DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Career Certification

Certified Forensic Computer Examiner (CFCE)

by IASCIS

Reading Time: 5 mins read
in Career, Certification, Learning
IssuerIASCIS
LevelAdvanced level
Career OpportunitiesCyber Defense Incident Responder, All Source-Collection Manager, All Source-Collection Requirements Manager, Cyber Operator, Cyber Crime Investigator, Law Enforcement / Counterintelligence Forensics Analyst, Cyber Defense Forensics Analyst
Skills Ability to identify current partition schemes, Define Globally Unique Identifier (GUID), Understand the structure of FAT directory entries, Ability to distinguish, examine, analyze, and parse the contents of the NTFS master file table, Knowledge of deleted/orphaned files, Be able to identify file systems used by Apple and Linux, Understand hashing and hash sets, Ability to generate and validate forensically sterile media, Ability to generate and validate a forensic image of media, Ability to capture data from Random Access Memory, Understand file fragmentation, Ability to extract file metadata from common file types, Ability to extract data from compound files, Knowledge of encrypted files/media and strategies for recovery, Knowledge of Internet and Browser artifacts, Understand Cloud storage and how to obtain the data, Knowledge of the locations of common Windows artifacts, Be able to identify and extract specific data from the registry, Be able to extract and examine Event Logs, Ability to locate, mount and examine virtual drive files, Understand the Swap and Hibernation files and the evidence they may contain
CostPaid
Validity3 years
RenewalEarn 40 CECs (continuing education credits) and then take the Recertification Exercise
ThemesDigital Forensics, Computer Forensics, windows Forensics, Forensics Analysis, Malware, Attackers, APTs, Cyber Crime, Cyber Defense, Incident Response

Certification Overview

The Certified Forensic Computer Examiner (CFCE) certification program is based on a series of core competencies in the field of computer/digital forensics. IACIS offers the CFCE certification program to prospective candidates who wish to attain the CFCE certification.

Exam Details

The CFCE certification program consists of a two stage process:
  • Peer Review
  • Certification Testing

Both stages are required to be completed to become CFCE certified. The candidate is required to demonstrate their knowledge of the CFCE core competencies​ and practical skills by successfully completing the peer review, practical and written examination instruments. 

PEER REVIEW PHASE

The peer review phase consists of the following elements:

  • Four (4) practical problems
  • 30 days to complete each problem
  • You are assigned a coach to guide you through the problem’s learning points.
  • Must pass all four problems to be eligible to enter the certification phase.

CERTIFICATION PHASE

The certification phase consists of the following elements:

  • Hard Drive practical problem – 30 days to complete
  • Knowledge based objective test – 14 days to complete

Entry into the Certification Phase is automatic once the peer review phase has been completed. The candidate will have 7 days to begin the hard drive problem and 30 days to complete it. Seven days after the peer review phase has been completed whether the candidate logs in or not, the 44 day clock will begin.

The candidate will then go directly into the Knowledge Based test, which consists of 100 general forensic knowledge questions. The written exam consists of questions composed of true/false, multiple-choice, matching, and short essay (fill in the blank) questions. Candidates must obtain a minimum score of 80% on the exam and practical to pass. Failure to achieve the requisite score will result in failure, and the CFCE certification will not be awarded. 

Official Study Materials

  • 2024 ORLANDO TRAINING

ENROLL TODAY

Disclaimer: Reference in this site to any specific commercial product, process, service, certification, or the use of any trade, firm or corporation name is for the information and convenience of the public, and does not constitute endorsement, recommendation, or favoring by CyberMaterial.
Tags: APTsAttackersCertificationComputer ForensicsCyber crimeCyber defenseCyber securityDigital ForensicsForensics AnalysisIACISIncident ResponderIncident Responder CertificationIncident Responder EducationIncident responseLearningMalwareWindows Forensics
ADVERTISEMENT

Related Posts

Certified Security Leadership Officer (CSLO)

Certified Security Leadership Officer (CSLO)

August 18, 2023
Azure Administrator Associate

Azure Administrator Associate

August 18, 2023
AWS Certified Solutions Architect

AWS Certified Solutions Architect

August 18, 2023
Cisco Certified Network Associate (CCNA)

Cisco Certified Network Associate (CCNA)

August 18, 2023

More Articles

Entertainment

The Wild World of Cybercrime

April 7, 2022
Book

Hate Crimes in Cyberspace

November 19, 2021
Entertainment

Halt and catch fire (2014-2017)

November 12, 2020
Document

Mobile Device Best Practices – Report

April 23, 2023
Cyber101

Nonaffiliated Third Party

June 7, 2022
Alerts

ScarCruft APT uses weaponized CHM files

March 22, 2023
Alerts

ABB security advisory (AV22-539)

September 27, 2022
Alerts

CISA Releases Critical ICS Advisories

June 30, 2023
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.