scispace - formally typeset
Journal ArticleDOI

Learning the Computer Forensic Way

Kelly J. Kuchta
- 01 Nov 2001 - 
- Vol. 10, Iss: 5, pp 1-7
TLDR
This article is part of the series on building a computer forensics program by identifying what tools a computer forensic professional might use and how to maximize their use.
Abstract
The last article was part of the series on building a computer forensics program by identifying what tools a computer forensic professional might use. Of course, having the best tools does not guarantee success or even equate to proficiency. To get to that point, a computer forensics professional needs to have good tools and proper training on how to maximize their use.

read more

Citations
More filters
Book

Fifth World Conference on Information Security Education : proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA

Lynn Futcher, +1 more
TL;DR: This paper discusses the role of Information Security Industry Training and Accreditation in Tertiary Education, and how to Design Computer Security Experiments.
Book ChapterDOI

Forensic Computing Training, Certification and Accreditation: An Australian Overview

TL;DR: This paper reviews current initiatives in Forensic Computing training and certification in Australia and the effect of this on National Accreditation processes.