Solved

Forensics certifications

Posted on 2012-03-12
3
367 Views
Last Modified: 2012-06-21
I already have my CISSP and several security analyst certs; now my company is wanting to get into computer forensics.

Is there like a gold standard for forensics certs right now? Googling for it returns a bunch of shoddy sites with certs that look like they made the program just to hop on the money bandwagon along with the SANS class which is hefty in price.

I would love a point in the right direction.

Thanks!
0
Comment
Question by:Schuyler Dorsey
  • 2
3 Comments
 
LVL 47

Accepted Solution

by:
dlethe earned 500 total points
ID: 37712956
I looked into that a few years ago.  State laws vary.  Requirements to obtain a CISSP varies.  I know in Texas, at one time you had to actually get a private investigator license.

So check with the Sec of State office and look for Board / Licensing certifications.  Surfing out-of-state websites is a waste of time. (Hopefully your certs are recognized by whatever state  you live in, they might have been a total waste of time & money)
0
 
LVL 62

Expert Comment

by:btan
ID: 37713850
Forensic need not be only at the standard digging od resticted to eccouncil chfi. The element of ethical pentest is a good add such as crest and dod recognised
 http://www.crest-approved.org/why_crest.html
 http://www.sans.org/8570/#ia

But overall, these technical value add to cissp which is more of a security generalist. Forensic solution such as encase digital adminstrator will definitely be very sought after on term og cyber forensic investigator
0
 
LVL 62

Expert Comment

by:btan
ID: 37713851
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question