|Lecture hours per week|
|Lab hours per week|
In this course, students will be prepared to investigate computer crime, corporate malfeasance, and hacker break-ins. The main focus will be to provide expert information on crucial procedures that are employed to prosecute violators successfully while remaining within the law. Students will gradually build up to collecting actionable evidence, re-creating the criminal timeline, zeroing in on a suspect, uncovering obscured and deleted code, unlocking encrypted files, and preparing lawful affidavits. The instructor will also cover the latest PDA and cell phone investigation techniques and real-world case studies.