"Computer Forensics Degrees" on Amazon.com

FREE SEARCH

Wednesday, August 15, 2018

List of Free Online Computer Forensics Courses and Classes

Learn about computer forensics with these free online courses. See the full list of free computer forensics courses and find the course or class that's right for you.

Online Course Requirements and Information

Students considering entering the field of computer forensics or enhancing their career training may take advantage of these free online computer forensic courses and tutorials available through OpenCourseWare (OCW) programs. Learners may access or download lessons, reading lists, assignments, videos and related materials; however, there is no instructor access or feedback. There's also no opportunity to interact with other students. In most cases, students need to obtain their own course reading materials. OCW programs do not confer course credits or grades.

Free Online Computer Forensics Course List

Basic Steps in Forensic Analysis of Unix Systems at the University of Washington:
http://staff.washington.edu/dittrich/misc/forensics/

This Web tutorial instructs learners on forensic analysis of machines running the Unix operating system. It covers steps used for analysis and includes graphics, illustrations and references. The tutorial also provides sample Unix scripts and protocols. In addition, the materials demonstrate how to run analysis using standard Unix tools, specifically The Coroner's Toolkit (TCT), which includes the specialized programs grave-robber, unrm, lazarus and mactime. No other course materials are available, although students are expected to have access to a Unix workstation.

Cryptography and Cryptanalysis at Massachusetts Institute of Technology (MIT):
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Students who are comfortable with elementary number theory, algorithms and discrete probability can use these graduate course materials on introductory cryptography and cryptanalysis. Problem sets, study materials and a template for completing problem assignments can also be downloaded; however, course readings may need to be purchased.

Emerging Security Vulnerabilities & the Impact to Business through YouTube:
http://www.youtube.com/watch?v=QTfFCr4G0qA&feature=relmfu

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL injection and XSRF (Cross-Site-Request Forgery), as well as emerging trends in software security. Also included are various types of security education available today.

Introduction to Computer Forensics and Investigations at The Open University:
http://openlearn.open.ac.uk/mod/oucontent/view.php?id=401626

This introductory course covers the general principles of computer forensics and how they're used in public and private spheres. Lessons include how to locate passwords and use the Windows File Analyzer to examine files, shortcuts, the Internet cache and the recycle bin on a machine running a Windows operating system. Accompanying activity assignments with transcripts, videos and screen snapshots provide examples. Brief course discussion text is also available, along with suggestions for further learning.

Intrusion Detection System at Korea University:
http://ocw.korea.edu/ocw/college-of-engineering/ce68c785d0d0c9c0c2dcc2a4d15c/lecture-notes

For students with experience in data mining and statistics, this class covers traditional types of intrusion and detection methods. Lecture materials are available for download and explore geospatial and physical intrusion detection, the lifecycle of vulnerability, visual data communications and Web application firewalls. Students can also access an assigned project; however, there isn't any opportunity for collaboration with or feedback from fellow learners or instructors. Reading assignments are also available, although students need to obtain the texts independently.

Living with the Internet: Keeping it Safe at The Open University:
http://labspace.open.ac.uk/course/view.php?id=6239

This free online course teaches computer users how to identify and prevent computer crashes and cyber threats. Students learn the difference between viruses, trojans and worms. Other topics explored include email attachments, antivirus software, firewalls, hijackers and malware.

Network and Computer Security at MIT:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-fall-2003/

This undergraduate/graduate course teaches students the importance of a secure computer and network system, software protection and electronic commerce. Students learn through assignments and exams with solutions. The site also offers recommended reading. Topics covered include cryptography, authentication, firewalls, risk assessment, electronic mail, viruses and intrusion detection.

Network Security at The Open University:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-fall-2003/

This graduate-level course provides users with the information necessary to ensure a computer network is free from cyber attacks and security threats. Students investigate the meanings of vulnerability, threats and attacks. The course focuses on identifying computer/Internet threats and implementing appropriate security and firewalls. Authentication certification is also covered.

Selected Topics in Cryptography at MIT:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-897-selected-topics-in-cryptography-spring-2004/

This free online course focuses on specific areas of cryptography and the role it plays in our daily lives. Students learn to identify various cryptographic procedures available and choose appropriate methods based on the type of network system. The course offers a section on electronic voting systems and ways of making them secure. Students have access to various lecture notes.

Monday, January 7, 2013

A Computer Forensics Degree Leads to Great Job Opportunities

One of the best careers in the coming years is going to be in computer forensics. As computer crime rises, the need for these specialists is going to rise right along with it. Take the schooling your need and get ready for one of the most interesting and promising careers of the future.

If you want to be successful in this field, you need to take the appropriate steps to ensure that you have the best education possible, as well as some practical experience. The first thing that you have to do is find a school that offers a degree in computer forensics. Taking classes in criminal justice and computer science can be quite helpful as well.

While you are taking classes, it is also possible to find internships in the field. This practical experience can go a long way in helping you find a great job once you've obtained your degree in computer forensics. You will find that a number of different companies involved in computer forensics will have opportunities for interns and volunteers to help. Even law enforcement agencies make use of interns regularly. You will be able to learn things in the real world setting that you would not be able to glean from a classroom and books alone. Coupled with your computer forensics degree, this will give you quite an advantage when you are applying for jobs later.

In addition to getting your computer forensics degree, take advantage of the different certification programs out there. Find certifications that are in the field, such as becoming a Certified Computer Examiner, and get your certificates. Take extra classes and learn as much as you can about computers, programming, and network security. The more knowledge you have going into a job interview the better your chances are going to be.

Something else that you should do while you are taking your classes is to research on your own. Use the web, books, and other people in the field to help you learn as much as possible about the ever-changing world of computer crime. Keeping abreast of all of the developments will put you ahead of your peers, and that means you will have a better chance of landing a premier job once you have your computer forensics degree.

This is a great field, but the competition promises to be fierce. Find a school today and start earning your computer forensics degree.

http://www.articlesbase.com/college-and-university-articles/a-computer-forensics-degree-leads-to-great-job-opportunities-5393792.html

Thursday, September 13, 2012

Computer Forensics For Dummies

Book Description

October 13, 2008 0470371919 978-0470371916 1
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to:
  • Prepare for and conduct computer forensics investigations
  • Find and filter data
  • Protect personal privacy
  • Transfer evidence without contaminating it
  • Anticipate legal loopholes and opponents’ methods
  • Handle passwords and encrypted data
  • Work with the courts and win the case
Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Editorial Reviews

From the Back Cover

When the crime scene is a computer or handheld device, you can uncover a digital evidence trail!Pressing Delete doesn't hide anything! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You don't need a computer science degree to master e-discovery! Find and filter data in mobile devices, e-mail, and other Web-based technologies.
  • Protect personal privacy — understand how a digital evidence trail is stored, hidden, and recorded
  • Dig out evidence — learn how to extract and transfer evidence without contaminating it
  • Analyze findings — distinguish between the science of forensics and the art of investigation, which requires your intuition and creativity
  • Prepare to crack the case — anticipate legal loopholes and opponents' methods
  • Succeed in court — prepare yourself to sit on the stand and expertly exhibit evidence
Visit the companion Web site at www.dummies.com/go/computerforensics for links to free trial downloads of the latest computer forensics software, resources, and more
Open the book and find:
  • Basics of computer forensics and e-discovery
  • How to find and filter data
  • E-mail, Web-based, and mobile forensics information
  • How to handle passwords and encrypted data
  • Tips for voicemail, legacy mainframes, and databases
  • Dangers of avoiding best practices
  • A guide to software, tools, and equipment
  • How to work with the courts to win your case

About the Author

Linda Volonino (PhD, MBA, CISSP, ACFE) is a computer forensic investigator and expert witness with Robson Forensic, Inc. and a member of InfraGard.Reynaldo Anzaldua (MBA, CISSP, EnCE, CHFI, IBM I-Series) teaches computer forensics and information security at South Texas College and works with private organizations and government agencies.

Product Details

  • Paperback: 384 pages
  • Publisher: For Dummies; 1 edition (October 13, 2008)
  • Language: English
  • ISBN-10: 0470371919
  • ISBN-13: 978-0470371916
  • Product Dimensions: 7.3 x 0.8 x 9.2 inches
  • Shipping Weight: 1.2 pounds

Thursday, May 17, 2012

How to obtain Computer Forensics Degree

With the advancement of computer and man's dependency on it in the performance of various tasks and managing of data, the computer became a tool in proliferating crimes too. In order to counteract the rise of crimes and to prosecute the crooks who use computer as a tool in the commission of crimes, a new line of job has been created that aims to combat these crimes.  The focus of which mainly involves solving crimes and providing data as proof and as an admissible evidence to any court of law. 

A computer forensics degree is necessary in order for you to start a career involving the task of solving crimes and protecting a company from any criminal acts using the computer as a tool.  A degree program is needed for you to be able to learn different skills and knowledge in collecting of data and of analyzing a program that will help solve and/or serves as evidence in solving crimes and in preventing crimes.

There are various schools that offers computer forensics degree program with different specializations.  If you are a high school student and you want to have a career in this field, take subjects and courses related to math and computers to equip you of your future plans. An associate degree is needed for you to be able to work in the field and as a preparation if you plan of pursuing a bachelor's degree in computer forensics. 

There are schools that offer various computer forensics program with different area of specializations. Consider the area of specialization that you want and the field that you want to get into before deciding as to where to get your degree.  The courses in these programs typically include data encrypting, digital crimes and computer ethics. You can start your career in the private sector or in the public sector. The private sector usually involves protecting databases from hackers and intruders while the public sector job includes decrypting data found in crimes scenes, detecting frauds and other crimes commission using the computer.

If you have plan of shifting careers and you have a considerable interest to learn about computer forensics and you want to shift careers, you can go back to school and get an associate computer forensics degree to jumpstart your career.  Look for a school that provides the necessary training for your plans. Online forensics degree programs are also available if you do not have a considerable time to go to a regular school.  Take also special courses and training programs to aid you in your new career.  Getting a bachelor's degree in computer forensics and three years experience in the field will enable you to take an eligibility exam in Certified Information System Security Professional exam.  This exam will enable you to have a wider option as to where to get a job and will give you an advantage in looking for a high paying job.

Further degrees and graduate programs are also available to give you an edge for career advancement.
Retrieved from "http://www.articlesbase.com/computers-articles/how-to-obtain-computer-forensics-degree-5223133.html"

Monday, September 12, 2011

Getting A Computer Forensics Degree

It's no secret that a degree related to the computer or technology field is the equivalent of a golden ticket and leading that field in job availability is a computer forensics degree.
Crimes online have grown at an astounding rate and continue to do so all across the globe. It is the job of the computer forensics specialist to uncover those crimes and to safe guard the public against future ones. As more and more of our personal information makes its way online businesses both large and small are employing these specialists to ensure their information and that of their clients is safe from the myriad of computer crimes and scams that are now almost common place in our technology driven society.
A degree in computer forensics will provide you with a wide skill set including; analyzing computer data and security, network technologies, understanding the constant stream of user traffic, criminal justice, engineering and computer science. These are all essential skills for a career in the ever expanding field of computer forensics. Other skills include but are not limited to cytology, file formats, protocols and online security.
It is a fast paced and diverse career path that is continually evolving in order to stay one step ahead of those looking to illegally profit online. If your future degree options are to be decided by future job availability then a degree in computer forensics, whether you choose to learn online or on site, may be exactly what you are looking for.

Read more: http://www.articlesbase.com/college-and-university-articles/getting-a-computer-forensics-degree-2068849.html#ixzz1Xisp3s9d
Under Creative Commons License: Attribution No Derivatives