Digital Evidence Class Descriptions
(Not all classes run every semester)
Advanced Mobile Phone Forensics - FRN 7895 (24 hours)
This 24-hour training course will equip investigators, detectives and law enforcement personnel with new concepts regarding mobile devices which will include smart phones, iPADS and Apple products. With over 45 million smart phones in the US, law enforcement must keep up with this technology to provide detailed and professional investigations. This course is a must for those interested in GPS and Geo tagging technology as it relates to investigative success. The introduction to Apple Products will enhance the investigators expertise. Students will spend time with practical exercises using Cellebrite Units to analyze various smart phones and iPADS. They are encouraged to bring their own phones or active cases where mobile devices are involved. There will be a mobile phone overview so no prerequisites or prior experience is required.
Instructor: Chris McNeil, Detective CMPD
Advanced Computer Forensics - FRN 7873 (16 Hours)
Prerequisite: Intermediate Computer Forensics
Cell Phone Investigations and Electronic Evidence - FRN 7885- (24 Hours)
This Online course will introduce the student to the basics for cell phone investigations while covering the electronic evidence that is found on handheld devices along with the complicated legal issues surrounding cell phones today. The course will cover evidence, background data for the various types of phones like CDMA and GSM, cell phone seizures and what issues to be aware of like SIM cards, airplane mode, PINs and PUK numbers. We will cover searches justified by exigent circumstances and incidents where it is not covered. Automobile exceptions, search incident to arrest and search warrant issues will also be discussed. This 24 hour online course is a must for patrol officers, investigators and detectives interested in improving their cell phone investigative knowledge.
This course focuses on child exploitation issues and the Internet. Students will learn how to capture evidence of online abuse of children. The course covers technical investigative procedures that are used to capture online child predators. Practical experience in class includes the use of free tools and the Internet; in addition, students will also learn how to establish investigative units online. Child exploitation laws, evidence and search warrant issues will also be covered.
Enrollment in this class is limited to active, sworn Law Enforcement officers only.
This course provides an assessment of what to expect in the courtroom when a digital evidence case is involved, as well as the requirements for delivering expert testimony. It covers the current status of forensic digital evidence from both the scientific and legal perspectives in both criminal and civil cases. Students will see a mock trial for both types of cases, including an expert witness providing testimony for digital evidence. Students will also see the process of qualifying an expert in court by prosecution and defense. During the case mock trials, students will receive the opportunity to role play in qualifying the expert by asking questions that can open discussions about what to anticipate in the courtroom. Students will learn to identify and have an opportunity to discuss prospective issues and their potential resolutions regarding digital evidence investigation, examination, laboratory accreditation, and use at trial.
This Online course provides an assessment of what to expect in the courtroom when a digital evidence case is involved, as well as the requirements for delivering expert testimony. It covers the current status of forensic digital evidence from both the scientific and legal perspectives in both criminal and civil cases. Students will see suggestions from prosecutors on testimony relating to digital evidence. Students will also see the process of qualifying an expert in court by prosecution and defense. You will see breakdowns, explanations and easy charts explaining the different media and binary terms. This course will prepare all law enforcement officers with a good basic understanding of digital evidence expertise including digital media terms, computer forensic terms and general strategy for good testimony involving computers and other digital media.
This course covers financial crimes, their relationship to terrorism and the resulting digital evidence that is created. Students will learn how terrorism has been funded using typical financial transactions as well as illegal methods of securing funds. The course will cover financial crimes including identity theft, phishing, money laundering, etc., and their role in global crimes that result in threats to people, infrastructure and geography. Students will learn the investigative approach necessary to follow the trail of digital evidence left behind by financial crimes that fund terrorism.
This course is a prerequisite to any computer forensics course at the American Academy of Applied Forensics. It is an introduction to basic hardware concepts of PC systems and provides an intense coverage of computer hardware and the functionality of the inner components. Students will learn to recognize and manipulate the main components of a typical PC and understand their functions. They will disassemble a computer in its entirety and rebuild it from the motherboard up. Students will also build a PC from scratch and load the operating system. By the end of class, students will be well versed in the basic functions of major PC hardware and component technology and be able to build a computer in class. Successful completion of this course prepares students to pursue training in computer forensic examination that requires a thorough knowledge of hardware components.
Prerequisite: Hardware Fundamentals for Law Enforcement or equivalent experience
Prerequisite: Introduction to Computer Forensics
This unique Online course will cover the most commonly used social networking sites today. Information about the site profile, how to review and peruse the site and the latest statistical information will be covered. Sites like Myspace, Facebook, Twitter, and others are reviewed and discussed so the student can become more familiar with the shortcuts, potential evidence and dangers of some of these sites. The course covers cyber stalking, cybercrimes and IP addresses along with other investigative tips. Contact information for subpoena’s, email addresses and fax numbers for these sites will also help the investigator learn more about investigations involving social networking sites.
This course is an introduction to cyber crime and the study of network forensics. Using the Internet as an investigative tool, the course focuses on the basics of networking and inter-networking. Students will learn the types of attacks that exist in cyber crime, how these attacks are performed and how law enforcement can trace the origin of this criminal activity. Cyber crime tactics covered are virus creation (including Trojan horses), web and database hacking into business and personal systems, network sniffing and/or network spying, encryption, etc. Students will also learn the kind of information that can be compromised during a network attack. In addition, students will learn to trace e-mails and computer IP addresses to begin an investigation of cyber-criminal activity.
This course provides an introduction to live computer forensics. It covers recognized tactics used at the crime scene to view computer-use activity prior to seizure. Students will learn how to view the contents of a computer prior to seizure without actually altering information on the machine. The course uses Linux utilities that can be used on a Windows-based machine and provides an introduction to the Linux Operating System. Students will obtain hands-on experience working with similar incident response tools. The course also covers the legal issues of searching a computer prior to seizure along with consent-to-search protocols. Students should know how to use a PC and have basic knowledge of computer systems.
This course is designed to provide the student with a basic knowledge of how a computer works, how the Internet works and additional topics investigators may need to more effectively operator a computer. Topics will include MS Word areas, multi-media use, windows basics, installing new programs and email along with an overview of Excel and Powerpoint . Students will go on class computers and do practical exercises to enhance their computer knowledge and skills from basic copying, scanning, learning to be more organized, loading software, copying and pasting and finding keyboard shortcuts. Internet details will involve browsing concepts, hperlinks, searching and finding favorites, history along with a basic understanding of connections, wireless and background information. After completion of this course law enforcement investigators will be able to handle simple computer investigations, organize cases and evidence and be able to save appropriate documents for future needs.
This course is an introduction to electronic media devices (computers, cell phones, PDAs, etc.) and the mechanics of seizing them. Students will explore innovative hardware technology used to commit computer-related crime and the legal ramifications of searching electronic media. Class includes extensive practical exercises in the search and seizure of electronic media in various crime scenes. Upon completion of the course, students will be able to recognize electronic evidence, build a search warrant for a digital evidence case, properly search and seize digital evidence in a crime scene, properly document property seized in an electronic crime scene, and properly submit and safeguard integrity of digital evidence for a laboratory examination.
Additional Classes Offered Online