Course Description

  • This is a brief and basic introduction to cybercrime and electronic evidence aimed primarily at those criminal justice professionals who are not computer experts, but who find themselves confronted and confounded by the technological realities of our time. The course may also appeal to students and others who are just curious about the subject too.

  • The course introduces the main themes, threats, challenges and conundrums posed by this most modern of crime phenomena and explores some of the solutions adopted by criminal justice to try to cope with them.

  • This is an introductory course and seeks to explain technical concepts in terms of every day, common experience. For this reason some of technical areas have been simplified and rationalised to make them more accessible to and understandable by the uninitiated.

  • It consists of a series of ten 'Chapters' subdivided into videos that explore key topics. They are supported by a number of quizzes to help learners to check their progress and understanding.

  • IACA is not issuing certificates for this course.

Target Group

Who this course is for:

  • This is NOT a course for computer experts. It is a BASIC, ENTRY-LEVEL introduction to the subject of cybercrime and electronic evidence for all criminal justice professionals and students (or those simply interested in the subject) who find themselves confronted and confounded by the technological realities of our time.

Course Duration and Requirements

  • Access to the Course

    Enrollment is available ANY TIME, and access to the course is open for 30 days after the enrollment.

  • Video Content

    The course is SELF-PACED and contains 30 video lessons with a total duration of 5 hours and 20 minutes.

  • Quizzes

    Quizzes are inserted between the video lessons and are a prerequisite to move to the next video. Estimated time to complete the Ultimate Quiz is 1 hour 20 minutes.

Instructor

Steven David Brown

Steven David Brown is a barrister of the Inner Temple, but no longer practises law. He left the Bar to become a police officer with London's Metropolitan Police Service later serving with the National Criminal Intelligence Service and Europol. He is a Certified Fraud Examiner and holds a Graduate Diploma in Financial Crime Prevention from the International Compliance Association. He has worked in international capacity building and technical assistance since 2005 including periods as the Senior Law Enforcement Adviser for the UN Office on Drugs and Crime in Central Asia, as policy adviser on law enforcement to the EU Advisory Group in Armenia and, more recently, as project manager for the EU/Council of Europe's Global Action on Cybercrime. During this latter role, Steven was closely involved in delivering guidance and training on substantive and practical areas of combating cybercrime and providing advice on the new challenges implicit in electronic evidence. Steven has had a number of articles published in peer reviewed journals and is the editor of and major contributor to the textbook, "Combating International Crime: The longer arm of the law" (Routledge, 2008).

Course Curriculum

  • 1

    Intro

    • Intro

  • 2

    Chapter 1: Defining Cybercrime

    • Is there a Problem?

    • What is Cybercrime?

    • Quiz #1

    • WORKSHEET Chapter 1

    • What Does That Mean in Real Life?

    • Quiz #2

    • Common Types of Attack

    • Quiz #3

  • 3

    Chapter 2: What is Evidence?

    • What is Evidence 1

    • What is Evidence 2

    • Quiz #4

    • The Big Connection

    • Sources of Evidence

    • Quiz #5

  • 4

    Chapter 3: Bits and PCs

    • Just Calculators

    • Filing Systems

    • Memorising

    • Quiz #6

    • New Search

    • The Internet

    • WWW

    • WORKSHEET Chapter 3

    • Quiz #7

  • 5

    Chapter 4: The Computer Chronicles

    • Computer Chronicles

  • 6

    Chapter 5: Who Hacks?

    • Criminal Hackers

    • State Hacking

    • Hacking Back

    • Quiz #8

  • 7

    Chapter 6: Delving in the Digitals

    • Crime Scene

    • Faraday Bags

    • Who Are You Looking At?

    • WORKSHEET 1 Chapter 6

    • WORKSHEET 2 Chapter 6

    • Web Servers

    • Dead Forensics

    • WORKSHEET 3 Chapter 6

    • Stored Data

    • Hide and Seek

    • WORKSHEET 4 Chapter 6

    • Quiz #9

  • 8

    Chapter 7: Knowing Your Onions

    • Tor to the Darknet

    • WORKSHEET 1 Chapter 7

    • Hidden Sites

    • Quiz #10

  • 9

    Chapter 8: Spamming

    • Spam Business

  • 10

    Chapter 9: Passwords

    • Passwords

    • WORKSHEET 1 Chapter 9

  • 11

    Chapter 10: Currency in Bits

    • Bitcoinmisticism

    • Quiz #11

  • 12

    Afterword Part 1

    • Afterword 1

  • 13

    Ultimate Quiz

    • Ultimate Quiz

  • 14

    Afterword Part 2

    • Afterword Part 2

  • 15

    Further Reading

    • ICEE Further Sources and Resources

  • 16

    Before you go...

    • Before you go...

Price

This course is offered free of charge

Contact us:

onlinetraining@iaca.int

IACA Online Training Catalogue:

https://www.iaca.int/iaca-programmes/online-training/training-catalogue.html