left the Bar to become a police officer with London's Metropolitan Police Service later serving with the National Criminal Intelligence Service and Europol. He is a Certified Fraud Examiner and holds a Graduate Diploma in Financial Crime Prevention from the International Compliance Association. He has worked in international capacity building and technical assistance since 2005 including periods as the Senior Law Enforcement Adviser for the UN Office on Drugs and Crime in Central Asia, as policy adviser on law enforcement to the EU Advisory Group in Armenia and, more recently, as project manager for the EU/Council of Europe's Global Action on Cybercrime. During this latter role, Steven was closely involved in delivering guidance and training on substantive and practical areas of combating cybercrime and providing advice on the new challenges implicit in electronic evidence.

Steven has had a number of articles published in peer reviewed journals and is the editor of and major contributor to the textbook, "Combating International Crime: The longer arm of the law" (Routledge, 2008).