Online Computer Forensics Examiner | Penn Foster Career School

Online Forensic Computer Examiner

Why Penn Foster Career School?

  • Regionally & Nationally Accredited
  • Self-Paced
  • Supportive
  • Low monthly payments

Program Overview

Learn the skills to conduct high-tech investigations with Penn Foster Career School’s Online Forensic Computer Examiner Certificate Program, like how to acquire digital evidence and how to report your findings. Your lessons cover topics on security, the privacy of information, criminal threats, cybercrime, and hackers. You’ll also review actual cases of computer-based crime. With Penn Foster Career School, you train at home on your own time, and at a pace that’s right for you. And you can complete this program in just ten months!

The credits earned in this program can be transferred into the Penn Foster College PC Maintenance Technology Associate Degree Program. Penn Foster College is licensed in the state of Arizona.

Curriculum Details

Program Goal and Outcomes

Program Goal

To provide students with enhanced knowledge in the area of computer forensics for job or career advancement.

Program Outcomes

Upon completion of the program, students will be able to:

  • Describe the functions of hardware devices that make up a computer system, including the system board, CPU, memory, storage devices, and multimedia technologies
  • Describe the basics of computer maintenance and troubleshooting, including working with mobile computing and external devices
  • Demonstrate effective business and technical writing skills, and recognize how to prepare business and technical documents
  • Explain the functions of a computer's operating system, including Windows and Mac systems
  • Identify the processes and devices that allow computers to communicate with each other to form networks
  • Recognize the foundations of the Internet, including the servers, clients, and technologies that link them together, and explain web design, web configuration, and hosting environments
  • Explain how ethics and morality relate to the criminal justice system, and recognize ethical issues encountered by criminal justice professionals
  • Discuss various types of computer-based crime and the procedures used in criminal cases that involve computers
  • Describe the concepts and practices involved in computer forensics, including using forensics tools, handling evidence, writing reports, and giving testimony

Course 1

PCM105 PC Hardware 1

This course defines and describes the elements and function of hardware devices that are part of a modern personal computer system.

Objectives:

  • Learn the parts of the computer that are considered the hardware: system board, central processing unit, read-only and random access memory, disk drives, hard drive, and CD and DVD drives.
  • Understand the purpose and use of each of these parts.

Course 2

PCM106 PC Hardware 2

This course will give you the skills you need to support mobile computing devices such as laptops, netbooks, smart phones, tablets, and iPads.

Objectives:

  • Learn maintenance, upgrading, and wireless connectivity.
  • Study the operating systems that support such devices.

Course 3

ENG121 Business and Technical Writing

Learn how to write business and technical documents.

Objectives:

  • Organize your material logically and systematically.
  • Use action verbs effectively and construct paragraphs.
  • Conduct research and document sources.

Course 4

PCM107 PC Maintenance and Repair

Discover how operating systems communicate with each computer hardware device, display data on the monitor, and retrieve and store information on the disk drive.

Objectives:

  • Perform standard operating and maintenance procedures.
  • Learn about computer viruses and how to avoid them.
  • Examine how Windows® and Apple® operating systems work.

Course 5

INT128 Network Protocols and Internetworking

In this course, you’ll learn how computers communicate with each other and how to form networks.

Objectives:

  • Learn network fundamentals.
  • Discover how local area networks and wide area networks work.
  • Understand how to maintain, troubleshoot, and secure a network.
  • Become familiar with the devices used for connecting networks.
Additional Course Material

Textbook: Cisco Networking Essentials

Course 6

INT125 Internet Server Environments

Explore the foundations of the Internet: the servers, clients, and technologies that link them together.

Objectives:

  • Learn website configuration, while examining common hosting environments, including Windows® and Unix®-based platforms.
  • Create and configure your own web server.

Course 7

CJS105 Ethics in Criminal Justice

Many situations require an understanding of ethics: difficult dilemmas with difficult solutions and outcomes. However, to act ethically is crucial to public protection and the integrity of the legal profession.

Objectives:

  • Learn about morality and ethics within the context of human behavior.
  • Examine issues of ethics and law enforcement.
  • Learn about the ethics of both punishment and corrections.
  • Complete a research project in which you’ll give your ethical solution to five fact scenarios.
Additional Course Material

Textbook: Everyday Ethics for The Criminal Justice Professional

Course 8

CJS255 Computer-Based Crime

Cyberspace is an environment favorable to committing some traditional crimes and to creating new ones.

Objectives:

  • Learn to classify computer crimes in terms of targets, means, and incidentals.
  • Explore the processing of information at the scene, including taking pictures, making sketches, looking for trace evidence, locating evidence, and bagging and tagging.
Additional Course Material

Textbook: Computer Forensics and Cyber Crime

Course 9

CSC275 Computer Forensics

With crimes ranging from identity theft to e-terrorism potentially affecting millions, it’s vital that those in the field of investigation and law enforcement be up-to-date on the latest in evidence collection and investigative techniques, and the countless ways in which criminals can leave electronic traces of their activities.

Objectives:

  • Learn the concepts and practices involved in computer forensics.
  • Identify the tools, ranging from graphical user interface (GUI) acquisition software to hex editors.
  • Write reports.
  • Follow rules of evidence.
  • Give testimony in court.
Additional Course Material

Textbook: Computer Forensics JumpStart

You will need high-speed internet access to begin your program. You will need access to a Microsoft® Windows® based computer running Windows® XP SP3 or later or an Apple® Mac® computer running OS X® or later, and an email account to complete your program with Penn Foster.

We reserve the right to change program content and materials when it becomes necessary.
Microsoft, Windows, and Windows XP are trademarks of Microsoft Corporation registered in the United States of America and/or other jurisdictions.
Apple, Mac, and OS X are trademarks of Apple, Inc registered in the United States of America and/or other jurisdictions.
Unix is a registered trademark of The Open Group.
Red Hat and Linux are registered trademarks and Fedora is a trademark of Red Hat, Inc. in the United States and other countries.

Sample Lesson

To view a Forensic Computer Examiner sample lesson, click here.

Forensic Computer Examiner Certificate Program Details

Penn Foster Career School will review how to conduct a high-tech investigation based on actual cases involving privacy of information, criminal threats, and cybercrime.

State Licensing Information

Licensing and/or certification requirements for jobs in this field are not the same in every state and may include educational, testing, and/or experiential requirements beyond those offered by your Penn Foster Program. You should contact the state professional licensing board or similar regulatory body in the state(s) where you plan to work to determine their requirements before enrolling in your Program. Please click here for contact information for state licensing/regulatory boards and certain industry licensing information.

Online Computer Forensics Examiner

The Online Forensic Computer Examiner Certificate Program provides basic training for conducting a high-tech investigation, from acquiring digital evidence to reporting the findings. Here are a few qualities that effective forensic computer examiners have in common:

  • Analytical: You use logic and careful analysis to solve a problem.
  • Problem solver: Finding the missing piece can be challenging and rewarding.
  • Detail oriented: It’s important to have a sharp eye and check things twice.
  • Persistent: Obstacles are part of the job and not a reason to become frustrated.

Penn Foster is an excellent distance learning school that prepares the student well for the work world. It helped me! Thanks Penn Foster.

- Victor C., Penn Foster Graduate

Penn Foster is a great place to learn. The instructors are only a phone call away if you need any help. They are friendly and eager to assist. It is a truly great way to get an education. I even met a few new friends online who were taking the same program that I was. We were able to help each other when needed. I plan on taking another program from Penn Foster.

- Karen M., Penn Foster Graduate

My overall experience with Penn Foster was great. You are allowed to go at your own speed, and the school gives encouragement to keep you going. I would recommend Penn Foster!

- James R., Penn Foster Graduate

Your program includes:

  • Customized payment plans with 0% interest
  • Books and learning aids
  • Goal-setting and progress-tracking tools
  • Instructional support from our experienced faculty
  • Access 24/7 to Penn Foster’s online community, plus immediate membership in the Forensic Computer Examiner Certificate academic group
  • Your personalized online student homepage and learning portal
  • Additional resources such as our online library and career guidance from Career Cruising

How does Penn Foster Career School’s Forensic Computer Examiner Certificate Program help students to prepare to conduct a forensic computer investigation?

Students will learn how to set up a forensics lab that will include the appropriate forensics software programs, otherwise known as "the tools of the trade." In preparation to conduct an investigation, students will learn about computer hardware, operating systems, Internet server environments; data acquisition; as well as cell phone and mobile device forensics.

More FAQs >

The completion of a certificate-level program does not typically qualify a student for employment. Completion of this program may assist students who have previous academic or work-related experience improve their chances for promotion or entry-level employment.

Find us on Google+