Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Criminal Justice
      • Digital Education in Practice
      • Investigation, Security and Defence
      • Law
      • Psychology
      • Computing
      • Design and creativity
      • Finance and Accounting
      • Marketing
      • Health and Care Management
      • Human Resource Management
      • Business Management
      • Supply Chain Management and Logistics
      • Hospitality and Tourism
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request it!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place
Support

UG Criminal Justice Reading Lists  CRI6008

Digital Forensics

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar.
Essential Resource Website

What is cybercrime? How to protect yourself from…

by Kaspersky
Essential Resource Video

A Brief Explanation of Cybersecurity and Why It…

by Bython
Essential Resource Video

Defining cyberwarfare...in hopes of preventing it…

by TED-Ed
Essential Resource Video

Cybercrime and cyber security | Forensic Lens…

by Mitchell, D
Essential Resource Video

How two moms are dealing with being victims of…

by NBC News
Essential Resource Article

Online Sexual Solicitation of Children and…

by Hornor, G.,

Lesson 2

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

What is Forensic Science?

by NJIT
Essential Resource Video

Computer Forensic Investigation Process (CISSP…

by Skillset
Essential Resource Website

ACPO Good Practice Guide for Digital Evidence

by Williams, J.
Essential Resource Video

Forensic Science: An Insider's Guide | BBC…

by BBC Ideas
Essential Resource Video

DFS101: 5.3 Digital Investigation Procedure

by DFIRScience
Essential Resource Video

What is Computer Forensics and How is it Used?

by Eye on Tech
Essential Resource Video

Types of Digital Forensics

by eSecurity Institute™️
Essential Resource Video

5 Skills Needed for a Career in Digital Forensics

by eSecurity Institute™️
Essential Resource Other

Guide to Integrating Forensic Techniques into…

by Kent, K. et al.
Essential Resource Other

When is Digital Evidence Forensically Sound?

by McKemmish, R.
Essential Resource Other

Electronic Crime Scene Investigation: A Guide for…

by Hagy, D. W.
Essential Resource eBook

Digital Forensics

by Årnes, A., ed.
Essential Resource eBook

Digital Forensics Explained

by Gogolin, G., ed
Essential Resource Article

Tool Testing and Reliability Issues in the Field…

by Horsman, G.
Essential Resource Video

Necessary skills for a career in digital…

by Infosec
Essential Resource Other

Digital forensics and incident response (DFIR)…

by Salfati, E. and Pease, M.
Essential Resource Article

"Get it right the first time": Critical…

by Julian, R., Kelty, S. and Robertson, J.
Essential Resource eBook

Digital Evidence and Computer Crime: Forensic…

by Casey, E.

Lesson 3

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

DFS101: 4.3 Electronic Evidence

by DFIRScience
Essential Resource Video

Forensic Acquisition in Windows - FTK Imager

by DFIRScience
Essential Resource eBook

Cybercrime Investigators Handbook

by Edwards, G.
Essential Resource Video

Forensic Analysis of sUAS aka Drones - SANS DFIR…

by SANS Digital Forensics and Incident Response
Essential Resource Audio

061: Order in the Court: Digital Evidence…

by Paperless Productivity
Essential Resource Website

Social media forensics in law enforcement…

by Thomson Reuters
Essential Resource Website

Forensics 101: What Is a Forensic Image?

by RAEDTS.BIZ
Essential Resource Website

What Is a Write Blocker?

by ThreatDotMedia
Essential Resource Video

What is chain of custody and why is it important…

by eyeWitness to Atrocities
Essential Resource Website

From Fitbits to PlayStations, the Justice System…

by Burgess, M.
Essential Resource Website

Exhibits

by Crown Prosecution Service (CPS)
Essential Resource Video

How to Make a Forensic Image with FTK Imager

by DFIR Noob
Essential Resource Website

Digital Forensics Techniques for Social Media…

by Cvitić, I., Praneeth, G. and Peraković, D.
Essential Resource Video

How To Prepare for Testifying in Court Presented…

by Primeau Forensics

Lesson 4

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Other

Understanding Issues in Cloud Forensics: Two…

by Dykstra, J. and Sherman, A. T.
Essential Resource Video

Cloud Forensics 101 (Cloud Next '18)

by Google Cloud Tech
Essential Resource Website

Computer Forensics Chain of Custody in Azure

by Microsoft
Essential Resource Video

Chain of Custody - CompTIA Security+ SY0-401: 2.4

by Professor Messer
Essential Resource Video

On-Premises vs. Cloud Forensics - SY0-601 CompTIA…

by Professor Messer
Essential Resource Article

A Survey on Cloud Forensics Challenges and…

by Simou, S. et al.
Essential Resource Article

A Survey on Security Challenges in Cloud…

by Tabrizchi, H. and Rafsanjani, M. K.
Essential Resource eBook

Strategic Engineering for Cloud Computing and Big…

by Hosseinian-Far, A., Ramachandran, M., Sarwar, D., eds.
Essential Resource Website

Types of Cloud

by JavaTpoint
Essential Resource Video

How to use Cloud forensics tools in Physical…

by Cellebrite
Essential Resource Video

What is the cloud?

by CNBC International
Essential Resource Other

NIST Cloud Computing Forensic Science Challenges

by Herman, M. et al.
Essential Resource Website

What is Platform-as-a-Service (PaaS)?

by IBM

Lesson 5

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

How to Unlock PIN Protected Android Device Using…

by Android Infosec
Essential Resource Website

The Integrated Future Of Mobile Forensics

by Forensic Focus
Essential Resource eBook

Digital Forensics Explained

by Gogolin, G.
Essential Resource Video

Webinar: An Introduction to Mobile Forensics

by MSAB
Essential Resource Video

Cell Phone Data And Records: Hidden Digital…

by Private Investigator Videos
Essential Resource Article

Forensic Analysis of Telegram Messenger on…

by Anglano, C., Canonico, M. and Guazzone, M.
Essential Resource Video

How Law Enforcement Breaks into iPhones

by CensiCLICK
Essential Resource Video

Mobile Phone Forensics | CYFOR

by CYFOR
Essential Resource Video

Alex Murdaugh Detailed Timeline Revealed by Cell…

by News 19 WLTX
Essential Resource Website

Mobile Phone Forensics Case Studies

by QCC Global
Essential Resource Website

Why is Mobile Forensic Tool So Important?

by Salvationdata Technology
Essential Resource Video

DFS101: 11.1 Mobile Device Investigations

by DFIRScience
Essential Resource Other

Evaluating Digital Forensic Tools (DFTs)

by Flandrin, F. et al.
Essential Resource Video

How to Make Forensic Image of a iPhone Using…

by GreyTech
Essential Resource Video

How Cops Say Patrick Frazee Faked Text Messages…

by Inside Edition
Essential Resource Video

How Cell Phone Analysis Helped Convict Patrick…

by KOAA News5

Lesson 6

Key Text eBook

Cybercrime and Digital Forensics: An Introduction.

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Website

Software vs Hardware Recovery

by CBL Data Recovery
Essential Resource Website

BBC Radio 5 Live Data Recovery.

by CDR Ltd
Essential Resource Video

Data Carving Demonstration.

by Adkins, J
Essential Resource Website

Infosecurity Magazine. Investigate and Recover…

by Belsher, A
Essential Resource Video

DFS101: 7.1 How to recover data.

by DFIRScience
Essential Resource Video

What Is The Difference Between Backup &…

by Edwards, J
Essential Resource Website

A Personal Tour of a Data Recovery Lab.

by Mahalik, H
Essential Resource Video

How Data Recovery Works (its usually not that…

by Mental Outlaw
Essential Resource Video

Data Recovery As Fast As Possible.

by Techquickie
Essential Resource Website

What is data recovery?

by UFS Explorer
Essential Resource Video

Data Loss Prevention - CompTIA Security+ SY0-501…

by Professor Messer
Essential Resource Video

7 Data Loss Prevention Best Practices (Expert…

by PurpleSec

Lesson 7

Key Text eBook

Cybercrime and Digital Forensics: An Introduction.

by Holt, Thomas J., Adam M. Bossler, and Kathryn C. Seigfried-Spellar
Essential Resource Website

Dark web paedophile Matthew Falder's…

by BBC News
Essential Resource Video

Process Injection Techniques - Gotta Catch Them…

by Black Hat
Essential Resource Website

Hide Artifacts: Hidden Files and Directories.

by The MITRE Corporation
Essential Resource Video

Windows MACB Timestamps (NTFS Forensics).

by 13Cubed
Essential Resource Video

DEF CON 24 - int0x80 - Anti Forensics AF.

by DEFCONConference
Essential Resource Other

Anti-Forensics: Techniques, Detection and…

by Garfinkel, S
Essential Resource Video

How Does Hard Drive Degaussing Work?

by Liquid Technology
Essential Resource Video

Anti-Forensics: Reverse Engineering a Leading…

by Black Hat
Essential Resource Video

What is a degausser?

by Whitaker Brothers
Essential Resource Video

How to Remove Metadata from PDF on Mac and…

by Wondershare PDFelement
Essential Resource Video

Hide Any File in an Image - Steganography…

by Gauging Gadgets
Essential Resource Video

0704 Slack Space And Swap File

by Hacking & Digital Forensics & Autopsy - Stay lunix
Essential Resource Video

How to edit the Metadata of an image or photo on…

by BrenTech
Essential Resource Video

DEF CON 20 - Michael Perklin - Anti-Forensics and…

by DEFCONConference
Essential Resource Article

Anti-forensics: Furthering digital forensic…

by Conlan, K., Baggili, I. and Breitinger, F.
Essential Resource Website

'Sadistic' paedophile Matthew Falder…

by Davies, C.
Essential Resource Website

Anti-forensic techniques and countermeasures

by Perklin, M.
Essential Resource Website

What is an HPA?

by Tabernus Support

Lesson 8

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Website

REvil hackers continue to wrack up high-profile…

by Dark Owl
Essential Resource Video

What is the world wide web?

by TEDEd
Essential Resource Video

Law Enforcement Challenges in investigating…

by The Human-Centric Cybersecurity Partnership (HC2P)
Essential Resource Website

Web Intelligence: How to Use Dark Web Data for…

by Yulevich, A.
Essential Resource Video

Talking Behind Your Back: Attacks and…

by Black Hat
Essential Resource Video

Dark Web Questions Answered By A Former Cyber…

by BuzzFeedVideo
Essential Resource Website

How Investigators Trace Crypto Criminals?

by Trigg, D.
Essential Resource Article

Politics of digital surveillance, national…

by Ünver, H. A.
Essential Resource Website

Everything you wanted to know about Tor but were…

by Anon, D.
Essential Resource Website

‘Playpen’ Creator Sentenced to 30 Years: Dark Web…

by Federal Bureau of Investigation (FBI)
Essential Resource eBook

Artificial Intelligence and National Security

by Montasai, R., ed.
Essential Resource Video

What are Sybil Attacks|Explained For Beginners

by Binance Academy
Essential Resource Website

Admin of Dark Web Child Pornography Website…

by Cimpanu, C.
Essential Resource Website

What is Surface Web, Deep Web and Dark Web?

by Hackers League
Essential Resource Website

The Truth about the Dark Web

by Kumar, A. and Rosenbach, E.
Essential Resource eBook

Artificial Intelligence and National Security

by Montasai, R., ed.
Essential Resource Website

Ep 126: REvil

by Rhysider, J.
Essential Resource Website

Deep Web Profile: REvil

by socRadar
Essential Resource Video

This Is How the FBI Will Catch You on the Dark Web

by The Infographics Show
Essential Resource Website

What is Tor? A beginner's guide to the…

by Dredge, S.

Lesson 9

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Essential Resource Video

What is Open Source Intelligence?

by ClearanceJobs
Essential Resource Video

What is unstructured data and why is it so…

by Marr, B.
Essential Resource Website

Cameroon soldiers jailed for killing women and…

by BBC News
Essential Resource Website

Assessing Geopolitical Risk: How OSINT Tools Can…

by Flashpoint
Essential Resource Website

A Beginners Guide to OSINT

by McFarlane, D.
Essential Resource Video

CEE14: The challenges of unstructured data

by Databarracks
Essential Resource Video

Have I Been Pwned

by Microsoft Developer
Essential Resource Video

Legal and Ethical Considerations of Open Source…

by Mossé Cyber Security Institute
Essential Resource Website

MH17 - The Open Source Evidence

by Higgins, E.
Essential Resource Audio

S1E16 | Dark web research tips for the OSINT-…

by James, M
Essential Resource Audio

Babbage: Open-source intelligence

by Joshi, S.
Essential Resource Audio

Use of OSINT to support Special Operational Forces

by Kemsley, H.
Essential Resource Audio

How emerging technologies drive the development…

by Kemsley, H
Essential Resource Website

OSINT Framework

by Nordine, J.
Essential Resource Video

Reconnaissance - SY0-601 CompTIA Security+ : 1.8

by Professor Messer
Essential Resource Website

How to use open source intelligence data to…

by Ricchiardi, S.
Essential Resource Video

Ethical Hacking - Phase 1 - Recon - 23 - Maltego

by Salmon, A.
Essential Resource Website

The Importance And Benefits Of Open Source…

by Bifolchi, G.

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon

Library@arden.ac.uk
AcademicSkills@arden.ac.uk
EnglishLanguageHub@arden.ac.uk

footer logo

Follow us on

  • Arden twitter

© 2005-2025 Arden University  | All rights reserved