Skip to main content

Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review

  • Conference paper
Book cover Software Engineering and Computer Systems (ICSECS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 179))

Included in the following conference series:

Abstract

Cyber Forensics Investigations training or education is relatively new. The nature of Cyber Forensics is multidisciplinary, which enforces proliferations to diverse training programmes, from a handful of day’s workshop to Masters Degree in Cyber Forensics. Thus, researchers found that the world lacks experts of Cyber Forensics due to some factors. Consequently, this paper focuses to analyze the trainees’ Competency Based-Assessment implementation. The study finds that Cyber Forensics training or education has inappropriate trainees’ Competency Based-Assessment below 50%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Figg, W., Zhou, Z.: computer Forensics Minor Curriculum Proposal, Department of Computer Information Systems. Dakota State University, Madison, SD 57042, portal.acm.org/ft_gateway.cfm?id=1229642&type=pdf (last visit July 10, 2007)

  2. Fernandez, J., Smith, S., Garcia, M., Kar, D.: Computer forensics: a critical need in computer science programs. Journal of Computing Sciences in Colleges, 20(4) (2005), Consortium for Computing Sciences in Colleges

    Google Scholar 

  3. Taylor, C., Endicott-Popovsky, B., Phillips, A.: Forensics Education: Assessment and Measures of Excellence. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2007 (2007)

    Google Scholar 

  4. Venter, J.: Process Flows for Cyber Forensics Training and Operation. Pretoria, South Africa (2006), http://researchspace.csir.co.za/dspace/bitstream/10204/1073/1/Venter_2006.pdf (last visit July 15, 2010)

  5. Pidanick, R.: An Investigation of Computer Forensics. Information System Control Journal vol. 3 (2004), http://www.isaca.org/Journal/Past-Issues/2004/Volume3/Documents/jpdf043-InvestigationofComputerForensics.pdf (last visit August 10 2010)

  6. Hamzah, Z.: E-Security Law & Strategy. Malayan Law Journal Sdn Bhd, 47301 Kelana Jaya Malaysia, KL, ISBN 967-962-632-6

    Google Scholar 

  7. Figg, W., Zhou, Z.: Computer Forensics Minor Curriculum Proposal: Department of Computer Information Systems. Dakota State University, Madison, SD 57042, portal.acm.org/ft_gateway.cfm?id=1229642&type=pdf (2007) (last visit August 20, 2010)

  8. Hopkins, D.: Innovative Corporation Solutions, Inc. (2006), http://www.michigantechnologyleaders.com/../InnovativeNewsImportanceofComputerForensics.pdf (last visit August 20, 2010)

  9. Schroeder, S.C.: How to be a Digital Forensic Expert Witness. In: First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 69–85 (2005)

    Google Scholar 

  10. Bem, D., Huebner, E.: Computer Forensics Workshop for Undergraduate Students (2008), crpit.com/confpapers/CRPITV78Bem.pdf , (last visit September 10 2010)

  11. Zhijun, L., Ning, W.: Developing a Computer Forensics Program in Police Higher Education. In: ICCSE 2009. 4th International Conference on Computer Science & Education 2009, pp. 1431–1436 (2009)

    Google Scholar 

  12. Lim, S.: Demand up, supply short for forensic professionals Anonymous, p. 5. New Straits Times, Kuala Lumpur (2009)

    Google Scholar 

  13. Nance, K., Armstrong, H., Armstrong, C.: Defining an Education Agenda. In: 43rd Hawaii International Conference on System Sciences, HICSS 2010, pp. 1–10 (2010)

    Google Scholar 

  14. Barbara, J.J.: Certification and Accreditation Overview (2008), http://www.springerlink.com/index/t5852u690qhv5512.pdf , (last visit October 10, 2010)

  15. Sabeil, E., Manaf, A.A., Ismail, Z.: Analysing the Quality Assurance of Trainees Competency Assessment and Accreditation of Cyber Forensic Education/Training Programs. In: ICMLC (2011), the 3rd International Conference on Machine Learning and Computing, Singapore (February 2011)

    Google Scholar 

  16. ILO (CINTERFOR).: What is labour competencies assessment , http://www.ilo.org/public/english/region/ampro/cinterfor/temas/complab/xxxx/31.htm (last visit, January 1, 2011)

  17. Graeme, D.: A Guide to Writing Competency Based Training Materials (2003), http://www.volunteeringaustralia.org/../Revised%20Writers%20Guide%202.pdf (last visit January 3, 2011),

  18. EURIM.: Supplying the Skills for Justice (2004), http://www.eurim.org/consult/e-crime/may_04/ECS_DP3_Skills_040505_web.htm , (last visit, June 10, 2010)

  19. Greatorex, J.: How can NVQ assessors’ judgements be standardised (2003), http://www.cambridgeassessment.org.uk/ca/digitalAssets/113886_How_can_NVQ_Assessors__Judgements_be_Standardised.pdf , (last visit January 3, 2011)

  20. NVQs - national vocational qualifications, http://www.businessballs.com/nvqs_national_vocational_qualifications.htm , ( last visit January 3, 2011),

  21. John, W.: Competency based education and training. British Library Cataloguing in Publication Data Competency based education and training. 1. Competency-based education I. Burke, John 371.3 (2005)

    Google Scholar 

  22. West Virginia University.: The Technical Working Group on Education and Training in Digital Forensics (2007), http://www.ncjrs.gov/pdffiles1/nij/grants/219380.pdf , (last visit, (June 15, 2010)

  23. Liu, Z., Wang: Developing a computer forensics program in police higher education. In: 4th International Conference on Computer Science & Education. ICCSE 2009, pp. 1431–1436 (2009)

    Google Scholar 

  24. Yasinsac, A., et al.: Computer forensics education. Security & Privacy. 1(4), 15–23 (2003)

    Article  Google Scholar 

  25. Larry, G., et al.: Computer forensics programs in higher education: a preliminary study. In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education. ACM, New York (2005)

    Google Scholar 

  26. Stephens, P., Induruwa, A.: Cybercrime investigation training and specialist education for the European Union. In: Proceedings - 2nd International Annual Workshop on Digital Forensics and Incident Analysis, WDFIA 2007, pp. 28–37 (2007), Compendex

    Google Scholar 

  27. McGuire, T., Murff, K.: Issues in the development of a digital forensics Curriculum. Journal of Computing Sciences in Colleges 22(2) (2006), Consortium for Computing Sciences in Colleges

    Google Scholar 

  28. Irons, A.D., et al.: Digital Investigation as a distinct discipline: A pedagogic perspective. Digital Investigation 6(1-2), 82–90 (2009)

    Article  Google Scholar 

  29. Murdoch University.: Cyber Forensics, http://www.murdoch.edu.au/Courses/Cyber-Forensics-Information-Security-and-Management/ (last visit October 15, 2010)

  30. Deakin university.: Bachelor of Information Technology (I.T. Security), http://www.deakin.edu.au/futurestudents/courses/course.php?course=S334&stutype=local&keywords=digital%20forensic (last visit 15 October 2010)

  31. Louise, L., et al.: Establishing network computer forensics classes. In: InfoSecCD 2004: Proceedings of the 1st Annual Conference on Information Security Curriculum Development. ACM, New York (2004)

    Google Scholar 

  32. Luther, T., et al.: Forensic Course Development. In: Proceedings of the 4th Conference on Information Technology Curriculum, CITC4 2003. ACM, New York (2003)

    Google Scholar 

  33. Luther, T., et al.: Forensic Course Development – One Year Later. In: SIGITE 2004. ACM, Salt Lake City (2004)

    Google Scholar 

  34. Batten, L., Lei, P.: Teaching Digital Forensics to Undergraduate Students, vol. 6(3), pp. 54–56 (2008)

    Google Scholar 

  35. Kevin, R., Hongmei, C.: Framework for the design of web-based learning for digital forensics labs. In: Proceedings of the 47th Annual Southeast Regional Conference, ACM-SE 47. ACM, New York (2009)

    Google Scholar 

  36. John Jay College of Criminal Justice.: Master of Science in Forensic Computing, http://www.jjay.cuny.edu/academics/690.php , (last visit November 12, 2010)

  37. Philip, C., et al.: Master’s Degree in Digital Forensics. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007 (January 2007)

    Google Scholar 

  38. Training Programs.: EnCE Certification Program, https://guidancesoftware.com/training/training_programs.aspx (last visit November 12, 2010)

  39. Lane Department of Computer Science and Electrical Engineering.: Computer Forensics Certificate, http://www.csee.wvu.edu/ , (last visit July 7 2009)

  40. Lee H.C.: College of Criminal Justice and Forensic Sciences.: Forensic Computer Investigation Certificate, http://www.newhaven.edu/5930/ (last visit October 5, 2010)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sabeil, E., Bt Abdul Manaf, A., Ismail, Z., Abas, M. (2011). Trainees’ Competency Based-Assessment Methods in Cyber Forensics Education or Training Programmes – A Review. In: Mohamad Zain, J., Wan Mohd, W.M.b., El-Qawasmeh, E. (eds) Software Engineering and Computer Systems. ICSECS 2011. Communications in Computer and Information Science, vol 179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22170-5_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22170-5_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22169-9

  • Online ISBN: 978-3-642-22170-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics