img

Certified Forensic Analyst (CFA)


Course Description:

The role of a computer forensic analyst, also known as digital forensic examiner or forensic computer analyst, involves handling digital media in criminal cases. They recover deleted data, analyze it for investigations, and may testify in court. The Certified Forensic Analyst (CFA) certification from GIPMC focuses on skills needed for data analysis from Windows and Linux systems. Computer forensic analysts work in various sectors, including law enforcement and business, where they may recover deleted emails, encrypted data, or passwords for investigations. They can also work as consultants, solving specific problems for different agencies. Salaries for computer forensic professionals vary, with an average of $36,640 per year according to the United States Bureau of Statistics. Those in the private sector typically earn more than those in the public sector, although public sector jobs often come with set pay scales and benefits. As technology use increases, there is a growing dema


$ 800.00 $ 585.00

Browse Certifications Info

Certification Overview

The role of a computer forensic analyst, also known as digital forensic examiner or forensic computer analyst, involves handling digital media in criminal cases. They recover deleted data, analyze it for investigations, and may testify in court. The Certified Forensic Analyst (CFA) certification from GIPMC focuses on skills needed for data analysis from Windows and Linux systems. Computer forensic analysts work in various sectors, including law enforcement and business, where they may recover deleted emails, encrypted data, or passwords for investigations. They can also work as consultants, solving specific problems for different agencies. Salaries for computer forensic professionals vary, with an average of $36,640 per year according to the United States Bureau of Statistics. Those in the private sector typically earn more than those in the public sector, although public sector jobs often come with set pay scales and benefits. As technology use increases, there is a growing demand for trained computer forensic analysts to handle digital evidence.

E-Course Duration:

Exam Information

  • The test has 40 questions with multiple choice answers. To pass, you need to get at least 28 questions correct out of 40.

  • This test is open book, so you can use your study materials during it. You can take the test whenever and wherever you want, as long as you have internet and a web browser.

  • The exam lasts for 1 hour, which is the same as 60 minutes.

  • N/A

 

If you don't pass the exam on your second try, you need to wait for at least fourteen (14) days before you can take it again for the third (3rd) time or any time after that. You can retake the exam as many times as you need.

  • The Certified Forensic Analyst (CFA)™ credential lasts forever.

  • CFA™ is a Trademark of GIPMC.

  • N/A

  • Note: The Certified Forensic Analyst (CFA)™ Certification doesn't require any prerequisites (Taking an E-Course from GIPMCBok portal isn't mandatory), but we strongly suggest completing the E-Course because most questions in the actual exam are based on it.

Course Outline

Module Information - 1

    • Module 1 - The Goal of the Forensic Investigation
    • Module 2 - How to Begin a Non−Liturgical Forensic Examination
    • Module 3 - The Liturgical Forensic Examination:Tracing Activity on a Windows−Based Desktop
    • Module 4 - Basics of Internet Abuse
    • Module 5 - Tools of the Trade
    • Module 6 - Network Intrusion Management and Profiling
    • Module 7 - Cyber Forensics and the Legal System

Module Information - 2

    • Module 8 - Federal and International Guidelines
    • Module 9 - Searching and Seizing Computers
    • Module 10 - Computer Crime Policy and Programs
    • Module 11 - International Aspects of Computer Crime
    • Module 12 - Privacy Issues in the High−Tech Context
    • Module 13 - Critical Infrastructure Protection
    • Module 14 - Electronic Commerce: Legal Issues

Module Information - 3

    • Module 15 - Legal Considerations
    • Module 16 - Encryption
    • Module 17 - Intellectual Property
    • Module 18 - Forensics Tools
    • Module 19 - Forensic and Security Assessment Tools
    • Module 20 - How to Report Internet−Related Crime
    • Module 21 - Internet Security

Target Audience

  • Law enforcement officials (primarily at the Federal and State levels;
  • Department of Defense officials;
  • High level E-Commerce Security professionals;
  • Network System Administrators;
  • Financial Audit professionals;
  • Seasoned IT Managers
Subscribe

Join Our Newsletter Now

Subscribe to GIPMC mailing list to receive update on new Certifications, Special Offers and Discount Information.