1. Home
  2. Eccouncil
  3. 112-57 DFE Exam Syllabus

Eccouncil 112-57 Exam Syllabus

Start Free 112-57 Exam Practice After Reviewing the Topics

Before starting your 112-57 exam preparation, it is recommended to review the complete Eccouncil EC-Council Digital Forensics Essentials exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free 112-57 questions. We also provide premium 112-57 practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

Eccouncil 112-57 Exam Objectives

Section Objectives
Computer Forensics Fundamentals
  • Fundamentals of Computer Forensics
  • Digital Evidence
  • Forensic Readiness
  • Roles and Responsibilities of a Forensic Investigator
  • Legal Compliance in Computer Forensics
Computer Forensics Investigation Process
  • Forensic Investigation Process and its Importance
  • Forensic Investigation Process – Pre Investigation Phase
  • Forensic Investigation Process – Investigation Phase
  • Forensic Investigation Process – Post Investigation Phase
Labs:
  • Performing Hash or HMAC Calculations
  • Comparing Hash Values of Files to Check Their Integrity or Viewing Files of Various Formats
  • Creating a Disk Image File of a Hard Disk Partition
Understanding Hard Disks and File Systems
  • Different Types of Disk Drives and Their Characteristics
  • Logical Structure of a Disk
  • Booting Process of Windows, Linux, and Mac Operating Systems
  • File Systems of Windows, Linux, and Mac Operating Systems
  • File System Examination
Labs:
  • Analyzing File System of a Linux Image
  • Recovering Deleted Files from Hard Disks
Data Acquisition and Duplication
  • Data Acquisition Fundamentals
  • Types of Data Acquisition
  • Data Acquisition Format
  • Data Acquisition Methodology
Labs:
  • Creating a dd Image of a System Drive
  • Converting Acquired Image File to a Bootable Virtual Machine
  • Acquiring RAM from Windows Workstations
  • Viewing Contents of Forensic Image File
Defeating Anti-forensics Techniques
  • Anti-forensics and its Techniques
  • Anti-forensics Countermeasures
Labs:
  • SSD File Carving on a Windows File System
  • Recovering Data from Lost / Deleted Disk Partition
  • Cracking Application Passwords
  • Detecting Steganography
Windows Forensics
  • Volatile and Non-Volatile Information
  • Windows Memory and Registry Analysis
  • Cache, Cookie, and History Recorded in Web Browsers
  • Windows Files and Metadata
Labs:
  • Acquiring Volatile Information from a Live Windows System
  • Investigating Forensic Image of Windows RAM
  • Examining Web Browser Artifacts
  • Extracting Information about Loaded Processes on a Computer
Linux and Mac Forensics
  • Volatile and Non-Volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Memory Forensics
  • Mac Forensics
Labs:
  • Forensic Investigation on a Linux Memory Dump
  • Recovering Data from a Linux Memory Dump
Network Forensics
  • Network Forensics Fundamentals
  • Event Correlation Concepts and Types
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic
Labs:
  • Identifying and Investigating Various Network Attacks using Wireshark
Investigating Web Attacks
  • Web Application Forensics
  • IIS and Apache Web Server Logs
  • Investigating Web Attacks on Windows-based Servers
  • Detect and Investigate Attacks on Web Applications
Labs:
  • Identifying and Investigating Web Application Attacks Using Splunk
Dark Web Forensics
  • Dark Web
  • Dark Web Forensics
  • Tor Browser Forensics
Labs:
  • Detecting TOR Browser on a Machine
  • Analyzing RAM Dumps to Retrieve TOR Browser Artifacts
Investigating Email Crimes
  • Email Basics
  • Email Crime Investigation and its Steps
Lab:
  • Investigating a Suspicious Email
Malware Forensics
  • Malware, its Components, and Distribution Methods
  • Malware Forensics Fundamentals and Recognizing Types of Malware Analysis
  • Static Malware Analysis
  • Analyze Suspicious Word Documents
  • Dynamic Malware Analysis
  • System Behavior Analysis
  • Network Behavior Analysis
Lab Exercise:
  • Performing Static Analysis on a Suspicious File
  • Forensic Examination of a Suspicious Microsoft Office Document
  • Performing System Behavior Analysis
Official Information https://www.eccouncil.org/train-certify/digital-forensics-essentials-dfe/