Information Technology Concepts For Forensic Investigation 2
|School||School of Computing and Academic Studies|
|Program||Crime and Intelligence Analysis Option|
|Minimum Passing Grade||60%|
|Start Date||September 08, 2021|
|End Date||December 01, 2021|
Acknowledgement of Territories
The British Columbia Institute of Technology acknowledges that our campuses are located on the unceded traditional territories of the Coast Salish Nations of Sḵwx̱wú7mesh (Squamish), səl̓ilwətaɁɬ (Tsleil-Waututh), and xwməθkwəy̓əm (Musqueam).
|Instructor to provide|
|Office Hours||Instructor to provide|
This course is the second phase of the Information Technology Concepts for Forensics Investigation course. It covers concepts of data communications, database management systems, programming, systems analysis, design and development fundamentals. These concepts are necessary in learning computer forensics techniques. The course will include lectures, labs and assignments.
Course Learning Outcomes/Competencies
Upon completion of this course, the student will have sufficient knowledge to advance to more specialized courses that require a good understanding of the various IT concepts, applications and terminologies. After the course, the student should be able to:
- Explain basic programming concepts (eg. sequence, looping).
- Explain system analysis, design and development fundamentals.
- Describe project management methodologies.
- Describe a database management system and its components.
- Use basic features of a relational database system.
- Explain basic data communications concepts.
- Explain basic computer network concepts (such as LAN and WAN) and protocols.
- Describe how encryption is used to support secure communications.
Required: Provided in-class and through Learning Hub.
Recommended: Required: Provided in-class and through Learning Hub.
The objective is to provide the student a good high-level understanding of the various aspects of Information Technology used in today's crime and intelligence practice. The various aspects of IT that will be covered in this course will include:
- Introduction to computing hardware, architectures, components, and technologies. This reviews the range and progression of computer types, hardware used for data storage, and hardware used for transporting data.
- Examinations of information sources and limitations of sources as they relate to quality and quantity of information.
- How information technology is utilized as a tool to improve efficiency with a focus on policy, control, criminal investigations, and national security.
- Basic Internet concepts. This covers the usage of the Internet and the risk and security issues.
- The use of IT for the application of artificial intelligence, neural learning, predictive and proactive policing, and structured methods and approaches to policing.
- Data mining and data prpepartion for use in policing technology applications.
|Assignments||30||In-class & take-home assignments|
Course Specific Requirements
Assignments: Late assignments, lab reports, or projects will receive a 10% deduction per day.
Assignment must be done on an individual basis unless otherwise specificed by the instructor.
Assignment questions will be reviewed at the beginning of the following class. Students will be assigned case studies to present in class.
Makeup Tests, Exams or Quizzes: There will be no makeup tests, exams or quizzes. If you miss a test, exam, or quiz, you will receive zero marks. Exceptions may be made for documented medical reasons or extenuating circumstances. In such a case, it is the responsibility of the student to inform the instructor immediately.
Illness: A doctor's note is required for any illness causing you to miss assignments, exams, quizes, or projects.
At the discription of the instructor, you may complete the work missed or have the work prorated.
Outline Changes: The material or schedule specified in this course outline may be changed by the instructor. If changes are required, they will be announced in the News area of Learning Hub.
Course Schedule and Assignments
Theory – Introductions – Research Exercise – Technology – Definitions –Terminology – Intelligence and Analysis Processes – Data Sources – Critical thinking
|2||9D Policing - Importance/ethical considerations regarding technology in crime and justice||ASSIGNED: Take-Home Assignment 1|
|3||Take-Home Assignment 1 presentations and discussion||DUE: Take-Home Assignment 1|
|4||Ethics and Technology||ASSIGNED: Take-Home Assignment 2|
|5||Introduction to Excel - Applied Examples - Coding|
DUE: Take-Home Assignment 2
ASSIGNED: Take-Home Assignment 3
|6||Take-Home Assignment 3 presentations and discussion||DUE: Take-Home Assignment 3|
|7||Midterm: Coding Exercise|
|8||Artificial Intelligence - Machine Learning - Violent Transnational Social Movements - IT aids to Law Enforcement|
|9||Introduction to Structured Analytical Techniques - Counter Violence Grid||ASSIGNED: Take-Home Assignment 4|
|10||Structured Analytical Technique: Pinehurst Model|
DUE: Take-Home Assignment 4
ASSIGNED: Take-Home Assignment 5
|11||Structured Analytical Technique: TREX||Due: Take-Home Assignment 5|
|12||Finale Exam - Cumulative||Take-Home coding and analysis|
|13||Final Exam Due||Final Exam due in Learning Hub dropbox|
Any student who needs special assistance in the event of a medical emergency or building evacuation (either because of a disability or for any other reason) should promptly inform their course instructor(s) and Accessibility Services of their personal circumstances.
Human Rights, Harassment and Discrimination:
The BCIT community is made up of individuals from every ability, background, experience and identity, each contributing uniquely to the richness and diversity of the BCIT community as a whole. In recognition of this, and the intrinsic value of our diversity, BCIT seeks to foster a climate of collaboration, understanding and mutual respect between all members of the community and ensure an inclusive accessible working and learning environment where everyone can succeed.
Respect, Diversity, and Inclusion is a supportive resource for both students and employees of BCIT, to foster a respectful learning and working environment. Any student who feels that they are experiencing discrimination or harassment (personal or human rights-related) can confidentially access this resource for advice and support. Please see Policy 7507 – Harassment and Discrimination and accompanying procedure.
Students should make themselves aware of additional Education, Administration, Safety and other BCIT policies listed at https://www.bcit.ca/about/administration/policies.shtml
Guidelines for School of Computing and Academic Studies
Students must successfully complete a course within a maximum of three (3) attempts at the course. Students with two attempts in a single course will be allowed to repeat the course only upon special written permission from the Associate Dean. Students who have not successfully completed a course within three attempts will not be eligible to graduate from their respective program.
I verify that the content of this course outline is current.
Candyce Kelshall, Instructor
September 05, 2021
I verify that this course outline has been reviewed.
David McKay, FSA PTS Administration-122120
September 07, 2021
I verify that this course outline has been reviewed and complies with BCIT policy.
Jennifer Talman, Associate Dean
September 07, 2021
Note: Should changes be required to the content of this course outline, students will be given reasonable notice.