+ All Categories
Home > Documents > Ccfp Exam Outline

Ccfp Exam Outline

Date post: 09-Jan-2016
Category:
Upload: agar-magar
View: 22 times
Download: 0 times
Share this document with a friend
Description:
CFFP exam list

of 35

Transcript
  • Effective Date: September 2013

    September 2013

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    1

    Effective Date: September 2013

    Impartiality Statement (ISC) is committed to impartiality by promoting a bias and discrimination free

    environment for all members, candidates, staff, volunteers, subcontractors, vendors,

    and clients. (ISC)s board of directors, management and staff understand the importance of impartiality in carrying out its certification activities, manage conflict of

    interest and ensure the objectivity of its certification. If you feel you have not received

    impartial treatment, please send an email to [email protected] or call +1.727.785.0189, so

    that we can investigate your claim.

    Non-Discrimination Policy (ISC) is an equal opportunity employer and does not allow, condone or support discrimination

    of any type within its organization including, but not limited to, its activities, programs, practices,

    procedures, or vendor relationships. This policy applies to (ISC) employees, members,

    candidates, and supporters.

    Whether participating in an (ISC) official event or certification examination as an employee,

    candidate, member, staff, volunteer, subcontractor, vendor, or client if you feel you have been

    discriminated against based on nationality, religion, sexual orientation, race, gender, disability,

    age, marital status or military status, please send an email to [email protected] or call

    +1.727.785.0189, so that we can investigate your claim.

    For any questions related to these polices, please contact the (ISC) Legal Department

    at [email protected].

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    2

    Effective Date: September 2013

    Domain 1: Legal and Ethical Principles ...................................................................................................5

    Key Areas of Knowledge ........................................................................................................................5

    Domain 2: Investigations .............................................................................................................................7

    Overview ...................................................................................................................................................7

    Key Areas of Knowledge ........................................................................................................................7

    Domain 3: Forensic Science .................................................................................................................... 10

    Overview ................................................................................................................................................ 10

    Key Areas of Knowledge ..................................................................................................................... 10

    Domain 4: Digital Forensics ...................................................................................................................... 13

    Overview ................................................................................................................................................ 13

    Key Areas of Knowledge ..................................................................................................................... 13

    Domain 5: Application Forensics ............................................................................................................ 17

    Overview ................................................................................................................................................ 17

    Key Areas of Knowledge ..................................................................................................................... 17

    Domain 6: Hybrid and Emerging Technologies .................................................................................... 19

    Overview ................................................................................................................................................ 19

    Key Areas of Knowledge ..................................................................................................................... 19

    REFERENCES ............................................................................................................................................... 21

    SAMPLE EXAM QUESTION ......................................................................................................................... 23

    GENERAL EXAMINATION INFORMATION ................................................................................................ 24

    Computer Based Testing (CBT) ............................................................................................................... 24

    Registering for the Exam .......................................................................................................................... 24

    Scheduling a Test Appointment ............................................................................................................. 25

    Day of the Exam ....................................................................................................................................... 28

    Any questions? ...................................................................................................................................... 33

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    3

    Effective Date: September 2013

    A Certified Cyber Forensics Professional possesses expertise in information technology and is a recognized expert in forensic techniques and procedures, standards of practice, and legal and ethical principles that assure the accuracy, completeness and reliability of digital evidence. This expert level ability is measured against a globally recognized common body of knowledge. This Candidate Information Bulletin provides the following:

    Exam blueprint to a limited level of detail that outlines major topics and sub- topics within the domains,

    Suggested reference list,

    Description of the format of the items on the exam, and Basic registration/administration policies

    Candidates must meet the following requirements prior to taking the CCFP examination:

    Candidates must have a four-year degree leading to a Baccalaureate, or regional

    equivalent, plus 3 years of cumulative paid full-time digital forensics or IT security

    experience in three out of six Domains of the credential.

    For those candidates who do not hold a four-year degree leading to a

    Baccalaureate, or regional equivalent, six years of cumulative paid full-time digital

    forensics or IT security experience in three out of the six Domains of the credential are

    required.

    For those candidates who do not hold a four-year degree leading to a

    Baccalaureate, or regional equivalent, but hold an alternate forensics certification

    approved by (ISC), five years of cumulative paid full-time digital forensics or IT

    security experience in three out of the six domains of the credential are required.

    Please see link https://www.isc2.org/CCFP-experience-waiver for a list of Forensics

    certifications approved by (ISC).

    NO ONE may claim both the four-year degree and the alternate certification

    exemption.

    Attest to the truth of his or her assertions regarding professional experience, and legally commit to abide by the (ISC) Code of Ethics (Section 3).

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    4

    Effective Date: September 2013

    Before candidates are allowed to take the test at testing centers, they must respond Yes or No to the following four questions regarding criminal history and related background:

    1. Have you ever been convicted of a felony; a misdemeanor involving a

    computer crime, dishonesty, or repeat offenses; or a Court Martial in military

    service, or is there a felony charge, indictment, or information now pending

    against you? (Omit minor traffic violations and offenses prosecuted in juvenile

    court).

    2. Have you ever had a professional license, certification, membership or

    registration revoked, or have you ever been censured or disciplined by any

    professional organization or government agency?

    3. Have you ever been involved, or publicly identified, with criminal hackers

    or hacking?

    4. Have you ever been known by any other name, alias, or pseudonym? (You

    need not include user identities or screen names with which you were publicly

    identified).

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    5

    Effective Date: September 2013

    Domain 1: Legal and Ethical Principles

    Overview

    Legal and Ethical Principles domain addresses ethical behavior and compliance with

    applicable regulatory frameworks.

    CCFP candidates should fully understand legal and ethical principles concepts, methodologies

    and their implementation within centralized and decentralized environments across an

    organizations computing environment.

    The Candidate needs to display the ability to communicate findings orally (i.e. in court), in

    writing and to communicate cohesively with all members of the investigative

    team/organization/corporation.

    Key Areas of Knowledge

    A. Analyze the Nature of Evidence and its Characteristics

    A.1 Authority to Acquire

    A.2 Provenance

    A.3 Reliability/Credibility/Validity

    A.4 Admissibility

    A.5 Fragility

    A.6 Authentication

    B. Analyze the Chain of Custody

    B.1 Initiation

    B.2 Sealing, Labeling and Tagging

    B.3 Exchange

    B.4 Storage

    B.5 Disposition/Destruction

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    6

    Effective Date: September 2013

    C. Analyze the Significance of Rules of Procedure

    C.1 Roles and Responsibilities of Investigators

    C.2 Roles and Responsibilities of Forensic Examiners

    C.3 Roles and Responsibilities of Experts

    C.4 Admissibility of Evidence

    D. Analyze the Role of Expert Witness

    D.1 Bearing, Demeanor and Appearance

    D.2 Expert as Technician

    D.3 Expert as Teacher

    D.4 Expert as Consultant/Advisor

    D.5 Expert as Learner

    D.6 Scientific Conclusions, Opinions and Recommendations

    E. Apply Codes of Ethics

    E.1 Professional Ethics

    E.2 (ISC)2 Code of Ethics

    E.3 AAFS Code of Ethics

    E.4 ISO Code of Ethics

    E.5 Privacy and Confidentiality Issues

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    7

    Effective Date: September 2013

    Domain 2: Investigations

    Overview

    The candidate is expected to demonstrate an understanding of Investigations as it relates to

    data communications in local area and wide area networks, remote access,

    internet/intranet/extranet configurations. Candidates should be knowledgeable with network

    equipment such as switches, bridges and routers, as well as networking protocols (e.g., TCP/IP,

    IPSec), and VPNs.

    Key Areas of Knowledge

    A. Analyze the Investigative Process

    A.1 Preparation and Initiation

    A.2 Authority and Objectives

    A.3 Evidence Collection

    A.4 Evidence Transport

    A.5 Evidence Analysis and Examination

    A.6 Elements of Crime/Allegation

    A.7 Chain of Evidence

    A.8 Evidence Reporting and Presentation

    B. Analyze Evidence Management

    B.1 Evidence Preservation

    B.2 Evidence Tracking

    B.3 Evidence Access Control

    B.4 Evidence Disposition

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    8

    Effective Date: September 2013

    C. Analyze Criminal Investigations

    C.1 Authority (National/Federal/State/Local/Special) and Limitations

    C.2 Violations

    C.3 Elements of a Crime

    C.4 Exculpatory Evidence

    C.5 Burden of Proof

    D. Analyze Civil Investigations

    D.1 Authority, Privilege and Limitations

    D.2 Torts and Delict

    D.3 Nature of Litigants

    D.4 Burden of Proof

    E. Analyze Administrative Investigations

    E.1 Authority, Privilege and Limitations

    E.2 Nature of Parties

    E.3 Burden of Proof

    E.4 Liability

    F. Analyze Forensic Response to Security Incidents

    F.1 Incident Response Steps

    F.2 Business Continuity

    F.3 Liability

    F.4 Potential Criminal or Civil Action

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    9

    Effective Date: September 2013

    G. Analyze Electronic Discovery

    G.1 Definition of Discovery

    G.2 Spoliation

    G.3 Scope of Discovery

    G.4 Forensic versus Non-Forensic E-Discovery

    G.5 E-Discovery Steps

    G.6 Liability

    H. Analyze Intellectual Property (IP) Investigation

    H.1 Types of Intellectual Property (Copyrights, Trademarks, Trade Secrets,

    Licensing, Patents)

    H.2 Investigation Steps

    H.3 Potential Criminal or Civil Action

    H.4 Liability

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    10

    Effective Date: September 2013

    Domain 3: Forensic Science

    Overview

    Forensic Science domain entails applying a broad spectrum of sciences and technologies to

    investigate and establish facts in relation to criminal or civil law. The evidence collected must

    satisfy suitability for admission as fact and must be able to persuade based upon proof. Forensic

    Science is the application of science to law and is ultimately utilized throughout the legal

    process.

    The candidate is expected to have an understanding of the basic principles of the Forensic

    Sciences. Understand how Forensic Science is used in relation to investigations and law. Have

    an understanding of how to analyze forensic data and know how to apply Quality

    Assurance/Control measures throughout the Forensic process.

    Key Areas of Knowledge

    A. Analyze Fundamental Principles

    A.1 Locards Principle of Transference

    A.2

    Inman-Rudin Paradigm (identification, Individualization/Classification,

    Association and Reconstruction)

    A.3 Philosophy of Science (e.g., Verification and Falsifiability)

    A.4 Scientific Method (e.g., Theory, Hypotheses and Experiments)

    A.5

    Characteristics of Forensic Science (e.g., Constrained by Law,

    Argumentation Requirements, Documentation Requirements)

    A.6 Peer Review

    B. Analyze Forensic Methods

    B.1 Identification

    B.2 Individualization/Classification

    B.3 Association

    B.4 Reconstruction

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    11

    Effective Date: September 2013

    B. 5

    Forensic Examinations/Investigations are Designed to Address one or

    more of the above (Inman-Rudin Questions)

    C. Analyze Forensic Analysis and Examination Planning

    C.1 Documentation and Case Notes

    C.2 Examination/Investigation Goals

    C.3 Hypothesis Formulation/Criteria

    C.4 Experimental Design and Tool Selection

    C.5 Examination Plan Execution

    C.6 Results Review and Evaluation

    C.7 Conclusions and Opinions Formulation

    D. Evaluate Report Writing and Presentation

    D.1 Structured Report Format

    D.2 Incorporation of Examination Results in the Report

    D.3 Clarity and Scientific Accuracy

    D.4

    Distinction between Conclusions and Opinions (e.g., Conclusions

    supported by Facts; Opinions supported by Science and Experience)

    D.5 Report Types and their Components

    D.6 Report/Presentation appropriate to the Audience and Venue

    E. Analyze Quality Assurance, Control, Management and Accreditation Procedures

    E.1 Quality Management System/Plan

    E.2 Quality Assurance (e.g., SOPs, Tool Calibration and Validation)

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    12

    Effective Date: September 2013

    E.3

    Quality Control (e.g., Peer Reviews, Administrative Reviews, Program

    Reviews)

    E.4

    Investigator/Examiner Certification and Licensing (e.g., Professional

    Certifications, Vendor Certifications, Organizational Certifications)

    E.5

    Accreditation (e.g., Laboratory, Unit, Organization; e.g., ISO,

    ASCLD/LAB)

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    13

    Effective Date: September 2013

    Domain 4: Digital Forensics

    Overview

    Digital Forensics domain refers to the collection of any digital evidence which can be defined

    as data stored or transmitted via electronic means. This process will ultimately establish the

    timeline of events of what occurred and will be utilized during the legal process within the court

    system.

    The candidate needs to show a level of competence in Media and File System structures.

    Understand the different types of system memory. The CCFP candidate needs to also

    understand Network Protocols, Operating Systems, Virtualization, and Mobile Devices.

    Key Areas of Knowledge

    A. Analyze Media and File System Forensics

    A.1 Locations where Evidence may Reside

    A.2 Storage Media (e.g., Flash Memory, Cards, CDs/DVDs, Drives, Disk Images)

    A.3 Hardware/Firmware/Interfaces

    A.4 Partitioning and Disk Geometry (e.g., MBR, RAID)

    A.5 File Systems (e.g., NTFS, FAT)

    A.6 File Metadata (e.g., Size, Date, Time)

    A.7 Encrypted Drives

    A.8 Corrupted/Damaged Media

    A.9 Media/File System Forensic Process Steps

    B. Analyze Computer and Operating Systems Forensics

    B.1 RAM/CMOS/Volatile Memory (e.g., Live Forensics)

    B.2 Configuration/Control/Registry/Device Drivers

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    14

    Effective Date: September 2013

    B.3 Operating Systems (e.g., Windows, Linux, Mac, Android, iOS)

    B.4 Other Devices (e.g., Printers, Scanners, Fax Machines)

    B.5 Computer/OS Forensic Process Steps

    C. Analyze Network Forensics

    C.1 Types of Networks, Protocols, Operating Systems and Architectures

    (e.g., TCP/IP, Wireless, Telecommunications, SANs)

    C.2 Network Hardware/Devices (e.g., Routers, Switches, Firewalls, IDS/IPS,

    NICs, Servers, Clients, Honeynets)

    C.3 P2P Networks and Proxies

    C.4 Network Shares

    C.5 Network Services

    C.6 Log Files

    C.7 Network Forensic Process Steps

    D. Apply Mobile Device Forensics

    D.1 Types of Data

    D.2 Locations where Data Resides

    D.3 Mobile Device Hardware and Architectures

    D.4 Mobile Device Operating Systems (e.g., iOS, Android)

    D.5 Non-Invasive versus Invasive Forensics

    D.6 Mobile Device Forensic Process Steps

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    15

    Effective Date: September 2013

    E. Understand Embedded Device Forensics

    E.1 Types of Embedded Devices (e.g., GPS Devices, Plug Computers,

    Gaming Devices, Credit Card Skimmers)

    E.2 Types of Data

    E.3 Locations where Data Resides

    F. Apply Multimedia and Content Forensics

    F.1 Types of Multimedia (e.g., images, audio, video)

    F.2 Types of Application Metadata

    F.3 Locations where Evidence may Reside (e.g., Headers,

    Steganographic/Embedded Data)

    F.4 Forensic Process Steps

    G. Apply Virtual System Forensics

    G.1 Types of Virtual Systems

    G.2 Virtual System Architectures

    G.3 Locations where Evidence may Reside

    G.4 Forensic Process Steps

    H. Analyze Forensic Techniques and Tools

    H.1 Live Forensics

    H.2 Data Recovery

    H.3 Password Recovery

    H.4 File Carving

    H.5 Metadata Carving

    H.6 Known File Filtering

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    16

    Effective Date: September 2013

    H.7 String and Keyword Searching

    H.8 Header Analysis

    H.9 Timeline Analysis

    H.10 Graphical Image Analysis

    H.11 Event Correlation

    H.12 Cryptanalysis/Steganalysis

    H.13 Sandboxing

    H.14 Network Sniffing

    H.15 Network Traffic Analysis

    H.16 Network Path Analysis

    H.17 Data Mining

    H.18 Evidence Visualization

    I. Understand Anti-Forensic Techniques and Tools

    I.1 Hiding Techniques and Tools (e.g., Encryption, Steganography, Packing,

    Tunneling/Onion Routing)

    I.2 Destruction Techniques and Tools (e.g., Wiping, Overwriting, Corruption,

    Degaussing)

    I.3 Protection/Logging Disabling

    I.4 Spoofing (e.g., Address Spoofing, Application and Data Spoofing)

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    17

    Effective Date: September 2013

    Domain 5: Application Forensics

    Overview

    The Application Forensics domain addresses the Forensics complexities of the many application

    types that a CCFP candidate may encounter during a forensic investigation. It is important for

    the CCFP candidate to have a sound understanding of these application types in order to

    support the digital collection of evidence.

    The candidate should understand key areas within the application realm to include but not

    limited to Databases, Email, Peer to Peer Applications, and Malware.

    Key Areas of Knowledge

    A. Apply Software Forensics

    A.1 File Formats

    A.2 Internal File Metadata

    A.3

    Traces/Remnants and Application Debris (e.g., Registry Entries,

    Temporary Files, Spool Files, Page files)

    A.4

    Software Analysis (e.g., Hashes, Signatures, Patterns, Code

    Comparison Techniques)

    B. Analyze Web, Email and Messaging Forensics

    B.1

    Web Forensics (e.g., IP Addresses, Protocols, Log Analysis, Scripting,

    Backend Applications, Server-Side, Client-Side)

    B.2

    Email Forensics (e.g., Sender/Receiver Attribution, Protocols, Headers,

    Types, Content, Attachments, Storage Formats, Signed Email,

    Encryption, Email Tracing, Log Files, Server-Side, Client-Side)

    B.3

    Messaging Forensics (e.g., Sender/Receiver Attribution, Protocols,

    Formats, Architectures, Content, Log Files, Server-Side, Client-Side)

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    18

    Effective Date: September 2013

    C. Understand Database Forensics

    C.1

    Database Models (e.g., Hierarchical, Network, Relational, Object-

    Oriented, Hybrid)

    C.2

    Database Systems (e.g., Oracle, MySQL, MSSQL, SQLite, PostgreSQL,

    PList, MS Access, Embedded Databases, Ad hoc Database Structures)

    C.3 Log Analysis

    C.4 Record Carving

    C.5 Database Reconstruction

    D. Understand Malware Forensics

    D.1

    Malware Types (e.g., Viruses, Worms, Trojans, Botnets, Rootkits, Logic

    Bombs, Advanced Persistent Threat)

    D.2 Malware Behavior

    D.3 Malware Impact on Investigations

    D.4

    Malware Analysis Techniques (e.g., Static Analysis and Dynamic

    Analysis)

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    19

    Effective Date: September 2013

    Domain 6: Hybrid and Emerging Technologies

    Overview

    The Hybrid and Emerging Technologies domain contains the ever evolving technologies that

    the CCFP candidate is expected to have a sound understanding of, i.e. Cloud Computing,

    Social Networks, and Industrial Control Systems.

    Hybrid and Emerging Technologies covers the practice of applying a comprehensive and

    rigorous method for collecting evidence in support of an investigation. These Emerging

    Technologies presents new challenges to the field of forensics. It is imperative that the CCFP

    candidate understands these developing technologies in order to support the forensics process.

    Key Areas of Knowledge

    A. Understand Cloud Forensics

    A.1 Types of Cloud Architectures (IaaS, PaaS, SaaS)

    A.2 Types of Clouds (Public, Private, Hybrid, Community)

    A.3 Where the Evidence may Reside

    A.4 Service Level Agreements

    A.5 Jurisdictional Issues

    B. Understand Social Networks

    B.1 Types/Applications of Social Networks

    B.2 Where the Evidence may Reside

    B.3 Terms of Service

    B.4 Jurisdictional Issues

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    20

    Effective Date: September 2013

    C. Understand the Big Data Paradigm

    C.1 Concept of Big Data

    C.2 Forensic Applications and Implications

    D. Understand Control Systems

    D.1

    Concept of Control Systems (e.g., SCADA, DCS, Server, Historian, PLC,

    RTU, IED)

    D.2 Where the Evidence may Reside

    D.3 Forensic Implications

    E. Understand Critical Infrastructure

    E.1 Concept of Critical Infrastructure

    E.2 Forensic Implications

    F. Understand Online Gaming and Virtual/Augmented Reality

    F.1 Concepts

    F.2 Forensic Implications

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    21

    Effective Date: September 2013

    REFERENCES

    This reference list is NOT intended to be an all-inclusive collection representing the CCFP Core

    Body of Knowledge (CBK). Its purpose is to provide candidates a starting point for their studies

    in domains which need supplementary learning in order to complement their associated level

    of work and academic experience. Candidates may also consider other references, which are

    not on this list but adequately cover domain content.

    Note: (ISC)2 does not endorse any particular text or author and does not imply that any or all

    references be acquired or consulted. (ISC)2 does not imply nor guarantee that the study of

    these references will result in an examination pass.

    Supplementary Reference

    Android Forensics: Investigation, Analysis, and Mobile Security for Google Android. Syngress.

    Hoog, A. (2011)

    A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert

    Technical Witness. Addison-Wesley Professional. Smith, F., Bace, R. (2002)

    Handbook of Digital Forensics and Investigation. Academic Press. Casey, E. (2009)

    Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity.

    Syngress. Liu, D. (2009)

    Clifford, Ralph D., Cybercrime: The Investigation, Prosecution and Defense of a Computer-

    Related Crime. Ralph D. Clifford, CYBERCRIME: THE INVESTIGATION, PROSECUTION AND

    DEFENSE OF A COMPUTER-RELATED CRIME, Carolina Academic Press, (2011). Available at

    SSRN: http://ssrn.com/abstract=287574

    Computer Evidence: Collection and Preservation, Second Edition. Course Technology PTR.

    Brown, C. (2009)

    Computer Forensics: Incident Response Essentials (1st ed.). Addison-Wesley Professional.

    MA, E. C. B., Kruse II, W., Heiser, J., (2001)

    Cyber Crime Investigations. Syngress. Reyes, A., Brittson, R., OShea, K., Steele, J. (2007)

    Digital Evidence and Computer Crime, Third Edition. Academic Press. Casey, E. (2011)

    Digital Forensics for Legal Professionals. Syngress. Daniel, L., Daniel, L. (2011)

    Digital Forensics with Open Source Tools. Syngress. Altheide, C., Carvey, H. (2011)

    Digital Triage Forensics: Processing the Digital Crime Scene. Syngress. Pearson, S. (2010)

    File System Forensic Analysis (2nd ed.). Addison-Wesley Professional.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    22

    Effective Date: September 2013

    Carrier, B. (2005).

    Forensic Examination of Digital Evidence: A Guide for Law Enforcement. U.S. Department of

    Justice. NIJ Special Report. https://www.ncjrs.gov/pdffiles1/nij/199408.pdf

    Guide to Computer Forensics and Investigations (4th ed.). Course Technology.

    McClure, S., Scambray, J., & Kurtz, G. , Nelson, B., Phillips, A., Steuart, C. (2009)

    Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition (7th ed.). McGraw-

    Hill Osborne Media., McClure, S., Scambray, J., & Kurtz, G. (2012),

    Incident Response & Computer Forensics, Second Edition. McGraw-Hill Osborne Media.

    Mandia, K., Prosise, C., Pepe, M (2003)

    Investigations Involving the Internet and Computer Networks. U.S. Department of Justice. NIJ

    Special Report. https://www.ncjrs.gov/pdffiles1/nij/210798.pdf

    iPhone and iOS Forensics. Syngress. Hoog, A., Strzempka, K. (2011)

    Malware Forensics: Investigating and Analyzing Malicious Code. Syngress. Malin, C., Eoghan,

    C., Aquilina, J. (2008)

    NIST SP 800-86 Guide to Integrating Forensic Techniques into Incident Response.

    http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf

    Principles/Practice Criminalistics Profession Protocols, http://www.amazon.com/Principles-

    Practice-Criminalistics-Profession-Protocols/dp/0849381274

    Scientific Working Group on Digital Evidence.

    https://www.swgde.org/documents/Current%20Documents

    Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal

    Investigations. U.S. Justice Department.

    http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf

    SQL Server Forensic Analysis. Addison-Wesley Professional. Fowler, K. (2008)

    System Forensics, Investigation, and Response. Jones & Bartlett Learning. Vacca, J., Rudolph,

    K. (2010)

    The Basics of Digital Forensics. Sammons, J. Syngress, Sammons, J., (2012)

    Virtualization and Forensics A Digital Forensic Investigators Guide to Virtual Environments.

    Syngress. Barrett, D., Kipper, G. (2010)

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    23

    Effective Date: September 2013

    SAMPLE EXAM QUESTION

    A Cyber Forensic Analyst is collecting evidence for possible use in a criminal case against a

    former employee. The organization has a Virtual Desktop Infrastructure implemented. The

    Analyst must collect all necessary evidence to support the investigation. The Analyst

    understands that he or she must maintain and protect the chain of custody. Next of importance

    to the Analyst is the actual Data Acquisition.

    1. With virtualization, the Analyst needs to acquire which of the following to support the

    investigation?

    (A) The virtual disk, memory files, and metadata files.

    (B) The image of the Operating System.

    (C) Perform a log collection on the suspected system.

    (D) A MD5 hash of the Operating System.

    Answer A

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    24

    Effective Date: September 2013

    GENERAL EXAMINATION INFORMATION

    Computer Based Testing (CBT)

    Registering for the Exam

    Process for Registration Overview

    This section describes procedures for candidates registering to sit for a Computer Based Test

    (CBT). The test is administered at Pearson VUE Testing centers in the US, Canada, and other

    parts of the world.

    1. Go to www.pearsonvue.com/isc2 to register for a test appointment.

    2. Select the most convenient test center

    3. Select an appointment time.

    4. Pay for your exam appointment.

    5. Receive confirmation from Pearson VUE with the appointment details, test center

    location and other relevant instructions, if any.

    Please note that your registration information will be transferred to (ISC) and all

    communication about the testing process from (ISC) and Pearson VUE will be sent to you via

    email.

    Fees

    Please visit the (ISC) website https://www.isc2.org/certification-register-now.aspx for the most

    current examination registration fees.

    U.S. Government Veterans Administration G.I. Bill

    The U.S. Department of Veterans Affairs has approved reimbursement to veterans under the G.I.

    Bill for the cost of the Certified Information System Security Professional (CISSP), the CISSP

    Concentrations (ISSAP, ISSEP, ISSMP), the Certification and Accreditation Professional (CAP), and

    the System Security Certified Practitioner (SSCP) examinations. Please refer to the U.S.

    Department of Veterans Affairs Website at www.va.gov for more details.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    25

    Effective Date: September 2013

    CBT Demonstration

    Candidates can experience a demonstration and tutorial of the CBT experie nce

    on our Pearson VUE web page. The tutorial may be found at

    www.pearsonvue.com/isc2.

    Scheduling a Test Appointment

    Process for Registration Overview

    Candidates may register for a testing appointment directly with Pearson VUE (

    www.pearsonvue.com/isc2 ). Candidates who do not pass the test will be subject to the retake

    policy and must wait the applicable time before they are allowed to re-sit for the examination.

    Exam Appointment

    Test centers may fill up quickly because of high volume and previously scheduled special

    events. Pearson VUE testing centers also serve candidates from other entities; thus waiting to

    schedule the testing appointment may significantly limit the options for candidates desired

    testing dates at the closest center available.

    Scheduling for a Testing Appointment

    Candidates may schedule their appointment online at (ISC) CBT Website located at

    www.pearsonvue.com/isc2. Candidates will be required to create a Pearson VUE account in

    order to complete registration. Candidates profile will be transferred to (ISC) and becomes

    part of the candidates permanent record. Candidates will be able to locate test centers and select from a choice of available examination appointment times at the Pearson VUE website.

    Candidates may also register over the telephone with a CBT registration specialist. Please refer

    to Contact Information for local telephone numbers for your region.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    26

    Effective Date: September 2013

    Rescheduling or Cancellation of a Testing Appointment

    If you wish to reschedule or cancel your exam appointment, you must contact Pearson VUE at

    least 48 hours before the exam date by contacting Pearson VUE online

    (www.pearsonvue.com/isc2), OR at least 24 hours prior to exam appointment time by

    contacting Pearson VUE over the phone. Canceling or rescheduling an exam appointment less

    than 24 hours via phone notification, or less than 48 hours via online notification is subject to a

    forfeit of exam fees. Exam fees are also forfeited for no-shows. Please note that, Pearson VUE

    charges a 50 USD/35 /40 fee for reschedules, and 100 USD/70 /80 fee for cancellations.

    Reschedules and cancellations may be done at the (ISC) CBT Candidate Website

    (www.pearsonvue.com/isc2) or via telephone. Please refer to Contact Information for more information and local telephone numbers for your region.

    Late Arrivals or No Shows

    If the candidate does not arrive within 15 minutes of the scheduled exam starting time, he or

    she has technically forfeited his or her assigned seat.

    If the candidate arrives late (after 15 minutes of his/her scheduled appointment), it is up to the

    discretion of the testing center as to whether or not the candidate may still take the exam. If the

    test administrator at the testing location is able to accommodate a late arriving candidate,

    without affecting subsequent candidates appointments, he/she will let the candidate to sit for the exam and launch his/her exam.

    Any/all attempts are made to accommodate candidates who arrive late. However, if the

    schedule is such that the test center is not able to accommodate a late arrival, the candidate

    will be turned away and his/her exam fees will be forfeited.

    If a candidate fails to appear for a testing appointment, the test result will appear in the system

    as a No-Show and the candidates exam fees will be forfeited.

    Procedure for Requesting Special Accommodations

    Pearson VUE Professional Centers can accommodate a variety of candidates needs, as they are fully compliant with the Americans with Disability Act (ADA), and the equivalent

    requirements in other countries.

    Requests for accommodations should be made to (ISC) in advance of the desired testing

    appointment. Once (ISC) grants the accommodations request, the candidate may schedule

    the testing appointment using Pearson VUEs special accommodations number. From there, a Pearson VUE coordinator will handle all of the arrangements.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    27

    Effective Date: September 2013

    PLEASE NOTE: Candidates that request special accommodations should not schedule their

    appointment online or call the main CBT registration line.

    What to Bring to the Test Center

    Proper Identification

    (ISC) requires two forms of identification, a primary and a secondary, when checking in for a

    CBT test appointment at a Pearson VUE Test Center. All candidate identification documents

    must be valid (not expired) and must be an original document (not a photocopy or a fax).

    Primary IDs: Must contain a permanently affixed photo of the candidate, along with the

    candidates signature.

    Secondary IDs: Must have the candidates signature.

    Accepted Primary ID (photograph and signature, not expired)

    Government issued Drivers License or Identification Card

    U.S. Dept of State Drivers License

    U.S. Learners Permit (card only with photo and signature)

    National/State/Country Identification Card

    Passport

    Passport Cards

    Military ID

    Military ID for spouses and dependents

    Alien Registration Card (Green Card, Permanent Resident Visa)

    Government Issued local language ID (plastic card with photo and signature

    Employee ID

    School ID

    Credit Card* (A credit card can be used as a primary form of ID only if it contains both

    a photo and a signature and is not expired. Any credit card can be used as a

    secondary form of ID, as long as it contains a signature and is not expired. This includes

    major credit cards, such as VISA, MasterCard, American Express and Discover. It also

    includes department store and gasoline credit cards.

    Accepted Secondary ID (contains signature, not expired)

    U.S. Social Security Card

    Debit/(ATM) Card

    Credit Cards

    Any form of ID on the primary list

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    28

    Effective Date: September 2013

    Name Matching Policy

    Candidates first and last name on the presented identification document must exactly match the first and last name on the registration record with Pearson VUE. If the name the candidate

    has registered with does not match the name on the identification document, proof of legal

    name change must be brought to the test center on the day of the test. The only acceptable

    forms of legal documentation are marriage licenses, divorce decrees, or court sanctioned legal

    name change documents. All documents presented at the test center must be original

    documents. If a mistake is made with a name during the application process, candidates

    should contact (ISC) to correct the information well in advance of the actual test date. Name

    changes cannot be made at the test center or on the day of the exam. Candidates who do

    not meet the requirements presented in the name matching policy on the day of the test may

    be subject to forfeiture of testing fees and asked to leave the testing center.

    Examination Agreement and Non-Disclosure Agreement

    All candidates must agree to the terms listed in (ISC)2s Examination Agreement. The

    agreement is located at

    https://www.isc2.org/uploadedfiles/education/cbt%20examination%20agreement.pdf.

    Prior to starting the exam, all candidates are also required to accept the (ISC) non-disclosure

    agreement (NDA), and are required in the computer to accept the agreement prior to being

    presented with exam questions. If the NDA is not accepted by the candidate, or refused to

    accept within the time allotted, the exam will end, and the candidate will be asked to leave

    the test center. No refund of exam fees will be given. For this reason, all candidates are strongly

    encouraged to review the non-disclosure agreement prior to scheduling for, or taking the

    exam. The agreement is located at www.pearsonvue.com/isc2/isc2_nda.pdf.

    Day of the Exam

    Check-In Process

    Plan to arrive at the Pearson VUE testing center at least 30 minutes before the scheduled testing

    time. If you arrive more than 15 minutes late to your scheduled appointment, you may lose your

    examination appointment. For checking-in:

    You will be required to present two acceptable forms of identification.

    You will be asked to provide your signature, submit to a palm vein scan, and have

    your photograph taken. Hats, scarves and coats may not be worn in the testing room,

    or while your photograph is being taken.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    29

    Effective Date: September 2013

    You will be required to leave your personal belongings outside the testing room.

    Secure storage will be provided. Storage space is small, so candidates should plan

    appropriately. Pearson Professional Centers assume no responsibility for candidates personal belongings.

    The Test Administrator (TA) will give you a short orientation, and then will escort you to

    a computer terminal. You must remain in your seat during the examination, except

    when authorized to leave by test center staff. You may not change your computer

    terminal unless a TA directs you to do so.

    Raise your hand to notify the TA if you

    believe you have a problem with your computer. need to change note boards. need to take a break. need the administrator for any reason.

    Breaks

    You will have up to six hours to complete the CISSP, and up to four hours to complete the CSSLP

    and CCFP up to three hours to complete the following examinations:

    SSCP

    CAP

    HCISPP

    ISSAP

    ISSEP

    ISSMP

    Total examination time includes any unscheduled breaks you may take. All breaks count

    against your testing time. You must leave the testing room during your break, but you may not

    leave the building or access any personal belongings unless absolutely necessary (e.g. for

    retrieving medication). Additionally, when you take a break, you will be required to submit to a

    palm vein scan before and after your break.

    Examination Format and Scoring

    The CISSP examination consists of 250 multiple choice questions with four (4) choices

    each.

    The CSSLP examination consists of 175 multiple choice questions with four (4) choices

    each.

    The HCISPP examination contains 125 multiple choice questions with four (4) choices

    each.

    The CCFP examination contains 125 multiple choice questions with four (4) choices each.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    30

    Effective Date: September 2013

    The SSCP examination contains 125 multiple choice questions with four (4) choices

    each.

    The ISSAP, ISSEP, and ISSMP concentration examinations contain 125, 150, 125

    multiple choice questions respectively with four (4) choices each.

    The Certified Authorization Professional (CAP) examination contains 125 multiple choice

    questions with four (4) choices each. Also, administered in computers.

    There may be scenario-based items which may have more than one multiple choice

    question associated with it. These items will be specifically identified in the test booklet.

    Each of these exams contains 25 questions which are included for research purposes only.

    The research questions are not identified; therefore, answer all questions to the best of your

    ability. There is no penalty for guessing, so candidates should not leave any item unanswered.

    Examination results will be based only on the scored questions on the examination. There

    are several versions of the examination. It is important that each candidate have an

    equal opportunity to pass the examination, no matter which version is administered. Subject

    Matter Experts (SMEs) have provided input as to the difficulty level of all questions used in the

    examinations. That information is used to develop examination forms that have comparable

    difficulty levels. When there are differences in the examination difficulty, a mathematical

    procedure called equating is used to make the difficulty level of each test form equal.

    Because the number of questions required to pass the examination may be different for each

    version, the scores are converted onto a reporting scale to ensure a common standard. The

    passing grade required is a scale score of 700 out of a possible 1000 points on the grading

    scale.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    31

    Effective Date: September 2013

    Technical Issues

    On rare occasions, technical problems may require rescheduling of a candidates examination. If circumstances arise causing you to wait more than 30 minutes after your scheduled

    appointment time, or a restart delay lasts longer than 30 minutes, you will be given the choice

    of continuing to wait, or rescheduling your appointment without an additional fee.

    If you choose to wait, but later change your mind at any time prior to beginning or restarting the examination, you will be allowed to take exam at a later date, at

    no additional cost.

    If you choose not to reschedule, but rather test after a delay, you will have no further recourse, and your test results will be considered valid.

    If you choose to reschedule your appointment, or the problem causing the delay cannot be resolved, you will be allowed to test at a later date at no additional

    charge. Every attempt will be made to contact candidates if technical problems

    are identified prior to a scheduled appointment.

    Testing Environment

    Pearson Professional Centers administer many types of examinations including some that

    require written responses (essay-type). Pearson Professional Centers have no control over typing

    noises made by candidates sitting next to you while writing their examination. Typing noise is

    considered a normal part of the computerized testing environment, just as the noise of turning

    pages is a normal part of the paper-and pencil testing environment. Earplugs are available

    upon request.

    When the Exam is Finished

    After you have finished the examination, raise your hand to summon the TA. The TA will collect

    and inventory all note boards. The TA will dismiss you when all requirements are fulfilled.

    If you believe there was an irregularity in the administration of your test, or the associated test

    conditions adversely affected the outcome of your examination, you should notify the TA

    before you leave the test center.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    32

    Effective Date: September 2013

    Results Reporting

    Candidates will receive their unofficial test result at the test center. The results will be handed

    out by the Test Administrator during the checkout process. (ISC) will then follow up with an

    official result via email. All test results are subject to (ISC)s psychometric and forensic evaluation. Based on the number of tests administered, this evaluation may be conducted

    after candidates receive the official results email. Any candidate whose score is affected by

    the psychometric and forensic evaluation will be notified by (ISC).

    In some instances, real time results may not be available. A comprehensive statistical and

    psychometric analysis of the score data is conducted during every testing cycle before scores

    are released. A minimum number of candidates are required to take the exam before this

    analysis can be completed. Depending upon the volume of test takers for a given cycle, there

    may be occasions when scores are delayed for approximately 6-8 weeks in order to complete

    this critical process. Results WILL NOT be released over the phone. They will be sent via email

    from (ISC) as soon as the scores are finalized. If you have any questions regarding this policy,

    you should contact (ISC) prior to your examination.

    Exam Irregularities and Test Invalidation

    (ISC)2 exams are intended to be delivered under standardized conditions. If any irregularity or

    fraud is encountered before, during, or after the administration of the exam, (ISC)2 will examine

    the situation and determine whether action is warranted. If (ISC)2 determines that any testing

    irregularity or fraud has occurred, it may choose not to score the answer documents of the

    affected test taker(s), or it may choose to cancel the scores of the affected test taker(s).

    (ISC)2 may at its sole discretion revoke any and all certifications a candidate may have earned

    and ban the candidate from earning future (ISC)2 certifications, and decline to score or cancel

    any Exam under any of the circumstances listed in the (ISC)2 Examination Agreement.

    Please refer to the (ISC)2 Examination Agreement for further details

    (https://www.isc2.org/uploadedfiles/education/cbt%20examination%20agreement.pdf).

    Retake Policy

    Test takers who do not pass the exam the first time will be able to retest after 90 days. Test

    takers that fail a second time will need to wait 90 days prior to sitting for the exam again. In the

    unfortunate event that a candidate fails a third time, the next available time to sit for the exam

    will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)

    exams a maximum of 3 times within a calendar year.

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    33

    Effective Date: September 2013

    Recertification by Examination

    Candidates and members may recertify by examination for the following reasons ONLY;

    The candidate has become decertified due to reaching the expiration of the time limit

    for endorsement.

    The member has become decertified for not meeting the number of required continuing

    professional education credits.

    Logo Usage Guidelines

    (ISC) is a non-profit membership organization identified as the leader in certifying individuals in

    information security.

    Candidates who successfully complete any of the (ISC) certification requirements may use the

    appropriate Certification Mark or the Collective Mark, where appropriate, and the logo

    containing the Certification Mark or the Collective Mark, where appropriate (the Logo) to

    identify themselves as having demonstrated the professional experience and requisite

    knowledge in the realm of information system security. Please visit the following link (URL) for

    more information on logo use:

    https://www.isc2.org/uploadedfiles/(ISC)2_Public_Content/Legal _and _Policies/LogoGuidleines.pdf

    Any questions?

    (ISC)2

    Candidate Services

    311 Park Place Blvd, Suite 400

    Clearwater, FL 33759

    Phone: 1.866.331.ISC2 (4722) in the United States

    1.727.785.0189 all others

    Fax: 1.727.683.0785

  • 2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 8.18.15, V17

    34

    Effective Date: September 2013

    Impartiality StatementNon-Discrimination PolicyDomain 1: Legal and Ethical PrinciplesKey Areas of Knowledge

    Domain 2: InvestigationsOverviewKey Areas of Knowledge

    Domain 3: Forensic ScienceOverviewKey Areas of Knowledge

    Domain 4: Digital ForensicsOverviewKey Areas of Knowledge

    Domain 5: Application ForensicsOverviewKey Areas of Knowledge

    Domain 6: Hybrid and Emerging TechnologiesOverviewKey Areas of Knowledge

    REFERENCESSAMPLE EXAM QUESTIONGENERAL EXAMINATION INFORMATIONComputer Based Testing (CBT)Registering for the ExamScheduling a Test AppointmentDay of the ExamAny questions?


Recommended