Leadership: Texas Hold 'Em Style
Andrew J. Harvey  More Info

computer crime virus and trojan protection

Home | Computer Repair | Computer Basics | Hi Tech Crime | Digital Evidence | Future Trends | CyberCrime and Schemes | Course Resources | About the Instructor | Computer Crime Books | Site Map | Contact Us

Module Four


Required Readings:

1. Computer Evidence Processing Steps  New Technologies, Inc.

2. Computer Forensics and Cyber Crime

    a. Chapter Thirteen: Conclusions and Future Issues

3. Police Technology

    a. Chapter Twenty-one: Emerging and Future Technologies.


Recommended Readings:

1. How to Report Internet Crime Computer Crime and Intellectual Property
    Section,  Department of Justice, 


(Note: Assignment due dates are listed on the course homepage)


Written Assignments


During the course, the learners should develop a topic about computer crime.  The learner should contact the instructor shortly after the mid-term paper and have the topic approved for the final paper.  The paper should be 7-10 double spaced pages in length and include a minimum of five sources. 


Hint: Superior work (an A grade) is considered to include sourcing from academic, peer reviewed journals and formatted according to an accepted APA style.


Participation Assignment


Go to the Criminal Justice Online forum and post your final discussion question here.




Submit Module Four via email by clicking here



©  2013 High Priority Targeting, Inc.