Uploaded by LearnProNetworking

DIGITAL Forensics Essentials

advertisement
EC-Council
Exam Blueprint v1
Ethical Hacking Essentials
Exam Blueprint
Exam 112-52
Digital Forensics Essentials
Exam Blueprint
S. No.
Domains
Sub Domains
Domain %
Fundamentals of Computer Forensics
Digital Evidence
1
Computer Forensics
Fundamentals
Forensic Readiness
8
Roles and Responsibilities of a Forensic
Investigator
Legal Compliance in Computer Forensics
Forensic Investigation Process and its
Importance
2
Computer Forensics
Investigation Process
Forensic Investigation Process - Preinvestigation Phase
Forensic Investigation Process - Investigation
Phase
6
Forensic Investigation Process - Postinvestigation Phase
Different Types of Disk Drives and their
Characteristics
Logical Structure of a Disk
3
Understanding Hard
Disks and File
Systems
Booting Process of Windows, Linux, and Mac
Operating Systems
10
File Systems of Windows, Linux, and Mac
Operating Systems
File System Examination
Page | 1
Ethical Hacking Essentials Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Essentials
Exam Blueprint
Exam 112-52
Data Acquisition Fundamentals
4
Data Acquisition and
Duplication
Types of Data Acquisition
Data Acquisition Format
8
Data Acquisition Methodology
5
Defeating Antiforensics Techniques
Anti-forensics and its Techniques
Anti-forensics Countermeasures
8
Volatile and Non-Volatile Information
Windows Memory and Registry Analysis
6
Windows Forensics
Cache, Cookie, and History Recorded in Web
Browsers
12
Windows Files and Metadata
Volatile and Non-Volatile Data in Linux
7
Linux and Mac
Forensics
Analyze Filesystem Images Using The Sleuth
Kit
8
Memory Forensics
Mac Forensics
Network Forensics Fundamentals
Event Correlation Concepts and Types
8
Network Forensics
Identify Indicators of Compromise (IoCs) from
Network Logs
8
Investigate Network Traffic
Web Application Forensics
IIS and Apache Web Server Logs
9
Investigating Web
Attacks
Investigating Web Attacks on Windows-based
Servers
8
Detect and Investigate Attacks on Web
Applications
Dark Web
10
Dark Web Forensics
Dark Web Forensics
6
Tor Browser Forensics
11
Page | 2
Investigating Email
Crimes
Email Basics
Email Crime Investigation and its Steps
8
Ethical Hacking Essentials Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Essentials
Exam Blueprint
Exam 112-52
Malware, its Components and Distribution
Methods
Malware Forensics Fundamentals and
Recognize Types of Malware Analysis
12
Malware Forensics
Static Malware Analysis
10
Analyze Suspicious Word Documents
Dynamic Malware Analysis
System Behavior Analysis
Network Behavior Analysis
Page | 3
Ethical Hacking Essentials Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Download