YouTube for the Criminal Justice Educator

 

computer forensic education and college


Scene of the Cybercrime: Computer Forensics Handbook
Syngress  More Info

Debra Shinder, a former Police Officer with the Roanoke Police Department; and instructor at the North Central Texas Regional Police Academy and the Criminal Justice Training Center at Eastfield College.  Moreover, “Debra Littlejohn Shinder is a former Police Sergeant and Police Academy Instructor, turned IT professional. She and her husband, Dr. Thomas W. Shinder, have provided network consulting services to businesses and municipalities, conducted training at colleges and technical training centers, and spoken at seminars around the country. Debra Littlejohn Shinder specializes in networking and security, and she and Tom have written numerous books, including the best selling Configuring ISA Server 2000 (Syngress Publishing, ISBN: 1-928994-29-6), and Deb is the sole author of Computer Networking Essentials. Deb also is the author of over 100 articles for print publications and electronic magazines such as TechProGuild, CNET, 8Wire, and Cramsession.com. Debra Littlejohn Shinder is a member of the editorial board of the Journal of Police Crisis Negotiations and the advisory board of the Eastfield College Criminal Justice Training Center.”

 

 

According to the book description of Scene of the Cybercrime: Computer Forensics Handbook, “This book is a bridge between two distinct cultures; that of IT professionals responsible for building systems that prevent cybercrime, and law enforcement officials responsible for investigating and prosecuting those crimes. It introduces IT professionals to the highly structured world of law enforcement, where rules of evidence must be followed closely and crime scenes must not be contaminated. It provides law enforcement officers with an understanding of the technical aspects of cybercrime and of how technology can be used to help solve crimes that have been committed.”

Disclaimer

computer crime virus and trojan protection

Home | Computer Repair | Computer Basics | Hi Tech Crime | Digital Evidence | Future Trends | CyberCrime and Schemes | Course Resources | About the Instructor | Computer Crime Books | Site Map | Contact Us

Find a School

Computer Crime
CSC392

Instructor:

Lieutenant Raymond E. Foster, LAPD (ret.), MPA

 

Course Description:

This course will introduce the learner to computer forensics, the art and science of using technology to obtain evidence for use in criminal and civil court. Learners  will obtain an introduction to basic computer and networking concepts, the Internet, computer crime statutes, management of evidence and industry best-practices for examining computers that might contain crime-related information. The topics of the course are reinforced with hands-on exercises

 

Source Material:

(Two Text Books are used for this course)

 

Foster, Raymond E. Police Technology Prentice Hall, 2004

 

Britz, Marjie T. Computer Crime and Cyber Forensics, 2004

 

Order a Copy of Police Technology

 

 Computer Forensics and Cyber Crime: An Introduction

 

   

 

 

All other readings are available online through hyperlinks provided on the course website.

 

Papers and Assignments:

All papers and assignments are to be submitted online, through the website provided for the course.  The assignments are to be attached to an email.  All papers are to be double-spaced, 12 point Garamond font.  Use of the APA style of writing is strongly encouraged.  Papers are graded on content and well as exposition.  Each paper must have a heading with the students name, course title, assignment title and date.  All papers are must be sent by midnight on the due date.  It is highly recommended that the Learner read through all four modules of instruction in order to get a "feel" for where the course is headed.

 

In order to use the assignment matrix below, first determine if you are a Semester or Session I/II learner.

 

Due Dates Winter 2009
March 2, 2009 Semester/Session Begins
March 16, 2009 Module One
March 30, 2009 Module Two
April 13, 2009 Module Three
April 20, 2009 Module Four
April 25, 2009 Semester/Session Ends

Go to the Course Resource page for information on using the Union online library and tips on writing and research.

Click here if you are taking a five unit course.

American Heroes News

    Twitter


    Digital Evidence and Computer Crime, Second Edition
    Eoghan Casey BS MA  More Info

    While not used in this computer crime course, Computer World said of Digital Evidence and Computer Crime, “Reviews for the previous edition: "Digital Evidence and Computer Crime provides an introduction to many concepts from computer science about networks, and in particular the Internet. It details the application of forensic science principles to the location, recovery, and examination of digital evidence...Each chapter in the book is fully supported by case examples to clarify particular points made. It also contains many references to specialized literature and on-line resources as well as a helpful glossary of terms...this book can be recommended mainly for people looking to expand their general knowledge and awareness of computer crime and the process of computer crime investigation, particularly those just entering the field of digital forensics." --Dr. L.W. Russell, Science & Justice "Many, perhaps most, of the police, lawyers or systems administrators and forensic scientists involved in investigation or prosecution of computer-related crimes do not know the answer to these questions [of digital evidence handling]. This book will tell them. It should, of course, be equally interesting to lawyers with the task of defending alleged computer criminals." --Robert L Dunne, JD, The Center for Internet Studies, Yale University, USA "...an excellent book that details the elements of digital crime. Author Eoghan Casey does a superb job of applying forensic science to computers. The information presented here is critical to a diverse audience: law enforcement, attorneys, forensic scientists, and systems administrators, for instance...In all, the book and CD are an excellent introduction to an increasingly important area of law enforcement." -- Ben Rothke, Security Management I would very highly recommend this book to all those professionals who want to venture into the new and exciting branch of computer forensics. This book is good value for money, and should adorn the bookshelves of all computer experts, especially those who are in computer forensics. - Internet Journal of Forensic Medicine Reviews for 2nd Edition: This behemoth of a book offers more than 680 pages of useful information on digital forensics and computer crime. There's something for everyone - law enforcement agencies that collect and process evidence, forensic analysts, lawyers and other information security professionals. ...Casey does a great job making difficult concepts easy to understand. The tools and methodology described are up to date and relevant, and the case studies are detailed perfectly. This book is a great reference for any security professional facing issues in this area.”

    One reader of Digital Evidence and Computer Crime said, “Sometimes, defense attorneys have it easy: one slip-up by the prosecution and evidence is thrown out. Knowing that, law enforcement goes to great lengths to ensure that evidence is appropriately collected and protected. That works well in the physical world, where law enforcement has many generations' worth of experience. But in the modern world of computers and digital networks, where the simple act of rebooting a computer is enough to wipe out large amounts of evidence, law enforcement clearly needs thorough guidance.

    Such a resource is here: Digital Evidence and Computer Crime, an excellent book that details the elements of digital crime. Author Eoghan Casey does a superb job of applying forensic science to computers. The information presented here is critical to a diverse audience: law enforcement, attorneys, forensic scientists, and systems administrators, for instance. While cybercrime law is in some ways similar to other aspects of criminal law, it nonetheless has its own language and categories. For instance, jurisdiction is a key element in both the physical and digital realms, but it is a much trickier concept in the latter. Casey develops this topic and many more. Those new to computers and networks need not worry: the book begins with an explanation of how they function. With the basics out of the way, Casey details how computers can be used in crime and how the evidence created from these activities can be used for later analysis....The accompanying CD-ROM contains simulated cases that integrate many of the topics covered in the text. In all, the book and CD are an excellent introduction to an increasingly important area of law enforcement.”


    Incident Response and Computer Forensics, Second Edition
    Chris Prosise  More Info

    According to the book description of Incident Response and Computer Forensics, “A strong system of defenses will save your systems from falling victim to published and otherwise uninventive attacks, but even the most heavily defended system can be cracked under the right conditions. Incident Response aims to teach you how to determine when an attack has occurred or is underway--they're often hard to spot--and show you what to do about it. Authors Kevin Mandia and Chris Prosise favor a tools- and procedures-centric approach to the subject, thereby distinguishing this book from others that catalog particular attacks and methods for dealing with each one. The approach is more generic, and therefore better suited to dealing with newly emerging attack techniques. Anti-attack procedures are presented with the goal of identifying, apprehending, and successfully prosecuting attackers. The advice on carefully preserving volatile information, such as the list of processes active at the time of an attack, is easy to follow. The book is quick to endorse tools, the functionalities of which are described so as to inspire creative applications. Information on bad-guy behavior is top quality as well, giving readers knowledge of how to interpret logs and other observed phenomena. Mandia and Prosise don't--and can't--offer a foolproof guide to catching crackers in the act, but they do offer a great "best practices" guide to active surveillance. --David Wall

    Topics covered: Monitoring computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier.”

    ©  2013 High Priority Targeting, Inc.