Your SlideShare is downloading. ×
Computer Forensics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Computer Forensics

1,161
views

Published on

Just a brief info about computer forensic, certification, career. …

Just a brief info about computer forensic, certification, career.
Source: cybecareer


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,161
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
41
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Computer forensic analysts use their computer science background and forensic skills to recover information from computers and data storage devices. Analysts often work alongside law enforcement officers helping to solve cyber crimes or find electronic evidence of other kinds of crime. Computer forensics analysts usually have a bachelor's degree in computer science and may have training in criminal justice or accounting D3pak
  • 2. CCoommppuutteerr FFoorreennssiiccss AAnnaallyysstt JJoobb DDeessccrriippttiioonn • The field of computer forensics is the information security branch of law enforcement and is closely related to forensic science and criminal justice work; therefore, most computer forensic analysts work for law enforcement agencies. The role of the analyst is to recover data like documents, photos and e-mails from computer hard drives and other data storage devices, such as zip and flash drives, that have been deleted, damaged or otherwise manipulated. Analysts often work on cases involving offenses committed on the Internet ('cyber crime') and examine computers that may have been involved in other types of crime in order to find evidence of illegal activity. As an information security professional, a computer forensic analyst may also use their expertise in a corporate setting to protect computers from infiltration, determine how a computer was broken into or recover lost files. D3pak
  • 3. DDuuttiieess ooff aa CCoommppuutteerr FFoorreennssiicc AAnnaallyysstt • Computer forensic analysts use forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files. They use their technical skills to hunt for files and information that have been hidden, deleted or lost. They help detectives and other officials analyze data and evaluate its relevance to the case under investigation. Analysts also transfer the evidence into a format that can be used for legal purposes (i.e. criminal trials) and often testify in court themselves. D3pak
  • 4. CCaarreeeerr RReeqquuiirreemmeennttss ffoorr CCoommppuutteerr FFoorreennssiicc AAnnaallyyssttss CCoommppuutteerr ffoorreennssiicc aannaallyyssttss mmuusstt bbee ffaammiilliiaarr wwiitthh ssttaannddaarrdd ccoommppuutteerr ooppeerraattiinngg ssyysstteemmss,, nneettwwoorrkkss aanndd hhaarrddwwaarree aass wweellll aass sseeccuurriittyy ssooffttwwaarree aanndd ddooccuummeenntt--ccrreeaattiioonn aapppplliiccaattiioonnss.. AAnnaallyyssttss mmuusstt hhaavvee eexxppeerrttiissee iinn hhaacckkiinngg aanndd iinnttrruussiioonn tteecchhnniiqquueess aanndd pprriioorr eexxppeerriieennccee wwiitthh sseeccuurriittyy tteessttiinngg aanndd ccoommppuutteerr ssyysstteemm ddiiaaggnnoossttiiccss.. AAss tthheeiirr ttiittllee ssuuggggeessttss,, aannaallyyssttss aarree eexxppeecctteedd ttoo hhaavvee eexxcceelllleenntt aannaallyyttiiccaall sskkiillllss,, ttoo bbee hhiigghhllyy ccoonnsscciioouuss ooff ddeettaaiillss aanndd ttoo bbee aabbllee ttoo mmuullttii--ttaasskk eeffffiicciieennttllyy.. D3pak
  • 5. Educational Requirements for Computer Forensic Analysts A 4-year degree, such as a Bachelor of Arts in Information Technology or a Bachelor of Science in Computer Science, is required to begin a career as a computer forensic analyst. Undergraduate studies in accounting and criminal justice can also help prepare analysts for the types of skills and experience they need in the workplace. Some colleges offer programs in computer forensics, but most computer forensic analysts learn advanced investigative techniques on-the-job after obtaining a degree in a related subject. D3pak
  • 6. Certification Vendor-Neutral Computer Forensics Certifications  Computer Hacking Forensic Investigator CHFI : This certification from EC-Council  Certified Computer Examiner : The Certified Computer Examiner (CCE®) certification offered by the International Society of Forensic Computer Examiners (ISFCE)  Certified Computer Forensics Examiner (CCFE) : Certification from the Information Assurance Certification Review Board (IACRB)  Certified Digital Forensics Examiner (CDFE) : Certification from Mile2  Certified E-Discovery Specialist (CEDS) : This certification from the Association of Certified E-Discovery Specialists (ACEDS)  CyberSecurity Forensic Analyst (CSFA) : Certification from CyberSecurity Institute  GIAC Certified Forensic Analyst (GIAC) and Certified Forensic Analyst (GCFA) : Certification from The SANS (System Administration, Networking, and Security) Institute  IACIS Certified Forensic Computer Examiner : The IACIS Certified Forensic Computer Examiner (CFCE) certification from the International Association of Computer Investigative Specialists (IACIS) D3pak • For more: http://www.techexams.net/blogs/jdmurray/11-computer-forensics-certifications.html
  • 7. CCoonntt.. Vendor-Specific Computer Forensics Certifications  AccessData Certified Examiner : AccessData Certified Examiner (ACE) certification from AccessData Group, LLC  AccessData also offers certifications in its Summation litigation product : i. Certified Forensic Investigation Practitioner ii. Certified Mac Forensics Specialist iii. Certified Malware Investigator  EnCase Certified Examiner : EnCase® from Guidance Software  EnCase Certified eDiscovery Practitioner : The EnCase® Certified eDiscovery Practitioner (EnCEP™) D3pak
  • 8. EEmmppllooyymmeenntt OOuuttllooookk aanndd SSaallaarryy IInnffoorrmmaattiioonn • The U.S. Bureau of labor Statistics doesn't provide salary or employment growth data specifically for computer forensic analysts; however, data for computer systems analysts is available. In May 2012, computer systems analysts had a median salary of $79,680, and the BLS indicated these workers might see employment growth of 22% from 2010 to 2020. • Src : ussalary D3pak
  • 9. Reference: Cybecareer • Mail : Deepakniit14@gmail.com • Tweet : @D3pak • Facebook : Fb/D3pak D3pak
  • 10. Reference: Cybecareer • Mail : Deepakniit14@gmail.com • Tweet : @D3pak • Facebook : Fb/D3pak D3pak