Basic Computer Networking

image35

BCN

This course is designed to introduce officers to the investigative value associated with networks & the internet. Officers will obtain the basic knowledge and skills to recognize networking and internet topics for law enforcement personnel. Areas addressed in this course include the networking hardware, software, ethics, and network examination standards. Planning for onsite enforcement activities: Note taking, Electronic Evidence Field Collection E-Kits, report writing, legal concerns when dealing with a network environment. Special emphasis will be given to computer network investigations as it pertains to cyber crime, terrorists and the internet. The course will also address legal principals regarding computer crimes, digital investigative units. Future computer investigations and cyber terrorism are addressed in this course including; “Cloud Computing”, “Data Centers”, “NGI-New Generation Internet”, “Intranet & VOIP”, “Convergence Technology” and “Private Security Objectives & Law Enforcement”.

COURSE OBJECTIVE

  • Describe the different cyber crime situations where computer forensic investigation would be appropriate in a  network environment. Describe basic network configuration.
  • Describe types of evidence investigator may encounter with computer networks and the Internet. Describe network data, discuss how large amounts of data are usually broken down to small packets and transferred over a   network environment. (I.P. tracking, firewalls, virus protection)
  • Describe software (Neo Trace, Net Tumbler, etc.) and forensic ethical standards, as well as legal and privacy issues.
  • Describe and demonstrate how to identify, investigate, capture, analyze, preserve and process computer network  evidence. 
  • Demonstrate the use of proven investigative and examination strategies.  Follow guidelines from the National   Institute of Justice, RCFL & Secret Service. 
  • Describe the need to only use specialists and networking professionals in the collection of network related evidence. 
  • Describe and demonstrate acquisition, collection, seizure and safekeeping of storage media and how it relates to     chain of custody requirements.  On site enforcement activities with "E-Kit Field Collection materials". 
  • Describe law enforcement assistance available to first responders with networking or cyber criminals:  Secret Service Electronic Crimes Task Forces, Federal Theft Task Force, High Tech Criminal Investigators Association, F.B.I. Cart Response Unit and National Security Administration.  
  • Utilize common forensic tools in the electronic discovery process with subpoenas, search warrant, and consent to  search.  
  • Describe the "chain of custody" as it relates to the proper collection and documentation of networking evidence.


A special emphasis will be placed on the legal & civil liability associated with private business.  Officers should  always seek legal assistance from their States Attorneys Office with law enforcement activities.  This is also true for Federal  Agents who should seek out assistance from the U.S. Attorneys Office. 


 

                                           On-site training is available.   

Please contact an E-Kit Representative for more information. 815-245-8476