Bachelors in CIS with a focus on Cyber Security
MasterBullfrog
Member Posts: 28 ■□□□□□□□□□
Hello everyone,
I'm a senior at the moment and am involved with multiple cyber defense/cyber security extracurricular events and programs that my university takes part in. My specific focus in this degree has been Security, Forensics and Auditing.
I intend to work in the Computer Forensics field doing data forensics, my worry though is that my resume leans far towards the security side. I have taken a Computer Forensics certification course that is offered here too which delves into Blackbag, AccessData FTK and EnCase.
How good of a selling point would my security activities be to forensics employers?
Thanks.
I'm a senior at the moment and am involved with multiple cyber defense/cyber security extracurricular events and programs that my university takes part in. My specific focus in this degree has been Security, Forensics and Auditing.
I intend to work in the Computer Forensics field doing data forensics, my worry though is that my resume leans far towards the security side. I have taken a Computer Forensics certification course that is offered here too which delves into Blackbag, AccessData FTK and EnCase.
How good of a selling point would my security activities be to forensics employers?
Thanks.
Comments
-
the_Grinch Member Posts: 4,165 ■■■■■■■■■■I will start by saying that I do not work in the forensics industry. I find most programs offer a variety of security courses and that there is a good reason for it. More then likely, if you find a security position out of school, you will be a jack of all trades. Having different types of security courses will provide a solid base for you to work from and then move into a specialized position (such as forensics). Aside from law enforcement and law firms, most companies don't appear to have dedicated forensics people. They either outsource it when needed or make it a colletral duty for members of their dedicated security team. I will say that auditing and forensics should go hand in hand, when you think about chain of custody and all the logging required for it. Good luck and I think it would be a good selling point.WIP:
PHP
Kotlin
Intro to Discrete Math
Programming Languages
Work stuff -
MasterBullfrog Member Posts: 28 ■□□□□□□□□□Thanks for the reply, at the moment I think it would be best trying to do exactly what you said and play off of audit experience/capabilities, along with network intrusion and prevention of data corruption. Going to be tough finding someone looking for 0 years of field experience.
-
veritas_libertas Member Posts: 5,746 ■■■■■■■■■■Be sure to check out Digital Forensics - Digital Forensics, Computer Forensic Training, eDiscovery. There is also a thread here on TE that involves computer forensics: http://www.techexams.net/forums/security-certifications/61252-computer-forensics-certifications.html