Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About Library
    • Search the Library
    • A-Z Databases
    • Subject Guides
    • Research Tools
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
    • All Reading Lists

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

CRI6008

Digital Forensics

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar.
Essential Resource Website

What is cybercrime? How to protect yourself from…

by Kaspersky
Essential Resource Video

A Brief Explanation of Cybersecurity and Why It…

by Bython
Essential Resource Video

Defining cyberwarfare...in hopes of preventing it…

by TED-Ed
Essential Resource Video

Cybercrime and cyber security | Forensic Lens…

by Mitchell, D
Essential Resource Video

How two moms are dealing with being victims of…

by NBC News
Essential Resource Article

Online Sexual Solicitation of Children and…

by Hornor, G.,

Lesson 2

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

What is Forensic Science?

by NJIT
Essential Resource Video

Computer Forensic Investigation Process (CISSP…

by Skillset
Essential Resource Website

ACPO Good Practice Guide for Digital Evidence

by Williams, J.
Essential Resource Video

Forensic Science: An Insider's Guide | BBC…

by BBC Ideas
Essential Resource Video

DFS101: 5.3 Digital Investigation Procedure

by DFIRScience
Essential Resource Video

What is Computer Forensics and How is it Used?

by Eye on Tech
Essential Resource Video

Types of Digital Forensics

by eSecurity Institute™️
Essential Resource Video

5 Skills Needed for a Career in Digital Forensics

by eSecurity Institute™️
Essential Resource Other

Guide to Integrating Forensic Techniques into…

by Kent, K. et al.
Essential Resource eBook

Advances in Digital Forensics IV

by McKemmish, R.
Essential Resource Other

Electronic Crime Scene Investigation: A Guide for…

by Hagy, D. W.
Essential Resource eBook

Digital Forensics

by Årnes, A., ed.
Essential Resource eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Article

Tool Testing and Reliability Issues in the Field…

by Horsman, G.
Essential Resource Video

Necessary skills for a career in digital…

by Infosec
Essential Resource Other

Digital forensics and incident response (DFIR)…

by Salfati, E. and Pease, M.
Essential Resource Article

"Get it right the first time": Critical…

by Julian, R., Kelty, S. and Robertson, J.
Essential Resource eBook

Digital Evidence and Computer Crime: Forensic…

by Casey, E.

Lesson 3

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

DFS101: 4.3 Electronic Evidence

by DFIRScience
Essential Resource Video

Forensic Acquisition in Windows - FTK Imager

by DFIRScience
Essential Resource eBook

Cybercrime Investigators Handbook

by Edwards, G.
Essential Resource Video

Forensic Analysis of sUAS aka Drones - SANS DFIR…

by SANS Digital Forensics and Incident Response
Essential Resource Audio

061: Order in the Court: Digital Evidence…

by Paperless Productivity
Essential Resource Website

Social media forensics in law enforcement…

by Thomson Reuters
Essential Resource Website

Forensics 101: What Is a Forensic Image?

by RAEDTS.BIZ
Essential Resource Website

What Is a Write Blocker?

by ThreatDotMedia
Essential Resource Video

What is chain of custody and why is it important…

by eyeWitness to Atrocities
Essential Resource Website

From Fitbits to PlayStations, the Justice System…

by Burgess, M.
Essential Resource Website

Exhibits

by Crown Prosecution Service (CPS)
Essential Resource Video

How to Make a Forensic Image with FTK Imager

by DFIR Noob
Essential Resource Website

Digital Forensics Techniques for Social Media…

by Cvitić, I., Praneeth, G. and Peraković, D.
Essential Resource Video

How To Prepare for Testifying in Court Presented…

by Primeau Forensics

Lesson 4

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Website

Understanding Issues in Cloud Forensics: Two…

by Dykstra, J. and Sherman, A. T.
Essential Resource Video

Cloud Forensics 101 (Cloud Next '18)

by Google Cloud Tech
Essential Resource Website

Computer Forensics Chain of Custody in Azure

by Microsoft
Essential Resource Video

Chain of Custody - CompTIA Security+ SY0-401: 2.4

by Professor Messer
Essential Resource Video

On-Premises vs. Cloud Forensics - SY0-601 CompTIA…

by Professor Messer
Essential Resource Article

A Survey on Security Challenges in Cloud…

by Tabrizchi, H. and Rafsanjani, M. K.
Essential Resource eBook

Strategic Engineering for Cloud Computing and Big…

by Hosseinian-Far, A., Ramachandran, M., Sarwar, D., eds.
Essential Resource Website

Types of Cloud

by JavaTpoint
Essential Resource Video

How to use Cloud forensics tools in Physical…

by Cellebrite
Essential Resource Video

What is the cloud?

by CNBC International
Wider Reading Website

NIST Cloud Computing Forensic Science Challenges

by Herman, M. et al.
Wider Reading Website

What is Platform-as-a-Service (PaaS)?

by IBM

Lesson 5

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

How to Unlock PIN Protected Android Device Using…

by Android Infosec
Essential Resource Website

The Integrated Future Of Mobile Forensics

by Forensic Focus
Essential Resource eBook

Digital Forensics Explained

by Gogolin, G.
Essential Resource Video

Webinar: An Introduction to Mobile Forensics

by MSAB
Essential Resource Video

Cell Phone Data And Records: Hidden Digital…

by Private Investigator Videos
Essential Resource Article

Forensic Analysis of Telegram Messenger on…

by Anglano, C., Canonico, M. and Guazzone, M.
Essential Resource Video

How Law Enforcement Breaks into iPhones

by CensiCLICK
Essential Resource Video

Mobile Phone Forensics | CYFOR

by CYFOR
Essential Resource Video

Alex Murdaugh Detailed Timeline Revealed by Cell…

by News 19 WLTX
Essential Resource Website

Why is Mobile Forensic Tool So Important?

by Salvationdata Technology
Essential Resource Video

DFS101: 11.1 Mobile Device Investigations

by DFIRScience
Essential Resource Website

Evaluating Digital Forensic Tools (DFTs)

by Flandrin, F. et al.
Essential Resource Video

How to Make Forensic Image of a iPhone Using…

by GreyTech
Essential Resource Video

How Cops Say Patrick Frazee Faked Text Messages…

by Inside Edition
Essential Resource Video

How Cell Phone Analysis Helped Convict Patrick…

by KOAA News5

Lesson 6

Key Text eBook

Cybercrime and Digital Forensics: An Introduction.

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Website

Software vs Hardware Recovery

by CBL Data Recovery
Essential Resource Website

BBC Radio 5 Live Data Recovery.

by CDR Ltd
Essential Resource Video

Data Carving Demonstration.

by Adkins, J
Essential Resource Video

DFS101: 7.1 How to recover data.

by DFIRScience
Essential Resource Video

What Is The Difference Between Backup &…

by Edwards, J
Essential Resource Website

A Personal Tour of a Data Recovery Lab.

by Mahalik, H
Essential Resource Video

How Data Recovery Works (its usually not that…

by Mental Outlaw
Essential Resource Video

Data Recovery As Fast As Possible.

by Techquickie
Essential Resource Website

What is data recovery?

by UFS Explorer
Essential Resource Video

Data Loss Prevention - CompTIA Security+ SY0-501…

by Professor Messer
Essential Resource Video

7 Data Loss Prevention Best Practices (Expert…

by PurpleSec
Wider Reading Other

Good Practice Guide for Computer-Based Electronic…

by Association of Chief Police Officers
Wider Reading Website

Investigate and Recover From Ransomware Attacks…

by Belsher, A.,

Lesson 7

Key Text eBook

Cybercrime and Digital Forensics: An Introduction.

by Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar
Essential Resource Website

Dark web paedophile Matthew Falder's…

by BBC News
Essential Resource Video

Process Injection Techniques - Gotta Catch Them…

by Black Hat
Essential Resource Website

Hide Artifacts: Hidden Files and Directories.

by The MITRE Corporation
Essential Resource Video

Windows MACB Timestamps (NTFS Forensics).

by 13Cubed
Essential Resource Video

DEF CON 24 - int0x80 - Anti Forensics AF.

by DEFCONConference
Essential Resource Other

Anti-Forensics: Techniques, Detection and…

by Garfinkel, S
Essential Resource Video

How Does Hard Drive Degaussing Work?

by Liquid Technology
Essential Resource Video

Anti-Forensics: Reverse Engineering a Leading…

by Black Hat
Essential Resource Video

What is a degausser?

by Whitaker Brothers
Essential Resource Video

How to Remove Metadata from PDF on Mac and…

by Wondershare PDFelement
Essential Resource Video

Hide Any File in an Image - Steganography…

by Gauging Gadgets
Essential Resource Video

0704 Slack Space And Swap File

by Hacking & Digital Forensics & Autopsy - Stay lunix
Essential Resource Video

How to edit the Metadata of an image or photo on…

by BrenTech
Essential Resource Video

DEF CON 20 - Michael Perklin - Anti-Forensics and…

by DEFCONConference
Essential Resource Article

Anti-forensics: Furthering digital forensic…

by Conlan, K., Baggili, I. and Breitinger, F.
Essential Resource Website

'Sadistic' paedophile Matthew Falder…

by Davies, C.
Essential Resource Website

What is an HPA? What is a DCO?

by Tabernus Support
Wider Reading Video

What is HPA and DCO? - Host Protected Area…

by GMODISM

Lesson 8

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Website

REvil hackers continue to wrack up high-profile…

by Dark Owl
Essential Resource Video

What is the world wide web?

by TEDEd
Essential Resource Video

Law Enforcement Challenges in investigating…

by The Human-Centric Cybersecurity Partnership (HC2P)
Essential Resource Video

Talking Behind Your Back: Attacks and…

by Black Hat
Essential Resource Video

Dark Web Questions Answered By A Former Cyber…

by BuzzFeedVideo
Essential Resource Website

How Investigators Trace Crypto Criminals?

by Trigg, D.
Essential Resource Website

Everything you wanted to know about Tor but were…

by Anon, D.
Essential Resource Website

‘Playpen’ Creator Sentenced to 30 Years: Dark Web…

by Federal Bureau of Investigation (FBI)
Essential Resource eBook

Artificial Intelligence and National Security

by Montasai, R., ed.
Essential Resource Video

What are Sybil Attacks|Explained For Beginners

by Binance Academy
Essential Resource Website

Admin of Dark Web Child Pornography Website…

by Cimpanu, C.
Essential Resource Website

What is Surface Web, Deep Web and Dark Web?

by Hackers League
Essential Resource Website

The Truth about the Dark Web

by Kumar, A. and Rosenbach, E.
Essential Resource Website

Ep 126: REvil

by Rhysider, J.
Essential Resource Website

Deep Web Profile: REvil

by socRadar
Essential Resource Video

This Is How the FBI Will Catch You on the Dark Web

by The Infographics Show
Essential Resource Website

What is Tor? A beginner's guide to the…

by Dredge, S.
Wider Reading Article

Shining a Light on Policing of the Dark Web: An…

by Davies, G.

Lesson 9

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

What is Open Source Intelligence?

by ClearanceJobs
Essential Resource Video

What is unstructured data and why is it so…

by Marr, B.
Essential Resource Website

Cameroon soldiers jailed for killing women and…

by BBC News
Essential Resource Website

Assessing Geopolitical Risk: How OSINT Tools Can…

by Flashpoint
Essential Resource Website

A Beginners Guide to OSINT

by McFarlane, D.
Essential Resource Video

CEE14: The challenges of unstructured data

by Databarracks
Essential Resource Video

Have I Been Pwned

by Microsoft Developer
Essential Resource Video

Legal and Ethical Considerations of Open Source…

by Mossé Cyber Security Institute
Essential Resource Website

MH17 - The Open Source Evidence

by Higgins, E.
Essential Resource Audio

S1E16 | Dark web research tips for the OSINT-…

by James, M
Essential Resource Audio

Babbage: Open-source intelligence

by Joshi, S.
Essential Resource Audio

Use of OSINT to support Special Operational Forces

by Kemsley, H.
Essential Resource Audio

How emerging technologies drive the development…

by Kemsley, H
Essential Resource Website

OSINT Framework

by Nordine, J.
Essential Resource Video

Reconnaissance - SY0-601 CompTIA Security+ : 1.8

by Professor Messer
Essential Resource Website

How to use open source intelligence data to…

by Ricchiardi, S.
Essential Resource Video

Ethical Hacking - Phase 1 - Recon - 23 - Maltego

by Salmon, A.
Essential Resource Website

The Importance And Benefits Of Open Source…

by Bifolchi, G.

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2025 Arden University  | All rights reserved