Cybercrime analyst / investigator

The cybercrime analyst/investigator role includes a variety of entry-level information security positions focused on analyzing and investigating cybercrime events.

What does a cybercrime analyst do?

Cybercrime analysts and investigators require an understanding of how malware compromises a system and the methodologies behind digital forensics, including identifying, preserving, extracting, analyzing and reporting on cybercrime evidence.

It is one of four entry-level, core cybersecurity roles mapped directly to the National Initiative for Cybersecurity Education’s CyberSeek model.

Start learning today

Certified Computer Forensics Examiner (CCFE)
Learning Path
Certified Computer Forensics Examiner (CCFE)

Certified Computer Forensics Examiner (CCFE)

The Certified Computer Forensics Examiner (CCFE) certification path teaches you the skills needed to investigate computer threats. You'll learn about performing forensics on hard drives, file systems and networks as well as the legal and ethical issues of investigating cybercrime.

Certified Mobile Forensics Examiner (CMFE)
Learning Path
Certified Mobile Forensics Examiner (CMFE)

Certified Mobile Forensics Examiner (CMFE)

The Certified Mobile Forensics Examiner (CMFE) certification path prepares you for the CMFE certification exam by teaching the necessary skills to investigate mobile threats and mobile cybercrime.

Computer Forensics
Learning Path
Computer Forensics

Computer Forensics

The Computer Forensics skill path teaches you critical techniques about identifying, preserving, extracting, analyzing and reporting forensic evidence through use of the most popular computer forensic tools.

Mobile Forensics
Learning Path
Mobile Forensics

Mobile Forensics

The Mobile Forensics skill path teaches you critical techniques about identifying, preserving, extracting, analyzing and reporting forensic evidence found on mobile devices, including Android, iOS, Windows Phone and Feature Phone.

Network Forensics
Learning Path
Network Forensics

Network Forensics

The Network Forensics skill path helps you fully understand how systems are compromised and what traces are left behind by attackers on the network. You'll learn the concepts, techniques and tools used to analyze logs, protocols, wireless, web traffic and email.

Paraben DSMO Mobile Operator Certification
Learning Path
Paraben DSMO Mobile Operator Certification

Paraben DSMO Mobile Operator Certification

The path to becoming a mobile forensic investigator requires fundamental knowledge of devices and the operation of the specialized tools required to process data. The learning path will go through those specialized skills for the operation of Paraben’s E3 Forensic Platform in the capture of mobile data as forensic evidence. The E3 Forensic Platform is a single-software platform designed to capture and examine digital data in a forensically sound manner. The process for collecting mobile evidence is focused on a few primary areas: acquisition, analysis and reporting. These cornerstones of the examination process are covered in the DSMO course and certification and how it applies to mobile evidence.

Paraben P2C Operator Certification
Learning Path
Paraben P2C Operator Certification

Paraben P2C Operator Certification

In this path, you'll explore the features, tools and abilities of the Paraben E3 Forensic Platform. This in-depth learning path leads you on an exploration of the many features and uses of the Paraben E3 Forensic Platform. Beginning with the basic features, you'll look at the platform's layout and navigation, case control and adding evidence, data triage, artifact exploration, data optimization, data reporting and more. Students will explore common techniques and tools within the E3 Forensic Platform and prepare to use this platform in a professional assignment.

Windows Registry Forensics
Learning Path
Windows Registry Forensics

Windows Registry Forensics

The Windows Registry Forensics learning path will enable you to understand the purpose and structure of the files that create the Windows Registry. You will learn to identify, extract and interpret important data from a live and non-live Windows Registry.

Overview

Common job titles
  • Digital forensics analyst
  • Cyber forensics analyst
  • Cybersecurity forensics analyst
  • Computer forensics analyst
U.S. job openings
  • 967
Most-requested skills
  • Computer forensics
  • Linux
  • Information security
  • Consumer electronics
  • Hard drives
  • Information systems
  • Forensic toolkit
  • Unix
  • Malware engineering

Award-winning training that you can trust

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec

Best IT Security-related Training Program

Best IT Security-related Training Program

Infosec Skills

Best Cybersecurity Education Provider & Best Security Education Platform

Best Cybersecurity Education Provider & Best Security Education Platform

Infosec Skills

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Most Innovative Product - Cybersecurity Training for Infosec Professionals

Infosec Skills