Future of Digital Forensics: A Survey of Available Training
|
|
- Anis Walters
- 8 years ago
- Views:
Transcription
1 Future of Digital Forensics: A Survey of Available Training A. Evans, A. Williams, and J. Graham Computer Science Department, Norfolk State University, Norfolk, VA USA Abstract The field of forensics is multidisciplinary by nature, founded on the disciplines of criminology and information technology. However, most course work leading to a foundation in the field are offered within the Chemistry and Biology disciplines in addition to Computer Science. Regardless of the framework in which the courses are offered, the coursework itself must address social, legal, and ethical considerations for practitioners. In an effort to satisfy the different needs associated with forensics, there are different avenues one can pursue when seeking training in the field. Our research has identified 37 computer-related programs including some two-year associate degrees, fouryear baccalaureate programs, graduate certificate programs, and non graduate certificate programs. First, we briefly define digital forensics. Second, we then discuss the different schools and what is unique about their programs. Third, we will discuss the certification programs that are available for those not interested in obtaining a degree. Keywords- forensics investigations; electronic discovery (ediscovery); emulation learning (elive); digital forensics; education 1. Introduction As computer crimes have increased in numbers, so has the need for professionals within the field of digital forensics. The need to understand computer systems, how they operate, as well as how to attempt to keep them secure, remains of high importance. It is also important to understand computer forensics. After a computer system has been compromised and a crime has taken place, there is a need for a computer forensics investigation to follow. Computer forensics often gets mistaken for computer security and therefore anyone studying computer science can benefit from understanding not only the definition of computer forensics, but also its importance. Digital forensics differs from computer security which refers to securing computers against malicious attacks. It is also not the same as using computers to solve crimes. Criminal forensics techniques include matching fingerprints, ballistic testing, and DNA matching. By adding the ability to practice proper computer forensics techniques, it will help to ensure the overall integrity and survivability of the network s infrastructure. In addition, practicing good computer forensics techniques will help your organization, if you consider computer forensics as one of the basic elements in what is known as a defense-in-depth approach to network and computer security. 2. What is digital forensics? Digital forensics is a branch of forensic science that was developed to meet an urgent need in the early 1990s. It consists of the recovery and investigation of material found in digital devices, often in direct relation to a computer crime. The term digital forensics was mainly used to refer to computer forensics but has expanded over the years to cover all devices capable of storing digital media and today is used to describe the entire field. National policies were developed in the early 2000s and now investigations can fall into one of four categories. Forensic analysis is probably the most common category. Within this category evidence is recovered to support or oppose a hypothesis before a criminal court. This could easily be confused with evidence gathering, where material is intended to identify other suspects/crimes. Then there is the electronic discovery (ediscovery). This is a form of discovery related to civil litigation and intrusion investigation. ediscovery is an investigation specifically designed to examine the extent of an unauthorized network intrusion. The technical side of investigations can be broken down into several subbranches; computer forensics, network forensics, database forensics and mobile device forensics. An active investigation can utilize any number of the fields combined. Computer forensic scientist or technicians are considered to be on the cutting edge within the criminal justice field. With the increase of cybercrime, cyber-terrorism, identity theft, and Internet child predators, computer forensic scientists are needed to track what were once thought to be traceless criminals. Computer forensic scientists are called on for many different agencies to be successful. Their expertise is needed for work with law enforcement officials, legal teams, independent companies and the government to conduct investigations, retrieve evidence and sometimes
2 even testify in court. Computer forensic scientists remain in a high demand because of their thorough practical knowledge of computers, networks, hacking, data retrieval, information security, and computer surveillance. They are also perceived to be well trained in ethics as well as criminal justice topics like confidentiality, privacy laws and evidence handling. In most cases a computer forensics investigator will be required to work independently. There are some instances when forensic investigators will be under the direct supervision of a computer forensic scientist; however. forensic investigators should not only expect to work independently, they should also be prepared to work under stressful situations. Digital forensics is not limited to identifying direct evidence of a crime, it can also be used to link evidence to specific suspects, confirm alibis or statements, determine criminal intent, or identify sources in copyright cases. With digital forensics, the investigations are broader in scope than other areas of forensic analysis. The digital forensic process is made up of the seizure, forensic imaging and analysis of digital media. Once all is said and done, there is a report produced documenting the digital evidence for the courts or an employer. 3. Degree Training Programs Offered The research performed for this paper uncovered 38 computer forensics-related programs including two-year associate degrees [7, 11, 14, 15, 18, 21, 22], four-year baccalaureate programs [3, 5, 7, 8, 26, 38], master s degree programs of study [11, 25, 26, 32], graduate certificate programs [10, 23, 24, 32, 33] and non-graduate-level certificate programs [1, 2, 4, 6, 9, 13, 16, 17, 19, 20, 25, 27, 28]. 3.1 Associate Degree Programs In an effort to satisfy the different needs associated with forensics, there are different avenues one can pursue when seeking training in the field. At the City College of Chicago [37], they offer several programs leading to an Associate in Applied Science degree (A.A.S.) for information Technology. They also offer a Basic Certificate in Computer Security and Forensic Investigation (CSFI). Their CSFI program was particularly interesting in that it covered two areas of interest, Information Security and Computer Forensic Law Enforcement. The Information Security area of emphasis focuses on the design, implementation and management of the information security in the corporate environment. This course prepares their students for the Certified Information Systems Security Professional (CISSP) Exam. The CISSP certification is nationally recognized. The area of emphasis that focuses on Forensic/Law Enforcement focuses mainly on the computer forensic investigation and provides law enforcement personnel, criminal justice majors with procedures and methods for investigation of computer crimes and handling electronic evidence. 3.2 Baccalaureate Programs Of the four-year colleges researched, Defiance College was the one that seemed to offer the most in-depth training. Their program offers unique opportunities for students to study and gain hands-on experiences working in labs, and mock crime-scenes. The tools and techniques of digital forensics are also applied in situations where data is constantly in motion, such as while recognizing and responding to intrusions into a company s computer network, or when recovering data from small-scale digital devices such as cell phones and PDAs. Of all the evidence collecting procedures digital evidence collection is probably the most tedious process requiring the most discipline. It is important for the evidence to be precise for it to be admissible in court. Here the students learn how to preserve the integrity of digital evidence; extract live, static, and deleted data from various media; and thoroughly document and present their findings. In addition, students in this program develop a well rounded background which consist of general education, criminal justice, and computer technology fundamentals. At the completion of this program the students will graduate with two professional certificates in hand, a degree in Digital Forensic Science, and the practical experience gained from utilizing the internship program. [38] First, the students learn about the computers by preparing for the CompTIA A+ certification as an IT Technician. This certification is widely respected when seeking entry level information technology employment. Next the students begin learning about operating systems, security principles, and networking. Once the computer background is established the students begin learning the science of forensics and how it is applied the digital aspect of computers that are turned off, computers that are still running, computers communicating with one another, and small-scale digital devices such as cell phones, PDAs, smart phones, and other hybrid systems. In addition, the students learn the value and importance of having high ethics and personal integrity. After learning all of these skills sets the student have the opportunity to fine tune their skills through an internship with one of many different agencies performing forensics work. The different internships offered to students will be afforded to them in their senior year. These are opportunities for the students to perform hands-on training and for them to participate in actual cases that are in the process of being prosecuted. The courses offered at Defiance College in Digital Forensics are as follows: CompTIA A+ exam prep, Introduction to Computer and Digital Forensics, Computer Security Fundamentals,
3 Operating Systems, Computer Forensics and Security Ethics, Law Enforcement Field Experience, Seizure and Forensic Examination of Computer Systems, Advanced Topics in Computer Data Analysis and Recovery, Fundamentals of Computer Networks, Network Forensics, Intrusion Detection, National Certification, and Computer Forensic Field Experience and Seminar. 3.3 Graduate Programs When dealing with law enforcement, computer forensics scientist and investigators are considered to be highly educated and are therefore expected to have a bachelor s degree. Because of the limited programs available, obtaining a Master s degree in a field like computer science or criminal justice can be difficult. Once obtained, the master s degree can prove to be extremely beneficial in acquiring the top level jobs. Students in these programs will learn about cutting edge technologies, systems and concepts needed to succeed in computer forensics. Those with Master s degrees can also expect to receive a higher salary than those who only hold undergraduate degrees, and they may be promoted earlier and more frequently also. Each of the Graduate Degree programs differ slightly in the courses required to complete the degree. All of the programs researched required between semester credits to complete the degree [11.25,26,32]. 3.4 Certificate Programs Computers and various digital devices are essential in the daily operations of organization. This high dependency of technology brings with it serious security challenges. Criminals make their living hacking into these businesses. In order to mitigate these risks there must be a way for IT professionals to obtain a comprehensive overview of digital forensics. Of the certificate programs we researched, Boston University s Graduate Certificate program was most appealing. This specialized graduate certificate program in digital forensics provides the students with comprehensive digital crime scene investigation knowledge. The program introduces students to forensic analysis policy and procedures, forensic analysis tools, data recovery, and investigation, among other topics. The program is unique in that it offers the course work on campus and via an online format called Emulation Live format (elive). This format allows the students to get a blend of both on campus classroom sessions as well as the online courses. elive courses include: Several traditional, face-to-face classroom sessions throughout the semester Online content that allows students to complete coursework and collaborate with classmates and instructors using Internet service Multimedia online technology utilizing virtual lectures, video conferencing, real-time collaborative sessions, correspondence, projects, and assignments Course materials and discussion threads that are accessible online 24 hours a day, 7 days a week 4. Uses for Degree Training The majority of Information Technology (IT) professionals in business and law enforcement agencies already have college degrees. They do not need to concern themselves with the programs leading to a two or four-year degree. In these cases a certificate program would be more advisable than a second college degree to perform computer forensics works. Now that the need for digital forensics experts is on the rise, students are encouraged to pursue a degree program of some sort. More businesses are looking for people with specialized skill sets. Digital forensics is a field that requires attention to detail in all aspects of the job. Digital forensics jobs are often found within lawenforcement, military, government intelligence agencies and private security or consulting companies. To get a more indepth idea of the types and number of jobs available you can search a popular job bank called Dice and it will return around 160 different jobs at the time of publication. If you do the same thing with Monster.com you will return around 210 different jobs. The numbers are not staggering, but they are on the rise. The different job titles varied from Computer Forensics Analyst to Vulnerability Security Research Engineer. Most of these jobs require a degree of at least two years of experience and others require a security clearance. Some of the jobs would accept equivalent knowledge and job experience in place of the required education, or just the opposite, an advanced degree in place of some of the required experience. 4.1 Salary Ranges It has been predicted by the Bureau of Labor Statistics that computer forensic investigators will remain in high demand for the next several years to come. The data provided covers both self employed forensic investigators as well as those employed by a firm. Generally speaking there will be more stability offered by a firm. Self employed investigators would enjoy more flexibility. Their salary could also be either substantially lower or higher than their counter parts working within a firm. When analyzing the data we found that digital forensics is usually combined or closely related to the criminal justice field. Employment of private detectives and investigators is expected to grow 22 percent over the decade, substantially faster than the average for all occupations [39]. As mentioned previously in this paper, the increased demand for private detectives and investigators is a direct result from the heightened security concerns, increased litigation, and the need to protect
4 confidential information and property of all kinds. Criminal activity on the internet includes spamming, identity theft, e- mail harassment, and more recently illegal downloading of copyrighted materials. The average salary reported in 2006 by the Bureau of Labor Statistics was $33,750 for private investigators[39]. Generally those in the field of computer forensics earn higher salaries. Median annual wages of salaried private detectives and investigators were $41,760 in May The middle 50 percent earned between $30,870 and $59,060. The lowest 10 percent earned less than $23,500, and the highest 10 percent earned more than $76,640. Wages of private detectives and investigators vary greatly by employer, specialty, and geographic area. [39] Depending on the casework, these professionals may also encounter irregular schedules and long overtime hours. Related Works There is currently ongoing research targeted at enhancing the way forensic courses are being taught. The Cyber Defense Trainer (CYDEST) [34] was developed by a group of researchers to incorporate the use of a virtualized training platform for computer forensics. Through the use of virtual machines, it provides tactical level exercises for network administrators, first responders, and digital forensics investigators. CYDEST is more than just a tool to create different scenarios, it also makes it possible for student s every action to be properly monitored and recorded for later viewing by their professors. CYDEST ultimately provides a level of realism and automation for the student while reducing the workload of an instructor [34]. In addition, there is other research that argues the best form of realism is the real thing. In their paper, Designing Computer Forensics courses using Case Studies to Enhance Computer Security Curricula [35], they argue that computer forensics courses should be designed and taught utilizing actual court cases that represent actual cyber crimes. They believe that by using actual cases the students will learn more and better understand the existing Cyber Laws. Students can perform their own forensic investigations and compare them with the actual case and learn from their mistakes or reinforce the positive. There is also research being done in the online arena. Wang, of Southern Polytechnic State University, has written a paper, Web-Based Interactive Courseware for Information Security, that talks about teaching such topics as security and forensics, utilizing Web-based multimedia and interactive courseware. The courseware is based on the use of a tool called Multimedia and Interactive Courseware Synthesizer, (MICS) [36]. MICS provides an interactive platform for students to learn. Security courses in general can be hard to master without student instructor interaction. MICS, on the other hand, provides an interactive learning environment that can also incorporate games to be used for instruction. The primary focus of MICS is to be able to develop a collection of hands-on labs that cover security, privacy, reliability and business integrity. 5. Conclusion In conclusion, it is evident that the need for computer forensics specialists is increasing. As this need continues to rise, it is imperative that educational opportunities increase as well. In addition, we must strive to stay on the cutting edge of the industry s demands. Digital forensics is a new and a constantly changing field which requires constant improvement and updating. There has to be more of an effort to consult practitioners in the field in order to continue developing relevant course material. There should also be a greater effort towards encouraging more organizations to offer internships in the field of digital forensics. In addition, we found that computer forensics is a growing multi-disciplinary field with increasing industry demand. Even with the lack of publicly recognized program standards to follow at this time, there are a number of good examples of two and four year programs [21, 22, 38]. At the master s level, [26, 32] serve as good examples. In comparison to other Scientific Fields of study, few programs exist at this time for computer forensics. Most of the programs are located in eastern portion of the United States with about 25% of the programs on the west coast. It is evident that there is plenty room for future growth with respect to the training programs offered in the Digital Forensics field 6. References [1] ms/cybercrimeinvest.htm. [2] [3] [4] [5] cs.htm. [6] [7] [8] [9] n/certificate+programs/computer+crime_investigation s+and+computer+forensics.htm. [10] [11] [12] uateforensiccomputing.asp. [13] [14] [15]
5 [16] [17] rsedescriptions.htm. [18] [19] 2&page=CertForensics. [20] htm. [21] in_secur.htm. [22] [23] nt/degrees/acad_prog_71.cfm. [24] ml. [25] pf/cpf_gen.asp. [26] [27] [28] http//wright.ccc.edu/department/forensics/index.asp [29] J. Heiser, and W. Kruse, What Exactly is Computer Forensics? [30] er_forensics_services.html. [31] S522.pdf. [32] [33] [34] Bruekner, S., Guaspari, D., Adelstein, F., & Weeks, J. (2008). Automated computer forensics training in a virtualized environment. Retrieved March 7, 2011, from Scince Direct: brueckner.pdf [35] Herath, A., Herath, S., Goonatilake, R., Herath, S., & Herath, j. (2007). Designing computer forensics courses using case studies to enhance computer security curricula. Journal of Computing Sciences in Colleges, [36] Wang, A. J. (2005). Web-Based Interactive Courseware for Information Security. SIGITE '05 Proceedings of the 6th conference on Information technology education (pp ). New York: ACM. [37] [38] Science.html [39]
CAREER: FORENSIC SCIENCE TECHNICIAN 1
CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN
More informationWILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM
WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
More informationInformation Systems Technology & Cybersecurity Programs
Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer
More informationServices. Computer Forensic Investigations
DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas
More informationHow To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationSection I: Request. Section II: Need
Criminal Justice Minor Department of Sociology, Social Work and Anthropology College of Humanities and Social Sciences Utah State University CIP Code: 43.0107 Section I: Request The Sociology, Social Work
More informationComputer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
More informationCRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION
VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional
More informationMASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES
Program Overview The M.S. in Biomedical Forensic Sciences trains individuals for a variety of disciplines applied to crime scene investigation and evidence analysis. The only program of its kind based
More informationDiablo Valley College Catalog 2014-2015
ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,
More informatione-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, President 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS # 11-5605
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
More informationOnline Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
More informationComputer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
More informationEngineering Forensics
Engineering Forensics Inter-Faculty Bachelor of Forensic Science Forensic science is the study of evidence in criminal investigation for presentation in courts of law. Crime scene artifacts are frequently
More informationDIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
More informationAmerican Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
More informationForensic Science. Three Certificate Programs in. Certificates in: Death Investigation Forensic Toxicology. Forensic Science
Three Certificate Programs in Forensic Science Giving you investigative skills to broaden the scope of your job opportunities Certificates in: Death Investigation Forensic Toxicology Forensic Science Sponsored
More informationInformation Systems. College of Engineering & Information Sciences. Careers That Fit You
Information Systems College of Engineering & Information Sciences Careers That Fit You Build your career around your talents Do you have an interest in computers and how their programs work? Do you have
More informationCLASS TITLE: CRIMINAL INVESTIGATOR II. LOCATION: Grand Junction, Colorado. PRIMARY PHYSICAL WORK ADDRESS: Grand Junction, CO
CLASS TITLE: CRIMINAL INVESTIGATOR II STATE OF COLORADO invites applications for the position of: CBI Forensic Services Crime Scene Analyst, Grand Junction A residency waiver has been granted for this
More informationHow To Train For A Criminal Justice Program
Criminal Justice Program Expansion State Submission Mark Wilson, President January 2014 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program... 2 Objectives and Purpose
More informationForensic Chemistry Curriculum
SECTION 1 GENERAL STANDARDS. [Excerpt] Standard 4.3.1 General Curriculum Requirements The undergraduate program in forensic science shall offer a coherent curriculum that reflects the mission and goals
More informationChapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
More informationOverview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
More informationINNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf
EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
More informationDEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES
DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES STUDENT HANDBOOK FOR CRIMINOLOGY MAJORS 2015-2016 SEPTEMBER 2015 REVISION DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES UNDERGRADUATE PROGRAM
More informationJustice Studies - Criminal Justice Associate in Applied Science Degree (A.A.S.)
Berkeley College Overview Academic Programs Admissions and Finances Administration, Faculty, and Staff Contact Us Justice Studies - Criminal Justice Associate in Applied Science Degree (A.A.S.) Course
More informationUniversity of Maryland University College. American Military University. Henley-Putnam University
A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University
More informationDIABLO VALLEY COLLEGE CATALOG 2015-2016
ADMINISTRATION OF JUSTICE ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police
More informationWashburn University School of Applied Studies Department of Criminal Justice and Legal Studies
Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies Proposed Program Forensic Investigations Program Criminal Justice Department Date of Implementation: August
More informationUNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation
More informationConsulting careers: A profile of three occupations
Consulting careers: A profile of three occupations Choosing an industry in which to work is often as important as choosing an occupation. And over the next several years, the best advice for some workers
More informationwww.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
More informationCONTENT. King Hussein Faculty of Computing Sciences
CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.
More informationProgram Assessment Report
Program Assessment Report I. Degree Name: Criminal Justice II. Academic year: 2011-12 III. Completer of Form: Barry Langford IV. Sources of Evaluative information: Seniors in CJAD 495 take the Major Field
More informationThe Cisco Networking Academy at Erie Community College
The Cisco Networking Academy at Erie Community College The Academy History and Goals In existence since 1997, the Cisco Networking Academy delivers a comprehensive, 21st century learning experience to
More informationAmerican Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationDIVISION OF HEALTH PROFESSIONS VIRGINIA BEACH CAMPUS
DIVISION OF HEALTH PROFESSIONS VIRGINIA BEACH CAMPUS Dear Applicant: If you enjoy the health care field, but prefer not to work in direct patient care, or you wish to use computer science or business skills
More informationSouth Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
More informationFAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE
FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE ACADEMIC AFFAIRS COMMITTEE PROPOSAL PRESENTATION COVER SHEET (Proposal from College of Arts and Sciences) I. Proposal: Notification
More informationContents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions
Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces
More informationDEPARTMENT OF CRIMINAL JUSTICE
122 Department of Criminal Justice DEPARTMENT OF Mr. Mark Mills, Department Chairperson Assistant Professors: M. Mills, J. Phan, K. Treece, A. Trimble The Criminal Justice Program is dedicated to providing
More informationMaster of Christian Science in Criminology and Criminal Justice (SCCJ.M)
Master of Christian Science in Criminology and Criminal Justice (SCCJ.M) The online M.S. of Christian Science in Criminology and Criminal Justice degree requires 36 credit hours regardless of whether a
More informationCrafting an Undergraduate Information Security Emphasis Within Information Technology
Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu
More informationMaster of Science in Forensics
Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational
More informationCertified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
More informationWelcome to the Personal Fitness Trainer Program online information session. The information session is designed to supply applicants to the Personal
Welcome to the Personal Fitness Trainer Program online information session. The information session is designed to supply applicants to the Personal Fitness Trainer program with accurate information and
More informationFORENSIC SCIENCE COURSE DESCRIPTION
FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on
More informationFORENSIC SCIENCE INSTITUTE COURSE DESCRIPTIONS 2015-2016
FORENSIC SCIENCE INSTITUTE COURSE DESCRIPTIONS 2015-2016 FRSC 2503 Introduction to Forensic Science Introduction to Forensic Science is a survey course designed to acquaint the student with a comprehensive
More informationCRIMINAL JUSTICE PROGRAM
CRIMINAL JUSTICE PROGRAM University Plaza, Building D (435) 652-7815 http://dixie.edu/criminal_justice/index.php To find faculty & staff phone numbers and email addresses, please consult the University
More informationTo prepare students to meet their academic goals and personal growth potential;
3.7 Academic Program Review Criminal Justice/Pre-Law 2009-2014 Based on the thorough internal or external program review addressing all criteria in policy, a comprehensive report should be possible within
More informationAmerican Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
More informationSecurity and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map
Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support
More informationAmerican Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
More informationKnowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context
More information2. Neither the name of SWGIT, nor the names of its contributors, may be used to endorse or promote products derived from its documents.
Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,
More informationCyber threats are growing.
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
More informationComputer Support Specialists and Systems Administrators
http://www.bls.gov/oco/ocos268.htm Computer Support Specialists and Systems Administrators * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections
More informationROAD TO SUCCESS. College of Applied Science and Technology. Business & Information Technology
College of Applied Science and Technology ROAD TO SUCCESS Since 1964, thousands of people have advanced their careers at Summit County s only community college. In 2014, the college reorganized and expanded
More informationThe Cisco Networking Academy at Erie Community College
The Cisco Networking Academy at Erie Community College The Academy History and Goals In existence since 1997, the Cisco Networking Academy delivers a comprehensive, 21st century learning experience to
More informationCapacity Building in Cyber Security Literacy: An Inter-disciplinary Approach
Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University
More informationIntroduction to Forensic Science and the Law. FBI Building Washington, DC
FBI Building Washington, DC 1 Objectives You will understand: How crime labs in the United States are organized and what services they provide. The growth and development of forensic science through history.
More informationhttps://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
More informationCriminal Justice Department Review - Spring 2007
Criminal Justice Department Review - Spring 2007 Section I. Criminal Justice Purpose and Goals 1. Mission: The mission of the Criminal Justice Area of Emphasis is to educate entry level and in-service
More informationactx.edu Law, Public Safety, Corrections & Security
actx.edu Law, Public Safety, Corrections & Security A Passion to Serve Honesty, sound judgment, integrity, and a sense of responsibility are essential characteristics for an individual who desires to pursue
More informationExpert Reference Series of White Papers. Planning a Career Path in Cybersecurity
Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,
More informationAS FORENSIC SCIENCE ACADEMY
TE AS FORENSIC SCIENCE ACADEMY TM "BETTER SCIENCE LEADS TO BETTER JUSTICE FOR ALL" I strongly feel the courses offered through the Texas Forensic Science Academy certificate program are a true benefit
More informationIn popular culture, the inventor is often
Patent work: The other side of invention Tamara Dillon Tamara Dillon is an economist in the Office of Occupational Statistics and Employment Projections, BLS. She is available at (202) 691 5733 or at dillon.tamara@
More informationSoftware/Applications Programmer Technical Writer E-Commerce Manager. Computer and Electronics Repair Interactive Media Developer
Information Technology Career Majors Description: Information Technology (IT) is the study, design, development, implementation, support or management of computer-based information systems, particularly
More informationSouth Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position
More informationCourse Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History
More informationEvidence Technician s School
Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles
More informationCONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
More informationCERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
More informationSufficiency of Windows Event log as Evidence in Digital Forensics
Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK
More informationDepartment of Criminal Justice
The University of Texas at San Antonio 1 Department of Criminal Justice The Department of Criminal Justice offers a Bachelor of Arts degree which provides the opportunity for comprehensive study of criminal
More informationNetworking and Information Security
Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving
More informationStudy investments, corporate finance, advanced economic theory, financial markets and much more in the MS in Finance online and on-campus program.
MS in Finance MS in Finance A Smart Investment in Your Future Earn an MS in Finance online or on campus from Southern New Hampshire University and position yourself for greater success in the world of
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
More informationU.S. Bureau of Labor Statistics
U.S. Bureau of Labor Statistics Psychologists Summary Psychologists diagnose and evaluate mental and emotional disorders. 2012 Median Pay Entry-Level Education Quick Facts: Psychologists Work Experience
More information*UNT Chemistry Building. *Dr. Teresa Golden is the Director of our Forensic Science Program at UNT
BACHELOR OF SCIENCE WITH FORENSIC SCIENCE CERTIFICATION *UNT Chemistry Building The University of North Texas Forensic Science Program received its accreditation from the American Academy of Forensic Sciences
More informationhttp://www.bls.gov/oco/ocos151.htm Secretaries and Administrative Assistants
http://www.bls.gov/oco/ocos151.htm Secretaries and Administrative Assistants * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings
More informationDescription of the Forensic Science Major
Majoring in.... Forensic Science Description of the Forensic Science Major What is forensic science? Forensic science is the application of science to support the law. What forensic science majors study?
More informationBreakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements
Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University
More informationUnion County College Faculty Curriculum Committee. New Course Proposal Form
Union County College Faculty Curriculum Committee New Course Proposal Form To all faculty members seeking to introduce a new course proposal to the Curriculum Committee, please make sure to complete the
More informationPiecing Digital Evidence Together. Company Information
Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the
More informationHow To Become A State Pol Forensic Tech Leader
JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,
More informationJason Jordaan: MTech, BTech, CFE, PMCSSA, ACE
Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital
More informationProgram Committee Report-Criminal Justice
Program Committee Report-Criminal Justice Goals, Objectives, and Activities The Criminal Justice Program prepares students for careers in criminal justice or for further graduate or professional studies
More informationJustice Studies - Criminal Justice Bachelor of Science Degree (B.S.)
Berkeley College Overview Academic Programs Justice Studies - Criminal Justice Bachelor of Science Degree (B.S.) Admissions and Finances Administration, Faculty, and Staff Contact Us Course Requirements
More informationITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
More informationCareers In: EngInEErIng
Careers In: EngInEErIng Engineering Transfer Civil and Environmental Engineering Technology Electrical Engineering Technology Computer Science Laser/Photonics/Optics Mechanical Engineering Technology and
More information