| ||Format||Pages||Price|| |
|20||$50.00||  ADD TO CART|
|Hardcopy (shipping and handling)||20||$50.00||  ADD TO CART|
Significance and Use
3.1 With the proliferation of computers and other electronic devices, it is difficult to imagine a crime that could not potentially involve digital evidence. Because of the paucity of degree programs in computer forensics, practitioners have historically relied on practical training through law enforcement or vendor-specific programs or both.
3.2 In this guide, curricula for different levels of the educational system are outlined. It is intended to provide guidance to:
3.2.1 Individuals interested in pursuing academic programs and professional opportunities in computer forensics,
3.2.2 Academic institutions interested in developing computer forensics programs, and
3.2.3 Employers seeking information about the educational background of graduates of computer forensics programs and evaluating continuing education opportunities for current employees.
1.1 This guide will improve and advance computer forensics through the development of model curricula consistent with other forensic science programs.
1.2 Section describes the alternative paths by which students may arrive at and move through their professional training. Sections through cover formal educational programs in order of increasing length: a two- year associate degree, a four-year baccalaureate degree, and graduate degrees. Section provides a framework for academic certificate programs offered by educational institutions. Section outlines model criteria and implementation approaches for training and continuing education opportunities provided by professional organizations, vendors, and academic institutions.
1.3 Some professional organizations recognize computer forensics, forensic audio, video, and image analysis as subdisciplines of computer forensics. However, the curricula and specific educational training requirements of subdisciplines other than computer forensics are beyond the scope of this guide.
1.4 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.
ICS Number Code 03.100.30 (Management of human resources); 35.020 (Information technology in general)
|Link to Active (This link will always route to the current Active version of the standard.)|
ASTM E2678-09(2014), Standard Guide for Education and Training in Computer Forensics, ASTM International, West Conshohocken, PA, 2014, www.astm.orgBack to Top