Future of Digital Forensics: A Survey of Available Training

Size: px
Start display at page:

Download "Future of Digital Forensics: A Survey of Available Training"

Transcription

1 Future of Digital Forensics: A Survey of Available Training A. Evans, A. Williams, and J. Graham Computer Science Department, Norfolk State University, Norfolk, VA USA Abstract The field of forensics is multidisciplinary by nature, founded on the disciplines of criminology and information technology. However, most course work leading to a foundation in the field are offered within the Chemistry and Biology disciplines in addition to Computer Science. Regardless of the framework in which the courses are offered, the coursework itself must address social, legal, and ethical considerations for practitioners. In an effort to satisfy the different needs associated with forensics, there are different avenues one can pursue when seeking training in the field. Our research has identified 37 computer-related programs including some two-year associate degrees, fouryear baccalaureate programs, graduate certificate programs, and non graduate certificate programs. First, we briefly define digital forensics. Second, we then discuss the different schools and what is unique about their programs. Third, we will discuss the certification programs that are available for those not interested in obtaining a degree. Keywords- forensics investigations; electronic discovery (ediscovery); emulation learning (elive); digital forensics; education 1. Introduction As computer crimes have increased in numbers, so has the need for professionals within the field of digital forensics. The need to understand computer systems, how they operate, as well as how to attempt to keep them secure, remains of high importance. It is also important to understand computer forensics. After a computer system has been compromised and a crime has taken place, there is a need for a computer forensics investigation to follow. Computer forensics often gets mistaken for computer security and therefore anyone studying computer science can benefit from understanding not only the definition of computer forensics, but also its importance. Digital forensics differs from computer security which refers to securing computers against malicious attacks. It is also not the same as using computers to solve crimes. Criminal forensics techniques include matching fingerprints, ballistic testing, and DNA matching. By adding the ability to practice proper computer forensics techniques, it will help to ensure the overall integrity and survivability of the network s infrastructure. In addition, practicing good computer forensics techniques will help your organization, if you consider computer forensics as one of the basic elements in what is known as a defense-in-depth approach to network and computer security. 2. What is digital forensics? Digital forensics is a branch of forensic science that was developed to meet an urgent need in the early 1990s. It consists of the recovery and investigation of material found in digital devices, often in direct relation to a computer crime. The term digital forensics was mainly used to refer to computer forensics but has expanded over the years to cover all devices capable of storing digital media and today is used to describe the entire field. National policies were developed in the early 2000s and now investigations can fall into one of four categories. Forensic analysis is probably the most common category. Within this category evidence is recovered to support or oppose a hypothesis before a criminal court. This could easily be confused with evidence gathering, where material is intended to identify other suspects/crimes. Then there is the electronic discovery (ediscovery). This is a form of discovery related to civil litigation and intrusion investigation. ediscovery is an investigation specifically designed to examine the extent of an unauthorized network intrusion. The technical side of investigations can be broken down into several subbranches; computer forensics, network forensics, database forensics and mobile device forensics. An active investigation can utilize any number of the fields combined. Computer forensic scientist or technicians are considered to be on the cutting edge within the criminal justice field. With the increase of cybercrime, cyber-terrorism, identity theft, and Internet child predators, computer forensic scientists are needed to track what were once thought to be traceless criminals. Computer forensic scientists are called on for many different agencies to be successful. Their expertise is needed for work with law enforcement officials, legal teams, independent companies and the government to conduct investigations, retrieve evidence and sometimes

2 even testify in court. Computer forensic scientists remain in a high demand because of their thorough practical knowledge of computers, networks, hacking, data retrieval, information security, and computer surveillance. They are also perceived to be well trained in ethics as well as criminal justice topics like confidentiality, privacy laws and evidence handling. In most cases a computer forensics investigator will be required to work independently. There are some instances when forensic investigators will be under the direct supervision of a computer forensic scientist; however. forensic investigators should not only expect to work independently, they should also be prepared to work under stressful situations. Digital forensics is not limited to identifying direct evidence of a crime, it can also be used to link evidence to specific suspects, confirm alibis or statements, determine criminal intent, or identify sources in copyright cases. With digital forensics, the investigations are broader in scope than other areas of forensic analysis. The digital forensic process is made up of the seizure, forensic imaging and analysis of digital media. Once all is said and done, there is a report produced documenting the digital evidence for the courts or an employer. 3. Degree Training Programs Offered The research performed for this paper uncovered 38 computer forensics-related programs including two-year associate degrees [7, 11, 14, 15, 18, 21, 22], four-year baccalaureate programs [3, 5, 7, 8, 26, 38], master s degree programs of study [11, 25, 26, 32], graduate certificate programs [10, 23, 24, 32, 33] and non-graduate-level certificate programs [1, 2, 4, 6, 9, 13, 16, 17, 19, 20, 25, 27, 28]. 3.1 Associate Degree Programs In an effort to satisfy the different needs associated with forensics, there are different avenues one can pursue when seeking training in the field. At the City College of Chicago [37], they offer several programs leading to an Associate in Applied Science degree (A.A.S.) for information Technology. They also offer a Basic Certificate in Computer Security and Forensic Investigation (CSFI). Their CSFI program was particularly interesting in that it covered two areas of interest, Information Security and Computer Forensic Law Enforcement. The Information Security area of emphasis focuses on the design, implementation and management of the information security in the corporate environment. This course prepares their students for the Certified Information Systems Security Professional (CISSP) Exam. The CISSP certification is nationally recognized. The area of emphasis that focuses on Forensic/Law Enforcement focuses mainly on the computer forensic investigation and provides law enforcement personnel, criminal justice majors with procedures and methods for investigation of computer crimes and handling electronic evidence. 3.2 Baccalaureate Programs Of the four-year colleges researched, Defiance College was the one that seemed to offer the most in-depth training. Their program offers unique opportunities for students to study and gain hands-on experiences working in labs, and mock crime-scenes. The tools and techniques of digital forensics are also applied in situations where data is constantly in motion, such as while recognizing and responding to intrusions into a company s computer network, or when recovering data from small-scale digital devices such as cell phones and PDAs. Of all the evidence collecting procedures digital evidence collection is probably the most tedious process requiring the most discipline. It is important for the evidence to be precise for it to be admissible in court. Here the students learn how to preserve the integrity of digital evidence; extract live, static, and deleted data from various media; and thoroughly document and present their findings. In addition, students in this program develop a well rounded background which consist of general education, criminal justice, and computer technology fundamentals. At the completion of this program the students will graduate with two professional certificates in hand, a degree in Digital Forensic Science, and the practical experience gained from utilizing the internship program. [38] First, the students learn about the computers by preparing for the CompTIA A+ certification as an IT Technician. This certification is widely respected when seeking entry level information technology employment. Next the students begin learning about operating systems, security principles, and networking. Once the computer background is established the students begin learning the science of forensics and how it is applied the digital aspect of computers that are turned off, computers that are still running, computers communicating with one another, and small-scale digital devices such as cell phones, PDAs, smart phones, and other hybrid systems. In addition, the students learn the value and importance of having high ethics and personal integrity. After learning all of these skills sets the student have the opportunity to fine tune their skills through an internship with one of many different agencies performing forensics work. The different internships offered to students will be afforded to them in their senior year. These are opportunities for the students to perform hands-on training and for them to participate in actual cases that are in the process of being prosecuted. The courses offered at Defiance College in Digital Forensics are as follows: CompTIA A+ exam prep, Introduction to Computer and Digital Forensics, Computer Security Fundamentals,

3 Operating Systems, Computer Forensics and Security Ethics, Law Enforcement Field Experience, Seizure and Forensic Examination of Computer Systems, Advanced Topics in Computer Data Analysis and Recovery, Fundamentals of Computer Networks, Network Forensics, Intrusion Detection, National Certification, and Computer Forensic Field Experience and Seminar. 3.3 Graduate Programs When dealing with law enforcement, computer forensics scientist and investigators are considered to be highly educated and are therefore expected to have a bachelor s degree. Because of the limited programs available, obtaining a Master s degree in a field like computer science or criminal justice can be difficult. Once obtained, the master s degree can prove to be extremely beneficial in acquiring the top level jobs. Students in these programs will learn about cutting edge technologies, systems and concepts needed to succeed in computer forensics. Those with Master s degrees can also expect to receive a higher salary than those who only hold undergraduate degrees, and they may be promoted earlier and more frequently also. Each of the Graduate Degree programs differ slightly in the courses required to complete the degree. All of the programs researched required between semester credits to complete the degree [11.25,26,32]. 3.4 Certificate Programs Computers and various digital devices are essential in the daily operations of organization. This high dependency of technology brings with it serious security challenges. Criminals make their living hacking into these businesses. In order to mitigate these risks there must be a way for IT professionals to obtain a comprehensive overview of digital forensics. Of the certificate programs we researched, Boston University s Graduate Certificate program was most appealing. This specialized graduate certificate program in digital forensics provides the students with comprehensive digital crime scene investigation knowledge. The program introduces students to forensic analysis policy and procedures, forensic analysis tools, data recovery, and investigation, among other topics. The program is unique in that it offers the course work on campus and via an online format called Emulation Live format (elive). This format allows the students to get a blend of both on campus classroom sessions as well as the online courses. elive courses include: Several traditional, face-to-face classroom sessions throughout the semester Online content that allows students to complete coursework and collaborate with classmates and instructors using Internet service Multimedia online technology utilizing virtual lectures, video conferencing, real-time collaborative sessions, correspondence, projects, and assignments Course materials and discussion threads that are accessible online 24 hours a day, 7 days a week 4. Uses for Degree Training The majority of Information Technology (IT) professionals in business and law enforcement agencies already have college degrees. They do not need to concern themselves with the programs leading to a two or four-year degree. In these cases a certificate program would be more advisable than a second college degree to perform computer forensics works. Now that the need for digital forensics experts is on the rise, students are encouraged to pursue a degree program of some sort. More businesses are looking for people with specialized skill sets. Digital forensics is a field that requires attention to detail in all aspects of the job. Digital forensics jobs are often found within lawenforcement, military, government intelligence agencies and private security or consulting companies. To get a more indepth idea of the types and number of jobs available you can search a popular job bank called Dice and it will return around 160 different jobs at the time of publication. If you do the same thing with Monster.com you will return around 210 different jobs. The numbers are not staggering, but they are on the rise. The different job titles varied from Computer Forensics Analyst to Vulnerability Security Research Engineer. Most of these jobs require a degree of at least two years of experience and others require a security clearance. Some of the jobs would accept equivalent knowledge and job experience in place of the required education, or just the opposite, an advanced degree in place of some of the required experience. 4.1 Salary Ranges It has been predicted by the Bureau of Labor Statistics that computer forensic investigators will remain in high demand for the next several years to come. The data provided covers both self employed forensic investigators as well as those employed by a firm. Generally speaking there will be more stability offered by a firm. Self employed investigators would enjoy more flexibility. Their salary could also be either substantially lower or higher than their counter parts working within a firm. When analyzing the data we found that digital forensics is usually combined or closely related to the criminal justice field. Employment of private detectives and investigators is expected to grow 22 percent over the decade, substantially faster than the average for all occupations [39]. As mentioned previously in this paper, the increased demand for private detectives and investigators is a direct result from the heightened security concerns, increased litigation, and the need to protect

4 confidential information and property of all kinds. Criminal activity on the internet includes spamming, identity theft, e- mail harassment, and more recently illegal downloading of copyrighted materials. The average salary reported in 2006 by the Bureau of Labor Statistics was $33,750 for private investigators[39]. Generally those in the field of computer forensics earn higher salaries. Median annual wages of salaried private detectives and investigators were $41,760 in May The middle 50 percent earned between $30,870 and $59,060. The lowest 10 percent earned less than $23,500, and the highest 10 percent earned more than $76,640. Wages of private detectives and investigators vary greatly by employer, specialty, and geographic area. [39] Depending on the casework, these professionals may also encounter irregular schedules and long overtime hours. Related Works There is currently ongoing research targeted at enhancing the way forensic courses are being taught. The Cyber Defense Trainer (CYDEST) [34] was developed by a group of researchers to incorporate the use of a virtualized training platform for computer forensics. Through the use of virtual machines, it provides tactical level exercises for network administrators, first responders, and digital forensics investigators. CYDEST is more than just a tool to create different scenarios, it also makes it possible for student s every action to be properly monitored and recorded for later viewing by their professors. CYDEST ultimately provides a level of realism and automation for the student while reducing the workload of an instructor [34]. In addition, there is other research that argues the best form of realism is the real thing. In their paper, Designing Computer Forensics courses using Case Studies to Enhance Computer Security Curricula [35], they argue that computer forensics courses should be designed and taught utilizing actual court cases that represent actual cyber crimes. They believe that by using actual cases the students will learn more and better understand the existing Cyber Laws. Students can perform their own forensic investigations and compare them with the actual case and learn from their mistakes or reinforce the positive. There is also research being done in the online arena. Wang, of Southern Polytechnic State University, has written a paper, Web-Based Interactive Courseware for Information Security, that talks about teaching such topics as security and forensics, utilizing Web-based multimedia and interactive courseware. The courseware is based on the use of a tool called Multimedia and Interactive Courseware Synthesizer, (MICS) [36]. MICS provides an interactive platform for students to learn. Security courses in general can be hard to master without student instructor interaction. MICS, on the other hand, provides an interactive learning environment that can also incorporate games to be used for instruction. The primary focus of MICS is to be able to develop a collection of hands-on labs that cover security, privacy, reliability and business integrity. 5. Conclusion In conclusion, it is evident that the need for computer forensics specialists is increasing. As this need continues to rise, it is imperative that educational opportunities increase as well. In addition, we must strive to stay on the cutting edge of the industry s demands. Digital forensics is a new and a constantly changing field which requires constant improvement and updating. There has to be more of an effort to consult practitioners in the field in order to continue developing relevant course material. There should also be a greater effort towards encouraging more organizations to offer internships in the field of digital forensics. In addition, we found that computer forensics is a growing multi-disciplinary field with increasing industry demand. Even with the lack of publicly recognized program standards to follow at this time, there are a number of good examples of two and four year programs [21, 22, 38]. At the master s level, [26, 32] serve as good examples. In comparison to other Scientific Fields of study, few programs exist at this time for computer forensics. Most of the programs are located in eastern portion of the United States with about 25% of the programs on the west coast. It is evident that there is plenty room for future growth with respect to the training programs offered in the Digital Forensics field 6. References [1] ms/cybercrimeinvest.htm. [2] [3] [4] [5] cs.htm. [6] [7] [8] [9] n/certificate+programs/computer+crime_investigation s+and+computer+forensics.htm. [10] [11] [12] uateforensiccomputing.asp. [13] [14] [15]

5 [16] [17] rsedescriptions.htm. [18] [19] 2&page=CertForensics. [20] htm. [21] in_secur.htm. [22] [23] nt/degrees/acad_prog_71.cfm. [24] ml. [25] pf/cpf_gen.asp. [26] [27] [28] http//wright.ccc.edu/department/forensics/index.asp [29] J. Heiser, and W. Kruse, What Exactly is Computer Forensics? [30] er_forensics_services.html. [31] S522.pdf. [32] [33] [34] Bruekner, S., Guaspari, D., Adelstein, F., & Weeks, J. (2008). Automated computer forensics training in a virtualized environment. Retrieved March 7, 2011, from Scince Direct: brueckner.pdf [35] Herath, A., Herath, S., Goonatilake, R., Herath, S., & Herath, j. (2007). Designing computer forensics courses using case studies to enhance computer security curricula. Journal of Computing Sciences in Colleges, [36] Wang, A. J. (2005). Web-Based Interactive Courseware for Information Security. SIGITE '05 Proceedings of the 6th conference on Information technology education (pp ). New York: ACM. [37] [38] Science.html [39]

CAREER: FORENSIC SCIENCE TECHNICIAN 1

CAREER: FORENSIC SCIENCE TECHNICIAN 1 CAREER: FORENSIC SCIENCE TECHNICIAN 1 Career: Forensic Science Technician Mary C. Cartwright Middlesex Community College CRJ 111-52 Heloisa DaCunha November 29, 2012 CAREER: FORENSIC SCIENCE TECHNICIAN

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Section I: Request. Section II: Need

Section I: Request. Section II: Need Criminal Justice Minor Department of Sociology, Social Work and Anthropology College of Humanities and Social Sciences Utah State University CIP Code: 43.0107 Section I: Request The Sociology, Social Work

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional

More information

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES

MASTER OF SCIENCE IN BIOMEDICAL FORENSIC SCIENCES Program Overview The M.S. in Biomedical Forensic Sciences trains individuals for a variety of disciplines applied to crime scene investigation and evidence analysis. The only program of its kind based

More information

Diablo Valley College Catalog 2014-2015

Diablo Valley College Catalog 2014-2015 ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, President 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS # 11-5605

More information

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10

More information

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

Engineering Forensics

Engineering Forensics Engineering Forensics Inter-Faculty Bachelor of Forensic Science Forensic science is the study of evidence in criminal investigation for presentation in courts of law. Crime scene artifacts are frequently

More information

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

Forensic Science. Three Certificate Programs in. Certificates in: Death Investigation Forensic Toxicology. Forensic Science

Forensic Science. Three Certificate Programs in. Certificates in: Death Investigation Forensic Toxicology. Forensic Science Three Certificate Programs in Forensic Science Giving you investigative skills to broaden the scope of your job opportunities Certificates in: Death Investigation Forensic Toxicology Forensic Science Sponsored

More information

Information Systems. College of Engineering & Information Sciences. Careers That Fit You

Information Systems. College of Engineering & Information Sciences. Careers That Fit You Information Systems College of Engineering & Information Sciences Careers That Fit You Build your career around your talents Do you have an interest in computers and how their programs work? Do you have

More information

CLASS TITLE: CRIMINAL INVESTIGATOR II. LOCATION: Grand Junction, Colorado. PRIMARY PHYSICAL WORK ADDRESS: Grand Junction, CO

CLASS TITLE: CRIMINAL INVESTIGATOR II. LOCATION: Grand Junction, Colorado. PRIMARY PHYSICAL WORK ADDRESS: Grand Junction, CO CLASS TITLE: CRIMINAL INVESTIGATOR II STATE OF COLORADO invites applications for the position of: CBI Forensic Services Crime Scene Analyst, Grand Junction A residency waiver has been granted for this

More information

How To Train For A Criminal Justice Program

How To Train For A Criminal Justice Program Criminal Justice Program Expansion State Submission Mark Wilson, President January 2014 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of the Program... 2 Objectives and Purpose

More information

Forensic Chemistry Curriculum

Forensic Chemistry Curriculum SECTION 1 GENERAL STANDARDS. [Excerpt] Standard 4.3.1 General Curriculum Requirements The undergraduate program in forensic science shall offer a coherent curriculum that reflects the mission and goals

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES STUDENT HANDBOOK FOR CRIMINOLOGY MAJORS 2015-2016 SEPTEMBER 2015 REVISION DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES UNDERGRADUATE PROGRAM

More information

Justice Studies - Criminal Justice Associate in Applied Science Degree (A.A.S.)

Justice Studies - Criminal Justice Associate in Applied Science Degree (A.A.S.) Berkeley College Overview Academic Programs Admissions and Finances Administration, Faculty, and Staff Contact Us Justice Studies - Criminal Justice Associate in Applied Science Degree (A.A.S.) Course

More information

University of Maryland University College. American Military University. Henley-Putnam University

University of Maryland University College. American Military University. Henley-Putnam University A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

More information

DIABLO VALLEY COLLEGE CATALOG 2015-2016

DIABLO VALLEY COLLEGE CATALOG 2015-2016 ADMINISTRATION OF JUSTICE ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police

More information

Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies

Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies Washburn University School of Applied Studies Department of Criminal Justice and Legal Studies Proposed Program Forensic Investigations Program Criminal Justice Department Date of Implementation: August

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Forensic Investigation

More information

Consulting careers: A profile of three occupations

Consulting careers: A profile of three occupations Consulting careers: A profile of three occupations Choosing an industry in which to work is often as important as choosing an occupation. And over the next several years, the best advice for some workers

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

CONTENT. King Hussein Faculty of Computing Sciences

CONTENT. King Hussein Faculty of Computing Sciences CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.

More information

Program Assessment Report

Program Assessment Report Program Assessment Report I. Degree Name: Criminal Justice II. Academic year: 2011-12 III. Completer of Form: Barry Langford IV. Sources of Evaluative information: Seniors in CJAD 495 take the Major Field

More information

The Cisco Networking Academy at Erie Community College

The Cisco Networking Academy at Erie Community College The Cisco Networking Academy at Erie Community College The Academy History and Goals In existence since 1997, the Cisco Networking Academy delivers a comprehensive, 21st century learning experience to

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

DIVISION OF HEALTH PROFESSIONS VIRGINIA BEACH CAMPUS

DIVISION OF HEALTH PROFESSIONS VIRGINIA BEACH CAMPUS DIVISION OF HEALTH PROFESSIONS VIRGINIA BEACH CAMPUS Dear Applicant: If you enjoy the health care field, but prefer not to work in direct patient care, or you wish to use computer science or business skills

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE ACADEMIC AFFAIRS COMMITTEE PROPOSAL PRESENTATION COVER SHEET (Proposal from College of Arts and Sciences) I. Proposal: Notification

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

DEPARTMENT OF CRIMINAL JUSTICE

DEPARTMENT OF CRIMINAL JUSTICE 122 Department of Criminal Justice DEPARTMENT OF Mr. Mark Mills, Department Chairperson Assistant Professors: M. Mills, J. Phan, K. Treece, A. Trimble The Criminal Justice Program is dedicated to providing

More information

Master of Christian Science in Criminology and Criminal Justice (SCCJ.M)

Master of Christian Science in Criminology and Criminal Justice (SCCJ.M) Master of Christian Science in Criminology and Criminal Justice (SCCJ.M) The online M.S. of Christian Science in Criminology and Criminal Justice degree requires 36 credit hours regardless of whether a

More information

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Crafting an Undergraduate Information Security Emphasis Within Information Technology Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu

More information

Master of Science in Forensics

Master of Science in Forensics Master of Science in Forensics The Master of Science in Forensics provides students with an intensive and holistic criminalistics experience through a combination of didactic and practical educational

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

Welcome to the Personal Fitness Trainer Program online information session. The information session is designed to supply applicants to the Personal

Welcome to the Personal Fitness Trainer Program online information session. The information session is designed to supply applicants to the Personal Welcome to the Personal Fitness Trainer Program online information session. The information session is designed to supply applicants to the Personal Fitness Trainer program with accurate information and

More information

FORENSIC SCIENCE COURSE DESCRIPTION

FORENSIC SCIENCE COURSE DESCRIPTION FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on

More information

FORENSIC SCIENCE INSTITUTE COURSE DESCRIPTIONS 2015-2016

FORENSIC SCIENCE INSTITUTE COURSE DESCRIPTIONS 2015-2016 FORENSIC SCIENCE INSTITUTE COURSE DESCRIPTIONS 2015-2016 FRSC 2503 Introduction to Forensic Science Introduction to Forensic Science is a survey course designed to acquaint the student with a comprehensive

More information

CRIMINAL JUSTICE PROGRAM

CRIMINAL JUSTICE PROGRAM CRIMINAL JUSTICE PROGRAM University Plaza, Building D (435) 652-7815 http://dixie.edu/criminal_justice/index.php To find faculty & staff phone numbers and email addresses, please consult the University

More information

To prepare students to meet their academic goals and personal growth potential;

To prepare students to meet their academic goals and personal growth potential; 3.7 Academic Program Review Criminal Justice/Pre-Law 2009-2014 Based on the thorough internal or external program review addressing all criteria in policy, a comprehensive report should be possible within

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 1811 Occupational Series is Marked by Support

More information

American Academy of Forensic Sciences

American Academy of Forensic Sciences American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors

More information

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context

More information

2. Neither the name of SWGIT, nor the names of its contributors, may be used to endorse or promote products derived from its documents.

2. Neither the name of SWGIT, nor the names of its contributors, may be used to endorse or promote products derived from its documents. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Computer Support Specialists and Systems Administrators

Computer Support Specialists and Systems Administrators http://www.bls.gov/oco/ocos268.htm Computer Support Specialists and Systems Administrators * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections

More information

ROAD TO SUCCESS. College of Applied Science and Technology. Business & Information Technology

ROAD TO SUCCESS. College of Applied Science and Technology. Business & Information Technology College of Applied Science and Technology ROAD TO SUCCESS Since 1964, thousands of people have advanced their careers at Summit County s only community college. In 2014, the college reorganized and expanded

More information

The Cisco Networking Academy at Erie Community College

The Cisco Networking Academy at Erie Community College The Cisco Networking Academy at Erie Community College The Academy History and Goals In existence since 1997, the Cisco Networking Academy delivers a comprehensive, 21st century learning experience to

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

Introduction to Forensic Science and the Law. FBI Building Washington, DC

Introduction to Forensic Science and the Law. FBI Building Washington, DC FBI Building Washington, DC 1 Objectives You will understand: How crime labs in the United States are organized and what services they provide. The growth and development of forensic science through history.

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Criminal Justice Department Review - Spring 2007

Criminal Justice Department Review - Spring 2007 Criminal Justice Department Review - Spring 2007 Section I. Criminal Justice Purpose and Goals 1. Mission: The mission of the Criminal Justice Area of Emphasis is to educate entry level and in-service

More information

actx.edu Law, Public Safety, Corrections & Security

actx.edu Law, Public Safety, Corrections & Security actx.edu Law, Public Safety, Corrections & Security A Passion to Serve Honesty, sound judgment, integrity, and a sense of responsibility are essential characteristics for an individual who desires to pursue

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

AS FORENSIC SCIENCE ACADEMY

AS FORENSIC SCIENCE ACADEMY TE AS FORENSIC SCIENCE ACADEMY TM "BETTER SCIENCE LEADS TO BETTER JUSTICE FOR ALL" I strongly feel the courses offered through the Texas Forensic Science Academy certificate program are a true benefit

More information

In popular culture, the inventor is often

In popular culture, the inventor is often Patent work: The other side of invention Tamara Dillon Tamara Dillon is an economist in the Office of Occupational Statistics and Employment Projections, BLS. She is available at (202) 691 5733 or at dillon.tamara@

More information

Software/Applications Programmer Technical Writer E-Commerce Manager. Computer and Electronics Repair Interactive Media Developer

Software/Applications Programmer Technical Writer E-Commerce Manager. Computer and Electronics Repair Interactive Media Developer Information Technology Career Majors Description: Information Technology (IT) is the study, design, development, implementation, support or management of computer-based information systems, particularly

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position

More information

Course Forensic Science. Unit II History

Course Forensic Science. Unit II History Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History

More information

Evidence Technician s School

Evidence Technician s School Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

CERTIFIED DIGITAL FORENSICS EXAMINER

CERTIFIED DIGITAL FORENSICS EXAMINER CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should

More information

Sufficiency of Windows Event log as Evidence in Digital Forensics

Sufficiency of Windows Event log as Evidence in Digital Forensics Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK

More information

Department of Criminal Justice

Department of Criminal Justice The University of Texas at San Antonio 1 Department of Criminal Justice The Department of Criminal Justice offers a Bachelor of Arts degree which provides the opportunity for comprehensive study of criminal

More information

Networking and Information Security

Networking and Information Security Networking and Information Security College of Engineering & Information Sciences Careers That Fit You Build a career around your interests and talents Do you like figuring out how things work? Solving

More information

Study investments, corporate finance, advanced economic theory, financial markets and much more in the MS in Finance online and on-campus program.

Study investments, corporate finance, advanced economic theory, financial markets and much more in the MS in Finance online and on-campus program. MS in Finance MS in Finance A Smart Investment in Your Future Earn an MS in Finance online or on campus from Southern New Hampshire University and position yourself for greater success in the world of

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

U.S. Bureau of Labor Statistics

U.S. Bureau of Labor Statistics U.S. Bureau of Labor Statistics Psychologists Summary Psychologists diagnose and evaluate mental and emotional disorders. 2012 Median Pay Entry-Level Education Quick Facts: Psychologists Work Experience

More information

*UNT Chemistry Building. *Dr. Teresa Golden is the Director of our Forensic Science Program at UNT

*UNT Chemistry Building. *Dr. Teresa Golden is the Director of our Forensic Science Program at UNT BACHELOR OF SCIENCE WITH FORENSIC SCIENCE CERTIFICATION *UNT Chemistry Building The University of North Texas Forensic Science Program received its accreditation from the American Academy of Forensic Sciences

More information

http://www.bls.gov/oco/ocos151.htm Secretaries and Administrative Assistants

http://www.bls.gov/oco/ocos151.htm Secretaries and Administrative Assistants http://www.bls.gov/oco/ocos151.htm Secretaries and Administrative Assistants * Nature of the Work * Training, Other Qualifications, and Advancement * Employment * Job Outlook * Projections Data * Earnings

More information

Description of the Forensic Science Major

Description of the Forensic Science Major Majoring in.... Forensic Science Description of the Forensic Science Major What is forensic science? Forensic science is the application of science to support the law. What forensic science majors study?

More information

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University

More information

Union County College Faculty Curriculum Committee. New Course Proposal Form

Union County College Faculty Curriculum Committee. New Course Proposal Form Union County College Faculty Curriculum Committee New Course Proposal Form To all faculty members seeking to introduce a new course proposal to the Curriculum Committee, please make sure to complete the

More information

Piecing Digital Evidence Together. Company Information

Piecing Digital Evidence Together. Company Information Piecing Digital Evidence Together Company Information About IntaForensics About Us Established in 2006, IntaForensics has grown to become one of the leading providers of digital forensic services in the

More information

How To Become A State Pol Forensic Tech Leader

How To Become A State Pol Forensic Tech Leader JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION STATE POLICE FORENSIC TECHNICAL LEADER Employees in this job function as statewide technical leaders within the Michigan State Police,

More information

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: JJordaan@siu.org.za Professional Summary A multidisciplinary digital

More information

Program Committee Report-Criminal Justice

Program Committee Report-Criminal Justice Program Committee Report-Criminal Justice Goals, Objectives, and Activities The Criminal Justice Program prepares students for careers in criminal justice or for further graduate or professional studies

More information

Justice Studies - Criminal Justice Bachelor of Science Degree (B.S.)

Justice Studies - Criminal Justice Bachelor of Science Degree (B.S.) Berkeley College Overview Academic Programs Justice Studies - Criminal Justice Bachelor of Science Degree (B.S.) Admissions and Finances Administration, Faculty, and Staff Contact Us Course Requirements

More information

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York INSTRUCTOR INFORMATION Name: Sanjay Goel Email: goel@albany.edu Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:

More information

Careers In: EngInEErIng

Careers In: EngInEErIng Careers In: EngInEErIng Engineering Transfer Civil and Environmental Engineering Technology Electrical Engineering Technology Computer Science Laser/Photonics/Optics Mechanical Engineering Technology and

More information