Showing posts with label Sertifikasi Internasional. Show all posts
Showing posts with label Sertifikasi Internasional. Show all posts

Saturday, May 22, 2021

Sertifikasi Internasional : Microsoft Certified Educator (MCE) Skills Measured 62-193




The Microsoft Certified Educator (MCE) is a professional development program that bridges the gap between technology skills and innovative teaching. Educators holding a MCE certification can prove they have the skills needed to provide rich, customized learning experiences for their students that incorporate critical 21st century skills using Microsoft tools.

Candidates for this exam include individuals preparing to become classroom educators, current educators, faculty at teacher training or pre-service colleges, educational administrators, or other professionals looking to provide validation of competency.

The MCE: Technology Literacy for Educators certification test is an intermediate-level examination intended to be a valid and reliable measure of competencies as measured by the 21st Century Learning Design (21CLD) framework.

- SKILLS MEASURED - 

A. Facilitate Student Collaboration

  1. Determine the level to which a learning activity meets the rubric for collaboration.
    • Prepare activites that enable students to work together, have a shared responsibility for deliverables, make decisions that are substantive and crucial to learning activity success, and work interdependently.
    • Analyze, evaluate, design, and manage the learning environment to facilitate student collaboration, given a set of resources available in a classroom.
    • Virtual environment; physical environment; software tools available. 
B. Facilitate Skilled Communication

  1. Modify a learning activity to meet the rubric for the highest level of skilled communication.
    • Prepare activities that enable students to create product deliverables that convey a set of connected ideas, are multimodal, require supporting evidence, and are designed for a specific audience.
  2. Evaluate student product examples to determine the level to which they meet the skilled communication rubric.
    • Evaluate student product examples on the use of connected ideas, multimodal approach, supporting evidence, and design for a specific audience.

C. Facilitate Knowledge Construction

Materi Sertifikasi : Cyber Forensics Associate (CFA) Certification Exam Objectives



The Cyber Forensics Associate(C|FA) certification demonstrates an individual’s knowledge on how to detect hacking attacks and properly extract evidences to report the crime and conduct audits to prevent future attacks. Individuals who learn the principles of digital forensics can become invaluable members of incident handling and incident response teams. The purpose of the Cyber Forensics Associate credential is to validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

 CYBER FORENSICS ASSOCIATE EXAM OBJECTIVES :

A. Analysis

  1. Analyze forensic images 
  2. Apply procedural concepts required to use forensic tools
  3. Apply basic malware analysis using NIST accepted forensic techniques and tools
  4. Identify anti-forensics techniques
  5. Determine the important content of event logs in forensics

B. Discovery

  1. Apply procedural concepts necessary to detect a hidden message inside a picture
  2. Analyze a conversation between two endpoints from a PCAP file
  3. Recognize that devices are kept in the same state as they were found
  4. Determine how to gather evidence in a forensically sound manner
  5. Apply procedural concepts required to discover evidence on different file systems
  6. Apply procedural concepts required to gather evidence on different operating systems
  7. Identify proper steps in network capture
  8. Given a scenario, determine evidence of email crimes

C. Evidence

  1. Determine and report logon/logoff times for a specific user
  2. Verify the authenticity of evidence (e.g., hash value)
  3. Summarize the proper handling of evidence
  4. Outline the process for creating a forensically sound image
  5. Apply evidence collection to the chain of custody
  6. Discriminate between a live acquisition and static acquisition

D. Documentation and Reporting

  1. Apply forensic investigation methodology
  2. Identify the steps necessary to validate an emergency contact list for incident response
  3. Analyze a scene to determine what should be visually documented
  4. Report findings from a malware analysis
  5. Identify the elements of a complete forensics report
  6. Communicate the results of an investigation to an internal team 
E. Cyber Forensics Fundamentals

  1. Identify different types of cybercrimes
  2. Communicate incident handling and the response process
  3. Distinguish between steganography and cryptography

Friday, May 21, 2021

Materi Sertifikasi : Ethical Hacking Associate (EHA) Certification Exam Objectives



The Ethical Hacking Associate certification demonstrates an individual’s knowledge in information security and network security, including the tools and methodologies of a malicious hacker, but in a lawful and legitimate manner. This credential certifies individuals at an entrylevel of network security discipline of ethical hacking from a vendorneutral perspective.

ETHICAL HACKING ASSOCIATE EXAM OBJECTIVES

A. Threat Analysis

  1. Apply procedural concepts necessary to identify attackers through threat modeling
  2. Interpret incoming and outgoing data to determine authorized and unauthorized usage
  3. Apply procedural concepts necessary to identify vulnerabilities in information systems
  4. Apply procedural concepts necessary to conduct risk assessments for networks and information-based systems
  5. Given a scenario, determine the appropriate encryption and decryption methods
  6. Apply procedural concepts necessary to find and contain malware and viruses

B. Auditing, Documentation, and Logs

  1. Interpret current laws and regulations to provide updates to organizational security policies
  2. Given a scenario, determine the appropriate method to assist with new software development and end user testing
  3. Troubleshoot various security products and systems to validate their functions

C. Operate, Maintain, and Install

  1. Given a s scenario, determine the appropriate method to implement security protocols and management for popular operating systems
  2. Given a scenario, determine how to defend against different types of attacks
  3. Apply procedural concepts necessary to configure security systems and validate the security

D. Infrastructure and Deployment

  1. Determine the appropriate method to conduct penetration tests to assess weaknesses and vulnerabilities
  2. Given a scenario, analyze network security breaches
  3. Apply procedural concepts necessary to conduct different types of social engineering

E. Identification, Authentication, and Authorization

  1. Apply procedural concepts necessary to identify different methods of identification, authentication and authorization
  2. Apply procedural concepts necessary to identify the appropriate placement of biometric devices

F. Cryptography

  1. Identify different types of cryptography
  2. Given a scenario, determine the appropriate cryptography

Learn more at: www.certiport.com/EC-Council.