The course examines various methods used to defraud organizations, how to identify and investigate suspected fraud, how to identify preventive methods used to deter fraud in the workplace, the Sarbanes-Oxley Act and the need for its creation. Real case studies enhance and reinforce learning objectives.
Investigation – Processes and Procedures
This course presents modern theories and practices of criminal investigation, including preliminary investigation, related communication and reporting functions, and final court actions. Simulations and case study analysis are used to explore investigation strategies and tactics. Students evaluate appropriate uses and anticipated effects of various methods.
This course introduces information security as a discipline and profession. Topics include information security fundamentals and security threats, defenses, and countermeasures for personal, enterprise and network security. Assets such as desktops, laptops, network servers and removable media are analyzed for common security pitfalls. Students explore measures for protecting those assets and the information they contain. Best practices, policies and procedures for information security are discussed, analyzed and evaluated in terms of return on investment (ROI).
This course covers the background and history of computer crime. Topics include the evolution of computer crime, computer investigations, crime scene process, evidence management, law enforcement investigations and cyber law litigation.