Introduction to Forensic Science
About this Course
We have all seen forensic scientists in TV shows, but how do they really work? What is the science behind their work? The course aims to explain the scientific principles and techniques behind the work of forensic scientists and will be illustrated with numerous case studies from Singapore and around the world. Some questions which we will attempt to address include: How did forensics come about? What is the role of forensics in police work? Can these methods be used in non-criminal areas? Blood. What is it? How can traces of blood be found and used in evidence? Is DNA chemistry really so powerful? What happens (biologically and chemically) if someone tries to poison me? What happens if I try to poison myself? How can we tell how long someone has been dead? What if they have been dead for a really long time? Can a little piece of a carpet fluff, or a single hair, convict someone? Was Emperor Napoleon murdered by the perfidious British, or killed by his wallpaper? *For Nanyang Technological University (NTU) students, please be noted that this course will no longer be eligible for credit transfer.Created by: Nanyang Technological University, Singapore

Related Online Courses
The course begins with a discussion about data: how to improve data quality and perform exploratory data analysis. We describe Vertex AI AutoML and how to build, train, and deploy an ML model... more
In this course, you will: - Explore the applications of GANs and examine them wrt data augmentation, privacy, and anonymity - Leverage the image-to-image translation framework and identify... more
Our online Immunology Specialisation has been developed to provide central concepts in human immunology as well as advanced topics from cutting-edge research relating to clinical disease of the... more
This course will teach you how machines can be trained to understand and process human language using various NLP algorithms. You\'ll explore lexical processing, basic syntactic processing, and... more
Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, the GCP Resource Manager,... more