EC-Council Exam Blueprint v1 Ethical Hacking Essentials Exam Blueprint Exam 112-52 Digital Forensics Essentials Exam Blueprint S. No. Domains Sub Domains Domain % Fundamentals of Computer Forensics Digital Evidence 1 Computer Forensics Fundamentals Forensic Readiness 8 Roles and Responsibilities of a Forensic Investigator Legal Compliance in Computer Forensics Forensic Investigation Process and its Importance 2 Computer Forensics Investigation Process Forensic Investigation Process - Preinvestigation Phase Forensic Investigation Process - Investigation Phase 6 Forensic Investigation Process - Postinvestigation Phase Different Types of Disk Drives and their Characteristics Logical Structure of a Disk 3 Understanding Hard Disks and File Systems Booting Process of Windows, Linux, and Mac Operating Systems 10 File Systems of Windows, Linux, and Mac Operating Systems File System Examination Page | 1 Ethical Hacking Essentials Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking Essentials Exam Blueprint Exam 112-52 Data Acquisition Fundamentals 4 Data Acquisition and Duplication Types of Data Acquisition Data Acquisition Format 8 Data Acquisition Methodology 5 Defeating Antiforensics Techniques Anti-forensics and its Techniques Anti-forensics Countermeasures 8 Volatile and Non-Volatile Information Windows Memory and Registry Analysis 6 Windows Forensics Cache, Cookie, and History Recorded in Web Browsers 12 Windows Files and Metadata Volatile and Non-Volatile Data in Linux 7 Linux and Mac Forensics Analyze Filesystem Images Using The Sleuth Kit 8 Memory Forensics Mac Forensics Network Forensics Fundamentals Event Correlation Concepts and Types 8 Network Forensics Identify Indicators of Compromise (IoCs) from Network Logs 8 Investigate Network Traffic Web Application Forensics IIS and Apache Web Server Logs 9 Investigating Web Attacks Investigating Web Attacks on Windows-based Servers 8 Detect and Investigate Attacks on Web Applications Dark Web 10 Dark Web Forensics Dark Web Forensics 6 Tor Browser Forensics 11 Page | 2 Investigating Email Crimes Email Basics Email Crime Investigation and its Steps 8 Ethical Hacking Essentials Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking Essentials Exam Blueprint Exam 112-52 Malware, its Components and Distribution Methods Malware Forensics Fundamentals and Recognize Types of Malware Analysis 12 Malware Forensics Static Malware Analysis 10 Analyze Suspicious Word Documents Dynamic Malware Analysis System Behavior Analysis Network Behavior Analysis Page | 3 Ethical Hacking Essentials Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.