Saturday, May 22, 2021

Materi Sertifikasi : Cyber Forensics Associate (CFA) Certification Exam Objectives



The Cyber Forensics Associate(C|FA) certification demonstrates an individual’s knowledge on how to detect hacking attacks and properly extract evidences to report the crime and conduct audits to prevent future attacks. Individuals who learn the principles of digital forensics can become invaluable members of incident handling and incident response teams. The purpose of the Cyber Forensics Associate credential is to validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

 CYBER FORENSICS ASSOCIATE EXAM OBJECTIVES :

A. Analysis

  1. Analyze forensic images 
  2. Apply procedural concepts required to use forensic tools
  3. Apply basic malware analysis using NIST accepted forensic techniques and tools
  4. Identify anti-forensics techniques
  5. Determine the important content of event logs in forensics

B. Discovery

  1. Apply procedural concepts necessary to detect a hidden message inside a picture
  2. Analyze a conversation between two endpoints from a PCAP file
  3. Recognize that devices are kept in the same state as they were found
  4. Determine how to gather evidence in a forensically sound manner
  5. Apply procedural concepts required to discover evidence on different file systems
  6. Apply procedural concepts required to gather evidence on different operating systems
  7. Identify proper steps in network capture
  8. Given a scenario, determine evidence of email crimes

C. Evidence

  1. Determine and report logon/logoff times for a specific user
  2. Verify the authenticity of evidence (e.g., hash value)
  3. Summarize the proper handling of evidence
  4. Outline the process for creating a forensically sound image
  5. Apply evidence collection to the chain of custody
  6. Discriminate between a live acquisition and static acquisition

D. Documentation and Reporting

  1. Apply forensic investigation methodology
  2. Identify the steps necessary to validate an emergency contact list for incident response
  3. Analyze a scene to determine what should be visually documented
  4. Report findings from a malware analysis
  5. Identify the elements of a complete forensics report
  6. Communicate the results of an investigation to an internal team 
E. Cyber Forensics Fundamentals

  1. Identify different types of cybercrimes
  2. Communicate incident handling and the response process
  3. Distinguish between steganography and cryptography

Materi Microsoft Access : How use a query as a filter and save a filter as a query



 How to use a query as a filter

  1. On the Home tab, in the Sort & Filter group, click Advanced and then click Advanced Filter/Sort.
  2. Click Advanced again, and then choose Load from Query.
  3. In the Applicable Filter dialog box, select the query you want to use as a filter, and then click OK.
  4. In the Sort & Filter group, click Toggle Filter to apply the filter. Click Toggle Filter again to remove the filter.


How to save a filter as a query
  1. On the Home tab, in the Sort & Filter group, click Advanced, and then click Advanced Filter/Sort.
  2. In the Advanced Filter/Sort window, in the Field row in the grid, select the fields you want to use in the filter.
  3. In the Criteria row, specify the expression to use in the filter.
  4. Click Advanced, and then choose Save As Query.
  5. Enter a name for the query in the Save As Query dialog box, and then click OK