Forensics: Computer Forensics Qualifications

Below is a list of qualifications that can obtained in computer forensics.

EnCE –  EnCase Certified Examiner: This qualification, is provided by Guidance Software, and is based on the use of EnCase. There is a a two part exam, a theory and practical exam. It is currently the most wildly accepted (other than CCFE) and demanded qualifications, particular with the US, or UK firms who work a lot with the US.This is, in part, due to the huge marketing drive Guidance have engaged in. The book for those who want to revise for their EnCE exam  is EnCase computer Forensics: The Office Guide

ACE –  AccessData Certified Examiner: This computer forensic qualification is by AccessData, the makers of FTK, offering, designed to compete with EnCE. It has not made the same in roads as ACE, no doubt due to the problems with FTK 2.0, but has made a brilliant marketing decision of partnering with a university.

CCE – Certified Computer Examiner: This international computer forensics qualification is software independent, its not as popular as EnCE or CFCE, but is gaining ground and is well respected.

CCFE Certified Computer Forensics Examiner: This exam is much like the EnCE exam, in  two parts – a theory and practical, but is sofware independant. Its US based, and provided by the IACRB. Perhaps due to its US base its not made as much impact in the UK as other qualifications.

CFCE Certified Forensic Computer Examiner This high quality examination can only be taken by law enforcement staff and is respected internationally. Its market influence is limited only by the amount of people eligible to take it. Once a person is qualified, they are able to join  IACIS – International Association of Computer Investigation Specialist

CFIE Certified Forensic Investigator ExaminerThis qualification is simply a qualification for completing a course at 7Safe. 7Safe is an excellent company,  with quality training, but it is not a national/internationally accepted qualification.

CEH – Certified Ethical Hacker: This qualification is, like the CFIA, company specific, and despite its attempts has not managed to become a “standard” like EnCE. The official study book for the CEH exam is the Official Certified Ethical Hacker Review Guide

CHFI – Computer Hacking Forensic Invesitgator: This is produced by the same organisation, ECCouncil, as the CEH above. Like the CEH the CHFI does not appear to have taken off in popularity.  The revision book for this course is The Official CHFI Study Guide

BSC and MSc – Degrees There are many universities in the UK that offer degrees in computer forensics . Sadly, to become a university now a days it appears that all that is required is room and a rubber stamp. Not all universities are created equal, and a degree in some is unlikely to teach those going into the industry how do their job. But, its better than no degree at all.

SANS GCFA – GIAC Certified Forensic Analyst: This qualification is provided by the well respected SANS organization, and like the CCE, CCFE and CFCE is software independant.

CFE – Certified Fraud Examiner: Not a computer forensics qualification, but an qualification often held by computer forensics experts. Highly respected and worth getting.


10 Responses to “Forensics: Computer Forensics Qualifications”

  1. robtlee Says:

    You missed one: the SANS GCFA. Currently the largest vendor neutral forensics certification with 1500 members.

    The purpose of the GCFA exam is to ensure that all candidates who successfully pass the exam have the knowledge, skills, and abilities required to collect and scientifically analyze evidence from digital systems for any known or unknown complex artifacts in order to produce a formal report, critical analysis, or presentation that could be used internally or in civil/criminal litigation.

    Individuals who successfully pass the GCFA exam will generally have intermediate to advanced forensic skills or duties. These duties would encompass all of the knowledge, skills, and abilities of a traditional forensic examiner and would build upon them in areas such as volatile evidence collection and analysis, in-depth file system understanding and comprehension, and a capability to investigate difficult intrusion cases. This certification would be considered appropriate for individuals with 2 years of experience.

  2. How do you get a job in computer forensics? « Data - Where is it? Says:

    […] only 1,000 people in the world holding the highly respected CCE qualification, this gives an idea of how over subscribed the university courses are.  There are certainly not […]

  3. Forensics: Working in Computer Forensics « Data – Where is it? Says:

    […] What professional qualifications in computer forensics are available? […]

  4. Forensics: What do you get paid in computer forensics? « Data – Where is it? Says:

    […] will not be highly paid, that is just a economic fact. If you develop a better skill and better qualifications set e.g. 5 years of investigatory experience then the salary will rise to around s #40,000 or […]

  5. papacharliefox3 Says:

    CEH? I think you mean CHFI, right?

  6. Electronic Discovery: E-Disclosure Qualification « Where is Your Data? Says:

    […] value of the EnCEP certification will have to be seen, but there are already obvious pros and cons for […]

  7. rakesh Says:

    I am AccessData Certified Examiner pls tell me, where find job in govt. sector in haryana in india.

  8. computer forensics qualifications Says:

    […] Forensics: Computer Forensics Qualifications « Where is Your … Below is a list of qualifications that can obtained in computer forensics, from software specific to international exams. […]

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: