This specialized certificate program provides an overview of computer and Internet crime. With the rise of criminal activity on the Internet--identity theft, the proliferation of child exploitation, and the vast amount of data traveling over the Internet--personal information must be protected and secured. Law enforcement, legal professionals, and consumers must acquire the skills and tools to protect the public, clients, and family from harm and misuse of data.
3.2 Continuing Education Units (CEUs) will be provided upon request as a permanent record of one's attendance, if requested by the last class meeting.
This module will provide an overview of high-tech crime with an emphasis on the following fraud crimes using digital and/or electronic technology: counterfeiting, fraud of credit and ATM cards, driver's license fraud, counterfeit social security cards, and fraudulent use of personal and company checks. A hands-on examination of genuine counterfeited items will be conducted. Students will also learn how to operate basic detection devices, such as magnifying glasses, stereo and zooming microscopes, ultraviolet and infrared lights, and comparative viewers.
In this module, you will learn how crimes are committed using the Internet to steal the identity of others and exploit children. Demonstrations and experiments in washing checks will be conducted.
This module will cover the basic workings of computers and associated magnetic media. You will examine several applications that allow an investigator to acquire and analyze the data from the source media. The focus of this course will be on Windows-based programs; other software programs will be presented.
This module will address relevant legal issues surrounding high-tech crime. Federal Privacy Laws will also be covered, including practical problems.