Certified Forensic Analyst (CFA)

Certification Overview

Certified Forensic Analyst (CFA)

Exam Code: CFA-001

The career of computer forensic analyst comes with many titles such as, digital forensic examiner, forensic computer examiner, forensic computer analyst and computer forensic detective. Regardless of title, these forensic professionals are in charge of proper handling of all digital media involved in criminal cases.

The Certified Forensic Analyst (CFA) is for professionals working in the information security, computer forensics, and incident response fields.

The certification focuses on core skills required to collect and analyze data from Windows and Linux computer systems. 

Another option for a career as a computer forensic analyst is within the business sector and involves finance management, economics and market analysis. Day-to-Day Job Duties of a Computer Forensic Analyst The job duties of a computer forensic analyst will vary, depending on the area chosen to work in. Most often, a computer forensic analyst will find their job requirements to include recovering deleted emails, recovering data that has been deleted or encrypted, and uncovering passwords. The data that is recovered through these techniques will then be used by law enforcement officials to help with ongoing investigations. Depending on the type of evidence that is recovered, the data may also be used as evidence in court. Career Opportunities There are a number of options available for computer forensic analysts. Large companies employ many computer forensic analysts in order to keep their computer files secure. Law enforcement jobs for computer forensic analysts involve working directly with police officers and detectives to help solve cyber crimes. Many people choose to work as a consult

The GAQM certifies that candidates have the knowledge, skills, and ability to conduct formal incident investigations and handle advanced incident handling scenarios, including internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers, and complex digital forensic cases.


The Life of a Computer Forensic Analyst


The career of computer forensic analyst comes with many titles such as, digital forensic examiner, forensic computer examiner, forensic computer analyst and computer forensic detective. Regardless of title, these professionals are in charge of the proper handling of all digital media involved in criminal cases. Another option for a career as a computer forensic analyst is within the business sector and involves finance management, economics and market analysis.


Day-to-Day Job Duties of a Computer Forensic Analyst


The job duties of a computer forensic analyst will vary, depending on the area chosen to work in. Most often, a computer forensic analyst will find their job requirements to include recovering deleted emails, recovering data that has been deleted or encrypted, and uncovering passwords. The data that is recovered through these techniques will then be used by law enforcement officials to help with ongoing investigations. Depending on the type of evidence that is recovered, the data may also be used as evidence in court.


Career Opportunities


There are a number of options available for computer forensic analysts. Large companies employ many computer forensic analysts in order to keep their computer files secure. Law enforcement jobs for computer forensic analysts involve working directly with police officers and detectives to help solve cyber crimes. Many people choose to work as a consultant and bill different agencies for the time spent on each specific problem they are employed to solve.

Salary Outlook

Salaries vary greatly based on position. The average salary for a computer forensic professional is $36,640 per year, according to the United States Bureau of Statistics. Those working in the private sector tend to earn a higher salary than those individuals working in the public sector. Although those choosing to work in the public sector usually find a set pay scale along with excellent benefits.

The work of a computer forensic analyst used to be done by police officers. However, with the increased use of technology there has become need for people specifically trained in the area of computer forensics.

Exam Information

The exam comprises of 40 Multiple Choice Questions out of which the candidate needs to score 70% (28 out of 40 correct) to pass the exam.

Open Book Exam

  • The Exam can be taken anywhere and anytime, you only need an Internet Connectivity and a Browser
  • An "open book exam" is a test that allows you to bring the text or material you have been studying..

The total duration of the exam is 1 hour (60 Minutes).

N/A

  • In the event that you do not qualify in the first attempt, there is an option to acquire a Double Shot Retake Voucher for 140 USD. This voucher provides the opportunity for two (2) attempts, instead of a single attempt.
  • To purchase the Double Shot Retake Voucher, kindly visit our Voucher Store

The Certified Forensic Analyst (CFA)™ Certificate is valid for life

CFA™ is a Trademark of GAQM.

Note: The Certified Forensic Analyst (CFA)™  Certification has no pre-requisites (Completion of an E-Course is not mandatory from GAQMBok portal), but we highly recommend doing the E-Course as maximum number of questions are drawn from the E-Course in the actual exam.

Course Outline

Module Information - 1

  • Module 1 - The Goal of the Forensic Investigation
  • Module 2 - How to Begin a Non−Liturgical Forensic Examination
  • Module 3 - The Liturgical Forensic Examination:Tracing Activity on a Windows−Based Desktop
  • Module 4 - Basics of Internet Abuse
  • Module 5 - Tools of the Trade
  • Module 6 - Network Intrusion Management and Profiling
  • Module 7 - Cyber Forensics and the Legal System

Module Information - 2

  • Module 8 - Federal and International Guidelines
  • Module 9 - Searching and Seizing Computers
  • Module 10 - Computer Crime Policy and Programs
  • Module 11 - International Aspects of Computer Crime
  • Module 12 - Privacy Issues in the High−Tech Context
  • Module 13 - Critical Infrastructure Protection
  • Module 14 - Electronic Commerce: Legal Issues

Module Information - 3

  • Module 15 - Legal Considerations
  • Module 16 - Encryption
  • Module 17 - Intellectual Property
  • Module 18 - Forensics Tools
  • Module 19 - Forensic and Security Assessment Tools
  • Module 20 - How to Report Internet−Related Crime
  • Module 21 - Internet Security

Target Audience

  • Law enforcement officials (primarily at the Federal and State levels;
  • Department of Defense officials;
  • High level E-Commerce Security professionals;
  • Network System Administrators;
  • Financial Audit professionals;
  • Seasoned IT Managers

Registration Process for E-Course and Exam

Premium Package
(E-Book Version)

  • E-Book Included
  • The Package also includes E-Voucher/Access Key for Certification Exam
  • The E-Voucher/Access Key can be used via ProctorU Globally.
  • Includes E-certificate and Digital Badge if you qualify in the exam.
  • Course Duration: 40 Days
  • Price: 185 USD

Exam
Voucher

  • Validity: 240 Days
  • Price: 170 USD
  • Please Read Carefully:

    1) Please Purchase the Second Voucher from our Voucher Store to Schedule the exam via ProctorU.

    2) You will receive an ebook to your E-Mail within 24 hours once you purchase the Exam Voucher.

Visit E-Voucher Store

Exam Registration

  • To Register for an Exam
Click Here