Digital forensics

How to become a computer forensics investigator

August 20, 2018 by Jeff Peters

On this episode of the CyberSpeak with InfoSec Institute podcast, Paraben CEO Amber Schroader discusses her path to becoming a computer forensics investigator and provides advice to those who may be considering computer forensics as a career.

In the podcast, Schroader and Chris Sienko, host of CyberSpeak with InfoSec Institute, discuss:

  • The beginnings of her interest in security (1:25)
  • How the career path changed since she started (2:40)
  • The day-to-day activities of a computer forensics expert (3:30)
  • Big challenges computer forensics investigators have to work through (6:50)
  • The most interesting parts of the job (7:50)
  • The certification paths and training options to learn and gain experience (9:30)
  • Is it better to remain broad or to specialize? (12:10)
  • Is it mostly contract work or in-house work? (13:40)
  • The difference between corporate and law enforcement forensics (14:50)
  • Do forensics professionals move freely between public and private sectors? (16:15)
  • Common mistakes individuals make (17:05)
  • What is one thing a person can do now to bring them closer to career in computer forensics? (19:45)
  • What is the career field like and how can you set yourself apart? (22:25)
  • The future of computer forensics (24:00)
  • Final tips or words or encouragement (25:25)

The InfoSec Institute IT security career series aims to break down the path from security newcomer to an elite security practitioner. Learn more about a career in computer forensics:

About CyberSpeak with InfoSec Institute

Get security awareness and IT training insight direct from the trenches in this weekly podcast hosted by InfoSec Institute’s Chris Sienko. Each week on CyberSpeak with InfoSec Institute, IT and security practitioners share their insights into a new topic, including security awareness, IT and security careers and keeping organizations safe from cybercrime.

Posted: August 20, 2018
Articles Author
Jeff Peters
View Profile

Notice: Undefined index: visitor_id12882 in /www/resourcesinfosecinstitute_601/public/wp-content/plugins/infosec-user-info/infosec-user-info.php on line 117