Insights into cybercrime and electronic evidence

A basic introduction for non-technicians with a background or interest in criminal justice.
4.7 (28 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,080 students enrolled
Start Learning Now
  • Lectures 31
  • Length 5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2016 English

Course Description

This is a brief and basic introduction to cybercrime and electronic evidence aimed primarily at those criminal justice professionals who are not computer experts, but who find themselves confronted and confounded by the technological realities of our time. The course may also appeal to students and others who are just curious about the subject too.

The course introduces the main themes, threats, challenges and conundrums posed by this most modern of crime phenomena and explores some of the solutions adopted by criminal justice to try to cope with them.

This is an introductory course and seeks to explain technical concepts in terms of every day, common experience. For this reason some of technical areas have been simplified and rationalised to make them more accessible to and understandable by the uninitiated.

It consists of a series of ten 'Chapters' subdivided into videos that explore key topics. They are supported by a number of quizzes to help learners to check their progress and understanding.

What are the requirements?

  • An understanding of the principles of evidence will be helpful, but not essential - all technical concepts are explained and nothing more than a basic knowledge or understanding of computers is either required or expected..

What am I going to get from this course?

  • By following this course, pariticpants can expect to acquire a firm grasp and understanding of the nature and impact of cybercrime in today's world.
  • Participants will know and appreciate the considerations, adjustments and accommodations that traditional criminal justice systems must make in order to address the new challenges created by digital/electronic evidence.
  • Real life examples will be given and some of the shortcomings in current approaches will be discussed.

Who is the target audience?

  • This is not a course for computer experts. It is a BASIC introduction to the subject of cybercrime and electronic evidence for all criminal justice professionals and students (or those simply interested in the subject) who find themselves confronted and confounded by the technological realities of our time.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction and Overview

This lecture provides an overview of the course, describing the different chapters or lectures.

Section 2: 01 Defining Cybercrime

Quantifying the extent and size of the threat from cybercrime.


Towards a definition of the criminal behaviour charactersied as cybercrime and how it is variously defined.

1 question

How the legal definitions translate into real life experience.

2 questions

A description of some of the most common types of cyber attack.

4 questions
Section 3: 02 What is Evidence?

Notions of evidence have developed over centuries, but the advent of digital evidence has created an uncomfortable tension between traditional approaches and modern needs. Here we explore some of the causes for that discomfort.

3 questions

Devices (and therefore soruces of evidence) are increasingly connected. The potential connections and their implications are discussed in this video.


This video looks at different evidential sources.

5 questions
Section 4: 03 Bits and Pieces

Computers can be thought of as presumptuous adding machines. This lecture explains why.


A brief overview of the different systems used to file data.


How does computer memory work? Here are the basics.

7 questions

This is a virtual exercise and your chance to see if you can spot sources of electronic evidence in a mock crime scene.


Why was the Internet created and how does it work?


Who invented the World Wide Web and how does it differ from the Internet?

5 questions
Section 5: 04 The Computer Chronicles

From log tables through weaving and Babbage to the Colossus and everything with Chips.

Section 6: 05 Who Hacks?

An overview of the hacking cycle and the types of hackers.


Why governments hack and the concept of 'hacking back'.

04.1 - 05.2
5 questions
Section 7: 06 Delving in the Digitals

What to expect at a digital crime scene and some of the ways to manage it.


The connectivity of devices also raises the risk that electronic evidence can be altered or deleted from rogue signals. That's where Faraday Bags can be put to good effect.


Your device keeps a record of your Internet behaviour. Here are some of the places where those records are stored.


The history of your activity on the Internet is also logged on the server. Here's how to read one type of server log.


Like in any post-mortem examination, a lot of really useful evidence is found when the body is dissected ... but it isn't quite that easy when you are talking zeros and ones. Here are a few of the steps taken  when examining a 'dead' box.


The data is stored on a device also has consequences for data retrieval. This video reveals some of them.


Criminals try to cover their tracks. Electronic evidence can be hidden in many ways. Here are just a few of them.

06.1 - 06.7
10 questions
Section 8: 07 Knowing your onions

A look at how it is possible to remain anonymous on the Internet and use that anonymity to access the Dark Net.


The Dark Net hides it's sites, but, with a little extra effort, a parallel web of unscrupulous activity and illegal wares can be accessed. This is a dangerous, criminal hub for information and for obtaining illegal products.

3 questions
Section 9: 08 Spamming

Everyone who has an email account has suffered from unwanted and unsolicited messages in their inbox. It is a nuisance, but behind spamming is an 'impressive' level of criminal enterprise. In particular, this video considers the use of spamming by the illicit pharma industry,

Section 10: 09 Passwords

There is a lot of advice on how to construct a good password, but it is often ignored. This video reviews the advice and describes the reasons for password complexity.

Section 11: 10 Currency in Bits

The Bitcoin (which is a legitimate financial enterprise) has, in the relatively few years since its creation, become well established, but volatile. Even so, it has become prominent as a currency of choice for cybercriminals. This video looks at why this may be the case.

08.1 - 10.1
5 questions
Section 12: 11 Afterword.

So this is (nearly) the end. Look at how much you've learned!

50 questions

Ultimate in the sense of it being the last, not because it is horrendously difficult. This is a chance for you to discover for yourselves exactly how much more you now know about cybercrime and electronic evidence. It is optional and nothing rides on it other than a personal sense of accomplishment and achievement.


Farewell and congratulations.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Steven David Brown is a barrister of the Inner Temple, but no longer practises law. He left the Bar to become a police officer with London's Metropolitan Police Service later serving with the National Criminal Intelligence Service and Europol. He is a Certified Fraud Examiner and holds a Graduate Diploma in Financial Crime Prevention from the International Compliance Association. He has worked in international capacity building and technical assistance since 2005 including periods as the Senior Law Enforcement Adviser for the UN Office on Drugs and Crime in Central Asia, as policy adviser on law enforcement to the EU Advisory Group in Armenia and, more recently, as project manager for the EU/Council of Europe's Global Action on Cybercrime. During this latter role, Steven was closely involved in delivering guidance and training on substantive and practical areas of combating cybercrime and providing advice on the new challenges implicit in electronic evidence.

Steven has had a number of article published in peer reviewed journals and is the editor of and major contributor to the textbook, "Combating International Crime: The longer arm of the law" (Routledge, 2008).

Ready to start learning?
Start Learning Now