|Certificate Level I|
Computer Forensics in Criminal Investigations
| || || |
Cybercrime, stolen identities, lost electronic files, computer espionage ... so many things can go wrong in our increasingly heavy dependence on computer and Internet information. Cybersecurity — or lack of it — affects every aspect of our lives, from home to the workplace to the very core of national and homeland security.
Are you a problem-solver with a mind for details? A computer professional interested in improving your job skill level and career security? A concerned citizen who just wants to protect your own computer files? A forward-thinker looking to a job in government cybersecurity? Think Computer Forensics! It’s a fast track to a vital, high-paying and urgently needed career path.
What is computer forensics?
Also called digital forensics, it includes:
- Collecting and preserving legally admissible electronic evidence
- Recovering lost data or critical digital information
- Protecting networks or computer systems from security breaches
What are its applications?
- Fighting cybercrime through local, state and national law enforcement agencies
- Tracking information trails for businesses from medical to financial institutions
- Data recovery by businesses and information technology services
- Protecting information vital to the success of any business
- Proving that computer fraud was committed (producing evidence admissible in a court of law)
- Proving that a cybercrime was not committed (producing evidence that proves someone is not guilty of wrongdoing)
- Understanding computer security to prevent personal identity and information theft
- Helping any business adhere to government standards and regulations
Computer forensics is used by attorneys, private investigators, businesses, government agencies, law enforcement agencies and a wide variety of individuals in need of technical and forensic expertise.
Job titles in the digital forensics field can include:
- Computer forensics analyst
- Counterintelligence studies and policy analyst
- eDiscovery and data restoration specialist
- eDiscovery and forensics project manager
- Forensics analyst
- Forensics consultant
- Forensic science technician
- Information systems security analyst
- Junior software developer
- Manager of network and data security
- Security consultant
- Systems administrator
- Technology risk management professional
Responsibilities for these positions might include:
- Performing comprehensive technical analyses and interpreting computer-related evidence on a variety of network environments, software, media and storage systems.
- Ensuring that collection of evidence and chain of custody processes are achieved consistently with industry best practices.
- Providing advisory services to enhance forensic and e-discovery engagements.
- Acquiring and developing comprehensive knowledge of client operations, processes and business objectives as well as internal operations, and using this information to identify additional opportunities for achieving client objectives.
Course Information: Howard College Catalog