Saturday, May 22, 2021

Sertifikasi Internasional : Microsoft Certified Educator (MCE) Skills Measured 62-193




The Microsoft Certified Educator (MCE) is a professional development program that bridges the gap between technology skills and innovative teaching. Educators holding a MCE certification can prove they have the skills needed to provide rich, customized learning experiences for their students that incorporate critical 21st century skills using Microsoft tools.

Candidates for this exam include individuals preparing to become classroom educators, current educators, faculty at teacher training or pre-service colleges, educational administrators, or other professionals looking to provide validation of competency.

The MCE: Technology Literacy for Educators certification test is an intermediate-level examination intended to be a valid and reliable measure of competencies as measured by the 21st Century Learning Design (21CLD) framework.

- SKILLS MEASURED - 

A. Facilitate Student Collaboration

  1. Determine the level to which a learning activity meets the rubric for collaboration.
    • Prepare activites that enable students to work together, have a shared responsibility for deliverables, make decisions that are substantive and crucial to learning activity success, and work interdependently.
    • Analyze, evaluate, design, and manage the learning environment to facilitate student collaboration, given a set of resources available in a classroom.
    • Virtual environment; physical environment; software tools available. 
B. Facilitate Skilled Communication

  1. Modify a learning activity to meet the rubric for the highest level of skilled communication.
    • Prepare activities that enable students to create product deliverables that convey a set of connected ideas, are multimodal, require supporting evidence, and are designed for a specific audience.
  2. Evaluate student product examples to determine the level to which they meet the skilled communication rubric.
    • Evaluate student product examples on the use of connected ideas, multimodal approach, supporting evidence, and design for a specific audience.

C. Facilitate Knowledge Construction

Materi Sertifikasi : Cyber Forensics Associate (CFA) Certification Exam Objectives



The Cyber Forensics Associate(C|FA) certification demonstrates an individual’s knowledge on how to detect hacking attacks and properly extract evidences to report the crime and conduct audits to prevent future attacks. Individuals who learn the principles of digital forensics can become invaluable members of incident handling and incident response teams. The purpose of the Cyber Forensics Associate credential is to validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.

 CYBER FORENSICS ASSOCIATE EXAM OBJECTIVES :

A. Analysis

  1. Analyze forensic images 
  2. Apply procedural concepts required to use forensic tools
  3. Apply basic malware analysis using NIST accepted forensic techniques and tools
  4. Identify anti-forensics techniques
  5. Determine the important content of event logs in forensics

B. Discovery

  1. Apply procedural concepts necessary to detect a hidden message inside a picture
  2. Analyze a conversation between two endpoints from a PCAP file
  3. Recognize that devices are kept in the same state as they were found
  4. Determine how to gather evidence in a forensically sound manner
  5. Apply procedural concepts required to discover evidence on different file systems
  6. Apply procedural concepts required to gather evidence on different operating systems
  7. Identify proper steps in network capture
  8. Given a scenario, determine evidence of email crimes

C. Evidence

  1. Determine and report logon/logoff times for a specific user
  2. Verify the authenticity of evidence (e.g., hash value)
  3. Summarize the proper handling of evidence
  4. Outline the process for creating a forensically sound image
  5. Apply evidence collection to the chain of custody
  6. Discriminate between a live acquisition and static acquisition

D. Documentation and Reporting

  1. Apply forensic investigation methodology
  2. Identify the steps necessary to validate an emergency contact list for incident response
  3. Analyze a scene to determine what should be visually documented
  4. Report findings from a malware analysis
  5. Identify the elements of a complete forensics report
  6. Communicate the results of an investigation to an internal team 
E. Cyber Forensics Fundamentals

  1. Identify different types of cybercrimes
  2. Communicate incident handling and the response process
  3. Distinguish between steganography and cryptography