Journal ArticleDOI
Learning the Computer Forensic Way
TLDR
This article is part of the series on building a computer forensics program by identifying what tools a computer forensic professional might use and how to maximize their use.Abstract:
The last article was part of the series on building a computer forensics program by identifying what tools a computer forensic professional might use. Of course, having the best tools does not guarantee success or even equate to proficiency. To get to that point, a computer forensics professional needs to have good tools and proper training on how to maximize their use.read more
Citations
More filters
Book
Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
Lynn Futcher,Ronald Dodge +1 more
TL;DR: This paper discusses the role of Information Security Industry Training and Accreditation in Tertiary Education, and how to Design Computer Security Experiments.
Book ChapterDOI
Forensic Computing Training, Certification and Accreditation: An Australian Overview
Matthew Simon,Jill Slay +1 more
TL;DR: This paper reviews current initiatives in Forensic Computing training and certification in Australia and the effect of this on National Accreditation processes.