Chapter 18. Ten Ways to Get Qualified and Prepped for Success

In This Chapter

  • Getting certified in person or online

  • Staying current in computer forensics

After you're certified, you should keep your hard-earned certifications in force. Renewing them requires keeping current by reading articles, participating in events, and attending seminars. You might even be interested in a university certificate or degree programs.

In this chapter, we "pull a double" and borrow from the world of sports by offering a front ten and then a back ten.

The Front Ten: Certifications

You can obtain various types of certifications. Some are from vendors that offer product-specific training in using their software tools, and other certifications verify a broad foundation in computer networks or forensics methods.

Here are ten certifications for you to consider, presented in alphabetical order. Other certifications may also be available now and in the future.

ACE: AccessData

www.accessdata.com/Training/TrainAceOver.aspx

Training and certificates are provided by AccessData, at http://accessdata.com, the vendor offering Forensic Toolkit (FTK). AccessData Certified Examiner (ACE) certification requires that you demonstrate skill, knowledge, and ability in using AccessData imaging and analysis technology, FTK, Password Recovery Toolkit (PRTK), and Registry Viewer.

CCE: Certified Computer Examiner

www.certified-computer-examiner.com/index.html

This vendor-neutral certification is open to anyone. A possible advantage to you is that you can take the exam over the Internet. The certificate is sponsored by the International Society of Forensic Computer Examiners www.isfce.com (ISFCE).

CFCE: Certified Forensic Computer Examiner

www.cops.org/cfce

The Certified Forensic Computer Examiner (CFCE) course is provided by International Association of Computer Investigative Specialists (IACIS), the international, volunteer, nonprofit corporation of law enforcement dedicated to education in the field of forensic computer science. To earn the CFCE certification, you must successfully complete the two-week training course and solve correspondence proficiency problems. This certification is only for law enforcement professionals.

CEECS: Certified Electronic Evidence Collection Specialist

www.cops.org/ceecs

CEECS training courses teach best practices in seizing computers and digital media. It's only for law enforcement professionals.

Cisco: Various certifications

www.cisco.com/web/learning/le3/learning_certification_overview.html

Cisco offers a variety of excellent network and information security training programs and certificates. Training for the Cisco Certified Design Associate (CCDA) certification provides basic knowledge of network design. Training for the more advanced Cisco Certified Network Associate (CCNA) certification teaches how to install, configure, operate, and troubleshoot medium-size routed and switched networks. The certifications verify that the person possesses the respective abilities and expertise.

CISSP: Certified Information Systems Security Professional

https://www.isc2.org/cgi-bin/content.cgi?category=539

To become a certified information systems security professional (CISSP), you must successfully complete two separate processes: examination and certification. The eligibility requirements to sit for the CISSP examination are completely separate from the eligibility requirements necessary to be certified. Experience is needed in order to obtain the certificate. Check out CISSP For Dummies, by Lawrence H. Miller and Peter H. Gregory (Wiley Publishing).

CompTia: Various certifications

www.comptia.org
http://certification.comptia.org

CompTIA certifications are well known and respected as one of the best ways to break into the information technology field and build a solid career. Certifications valuable to a computer forensics career are CompTIA Network+, CompTIA Security, and CompTIA A+.

EnCE: Guidance Software

www.guidancesoftware.com/training/EnCE_certification.aspx

The EnCase Certified Examiner (EnCE) certificate is available to public- and private-sector professionals in the use of Guidance Software's EnCase computer forensic software.

Paraben training

www.paraben-training.com

Paraben offers a wide range of forensics training, for cellphone, PDA, network, and mobile forensics. Although you don't become certified, the certificates of completion are worthwhile to own.

SANS and GCFA: GIAC Certified Forensics Analyst

www.giac.org/certifications/security/gcfa.php
www.sans.org/sans2008

Getting the GIAC Certified Forensic Analysts (GCFAs) certification means that you have the knowledge, skills, and abilities to handle advanced incident-handling scenarios, conduct formal incident investigations, and carry out forensic investigation of networks and hosts.

The Back Ten: Journals and Education

We added a "back ten" to this chapter because we want to keep you up-to-date. Research journals and degree programs dedicated to computer forensics continue to emerge. To keep up with advances and events, be sure to bookmark at least a few of these — and check this book's Web site for more links to cutting-edge computer forensics and e-evidence issues:

Journals and research

  • International Journal of Digital Evidence: Supported by the Economic Crime Institute (ECI) at Utica College and the Computer Forensics Research and Development Center (CFRDC). Find it at www.ijde.org.

  • Journal of Digital Forensics, Security and Law: A publication of the Association of Digital Forensics, Security and Law (ADFSL). Check it out at www.jdfsl.org.

  • National Institute of Justice Journal: Find it at www.ojp.usdoj.gov/nij/journals/254/digital_evidence.html.

  • Small Scale Digital Device Forensics Journal: Check out this site at www.ssddfj.org.

  • SANS' Information Security Reading Room: Find this site at www.sans.org/reading_room/index.php.

  • Education and research centers

    Champlain College computer and digital forensics (CDF) degree program: www.champlain.edu/majors/digitalforensics

  • Purdue University Cyber Forensics Lab master's area of specialization: cyberforensics.purdue.edu

  • Rochester Institute of Technology (RIT) degree in information security and forensics (ISF): nssa.rit.edu/~nssa/nssa/undergrad/isfBS.maml

  • University of Central Florida (UCF) degrees and certificate: www.ncfs.org/home.html

  • Utica College, cybercrime investigations and forensics specialization: www.onlineuticacollege.com/online-cyber-security-degree.asp

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset