This document outlines the objectives for the Cyber Forensics Associate exam. It covers 5 main topics: 1) analysis, 2) discovery, 3) evidence, 4) documentation and reporting, and 5) cyber forensics fundamentals. The objectives include analyzing forensic images, applying proper evidence collection procedures, identifying different types of cybercrimes, and communicating investigation results to internal teams.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
45 views1 page
ECC CFA Exam Objectives
This document outlines the objectives for the Cyber Forensics Associate exam. It covers 5 main topics: 1) analysis, 2) discovery, 3) evidence, 4) documentation and reporting, and 5) cyber forensics fundamentals. The objectives include analyzing forensic images, applying proper evidence collection procedures, identifying different types of cybercrimes, and communicating investigation results to internal teams.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
CYBER FORENSICS ASSOCIATE EXAM OBJECTIVES
1 Analysis 3.4 Outline the process for creating a forensically
sound image 1.1 Analyze forensic images 3.5 Apply evidence collection to the chain of custody 1.2 Apply procedural concepts required to use forensic tools 3.6 Discriminate between a live acquisition and static acquisition 1.3 Apply basic malware analysis using NIST accepted forensic techniques and tools 1.4 Identify anti-forensics techniques 4 Documentation and Reporting 1.5 Determine the important content of event logs 4.1 Apply forensic investigation methodology in forensics 4.2 Identify the steps necessary to validate an emergency contact list for incident response 2 Discovery 4.3 Analyze a scene to determine what should be visually documented 2.1 Apply procedural concepts necessary to detect a hidden message inside a picture 4.4 Report findings from a malware analysis 2.2 Analyze a conversation between two endpoints 4.5 Identify the elements of a complete forensics from a PCAP file report 2.3 Recognize that devices are kept in the same 4.6 Communicate the results of an investigation to an state as they were found internal team 2.4 Determine how to gather evidence in a forensically sound manner 5 Cyber Forensics Fundamentals 2.5 Apply procedural concepts required to discover 5.1 Identify different types of cybercrimes evidence on different file systems 5.2 Communicate incident handling and the 2.6 Apply procedural concepts required to gather response process evidence on different operating systems 5.3 Distinguish between steganography and 2.7 Identify proper steps in network capture cryptography 2.8 Given a scenario, determine evidence of email crimes
3 Evidence 3.1 Determine and report logon/logoff times for a specific user 3.2 Verify the authenticity of evidence (e.g., hash value) 3.3 Summarize the proper handling of evidence