0% found this document useful (0 votes)
45 views1 page

ECC CFA Exam Objectives

This document outlines the objectives for the Cyber Forensics Associate exam. It covers 5 main topics: 1) analysis, 2) discovery, 3) evidence, 4) documentation and reporting, and 5) cyber forensics fundamentals. The objectives include analyzing forensic images, applying proper evidence collection procedures, identifying different types of cybercrimes, and communicating investigation results to internal teams.

Uploaded by

mk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views1 page

ECC CFA Exam Objectives

This document outlines the objectives for the Cyber Forensics Associate exam. It covers 5 main topics: 1) analysis, 2) discovery, 3) evidence, 4) documentation and reporting, and 5) cyber forensics fundamentals. The objectives include analyzing forensic images, applying proper evidence collection procedures, identifying different types of cybercrimes, and communicating investigation results to internal teams.

Uploaded by

mk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CYBER FORENSICS ASSOCIATE EXAM OBJECTIVES

1 Analysis 3.4 Outline the process for creating a forensically


sound image
1.1 Analyze forensic images
3.5 Apply evidence collection to the chain of custody
1.2 Apply procedural concepts required to use
forensic tools 3.6 Discriminate between a live acquisition and static
acquisition
1.3 Apply basic malware analysis using NIST
accepted forensic techniques and tools
1.4 Identify anti-forensics techniques 4 Documentation and Reporting
1.5 Determine the important content of event logs 4.1 Apply forensic investigation methodology
in forensics 4.2 Identify the steps necessary to validate an
emergency contact list for incident response
2 Discovery 4.3 Analyze a scene to determine what should be
visually documented
2.1 Apply procedural concepts necessary to detect a
hidden message inside a picture 4.4 Report findings from a malware analysis
2.2 Analyze a conversation between two endpoints 4.5 Identify the elements of a complete forensics
from a PCAP file report
2.3 Recognize that devices are kept in the same 4.6 Communicate the results of an investigation to an
state as they were found internal team
2.4 Determine how to gather evidence in a
forensically sound manner 5 Cyber Forensics Fundamentals
2.5 Apply procedural concepts required to discover 5.1 Identify different types of cybercrimes
evidence on different file systems
5.2 Communicate incident handling and the
2.6 Apply procedural concepts required to gather response process
evidence on different operating systems
5.3 Distinguish between steganography and
2.7 Identify proper steps in network capture cryptography
2.8 Given a scenario, determine evidence of email
crimes

3 Evidence
3.1 Determine and report logon/logoff times for a
specific user
3.2 Verify the authenticity of evidence (e.g., hash
value)
3.3 Summarize the proper handling of evidence

You might also like