|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Philosophical and historical background of policing throughout the free world; special emphasis is placed on the heritage of British and American policing, the governmental role of law enforcement in society; administration of American justice at all levels of government. The role of technology in law enforcement and crime prevention; history, modes and impact. (3,0) 3 credits Fall, Spring, Summer
-
3.00 Credits
Emphasis will be placed on the numerous and complex factors involved in the areas of human relations as they affect law enforcement. An examination of prejudices, myths, and discrimination, how to control them, and their impact in law enforcement. (3,0,1) 3 credits Fall, Spring, Summer
-
3.00 Credits
An introduction and an orientation to the causes and treatment of juvenile delinquency; and examination of the methods of handling juvenile offenders, including interviewing techniques, screening, and referrals to social agencies. (3,0) 3 credits Fall, Spring, Summer
-
3.00 Credits
This course is an orientation to and a study of computer forensic methods. The course will include an analysis of computer hardware that is utilized in forensic investigations such as motherboards, BIOS settings, hard and floppy disk drives and controllers, SCSI controllers and drives and implementations, RAID controllers, boot sequences, and related components. Also, this course will introduce the student to methods used in analyzing data storage devices and will include an examination of the physical structures, surfaces, and formats of hard disks and other media. (3,0) 3 credits
-
3.00 Credits
Introduction to criminal investigation, technical methods used at the crime scene; development of clues, identification of suspects, criminal investigation procedures including the theory of an investigation, conduct at crime scenes; collection and preservation of physical evidence, analysis of the elements that constitute all crimes. Includes use of profile analysis and modus operandi databases in criminal investigation. (3,0) 3 credits Fall, Spring
-
3.00 Credits
The role of the crime laboratory in the law enforcement organization, scope of a criminalistic operation; organizational orientation of the Criminalistics laboratory. Reconstruction of the crime scene through computer animation methods. (3.0) 3 credits Spring, Summer
-
3.00 Credits
Elements and proof of frequent concern in law enforcement, with reference to principal rules of criminal liability. Importance of criminal law at the enforcement levels is considered from crime prevention to courtroom appearance. Particular emphasis will be placed on the New York State Penal Law. Case analysis method is employed to study case precedents. (3,0) 3 credits Fall, Summer
-
3.00 Credits
Rules of evidence of particular importance at the operational level in law enforcement with emphasis on criminal procedure in areas such as arrest, force, and search and seizure. Particular emphasis will be placed on the New York State Criminal Procedure Law. The use of case tracking tools, within prosecution and court units and systems; the use of case outcome analytical techniques to determine trends in practice and effectiveness. (3,0) 3 credits Spring, Summer
-
3.00 Credits
Principles of organization and management in law enforcement and public safety. Analysis of the major problems in police organization and administration. Developing, maintaining and using complex and multiple information systems for crime trends as well as internal organizational operations; use of management control systems and associated computer information analysis and simulation tools for police patrol planning and evaluation. Examination of the role of technology in the police crime prevention function. (3,0) 3 credits Spring, Summer
-
3.00 Credits
Computer Forensics III is a continuation of CRJ 115. This course covers topics such as disk geometry and organization. Master boot sector record and volume record creation and organization, file signatures for data type identification, cyclic redundancy checksum for data integrity validation, and RSA's MD5 hash values for file authentication. Other subjects introduced include the UNIX "grep" search utility, search stringtechniques and file signature matching, and recovery of files that are intentionally deleted, hidden, or renamed. The course examines advanced computer-based evidentiary and "discovery" data methodologies, andincludes a study of evidence identification, documentation, and chain of custody procedures. Prerequisite(s): CRJ115 (3,0) 3 credits
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|