CCFP Exam Outline
CCFP Exam Outline
CCFP Exam Outline
September 2013
Impartiality Statement
(ISC) is committed to impartiality by promoting a bias and discrimination free
environment for all members, candidates, staff, volunteers, subcontractors, vendors,
and clients. (ISC)s board of directors, management and staff understand the
importance of impartiality in carrying out its certification activities, manage conflict of
interest and ensure the objectivity of its certification. If you feel you have not received
impartial treatment, please send an email to notice@isc2.org or call +1.727.785.0189, so
that we can investigate your claim.
Non-Discrimination Policy
(ISC) is an equal opportunity employer and does not allow, condone or support discrimination
of any type within its organization including, but not limited to, its activities, programs, practices,
procedures, or vendor relationships. This policy applies to (ISC) employees, members,
candidates, and supporters.
Whether participating in an (ISC) official event or certification examination as an employee,
candidate, member, staff, volunteer, subcontractor, vendor, or client if you feel you have been
discriminated against based on nationality, religion, sexual orientation, race, gender, disability,
age, marital status or military status, please send an email to notice@isc2.org or call
+1.727.785.0189, so that we can investigate your claim.
For any questions related to these polices, please contact the (ISC) Legal Department
at legal@isc2.org.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Before candidates are allowed to take the test at testing centers, they must respond
Yes or No to the following four questions regarding criminal history and related
background:
1. Have you ever been convicted of a felony; a misdemeanor involving a
computer crime, dishonesty, or repeat offenses; or a Court Martial in military
service, or is there a felony charge, indictment, or information now pending
against you? (Omit minor traffic violations and offenses prosecuted in juvenile
court).
2. Have you ever had a professional license, certification, membership or
registration revoked, or have you ever been censured or disciplined by any
professional organization or government agency?
3. Have you ever been involved, or publicly identified, with criminal hackers
or hacking?
4. Have you ever been known by any other name, alias, or pseudonym? (You
need not include user identities or screen names with which you were publicly
identified).
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Authority to Acquire
Provenance
Reliability/Credibility/Validity
Admissibility
Fragility
Authentication
B.3
Exchange
B.4
Storage
B.5
Disposition/Destruction
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Professional Ethics
(ISC)2 Code of Ethics
AAFS Code of Ethics
ISO Code of Ethics
Privacy and Confidentiality Issues
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Domain 2: Investigations
Overview
The candidate is expected to demonstrate an understanding of Investigations as it relates to
data communications in local area and wide area networks, remote access,
internet/intranet/extranet configurations. Candidates should be knowledgeable with network
equipment such as switches, bridges and routers, as well as networking protocols (e.g., TCP/IP,
IPSec), and VPNs.
A.2
A.3
Evidence Collection
A.4
Evidence Transport
A.5
A.6
Elements of Crime/Allegation
A.7
Chain of Evidence
A.8
Evidence Tracking
B.3
B.4
Evidence Disposition
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Violations
C.3
Elements of a Crime
C.4
Exculpatory Evidence
C.5
Burden of Proof
D.2
D.3
Nature of Litigants
D.4
Burden of Proof
E.2
Nature of Parties
E.3
Burden of Proof
E.4
Liability
F.2
Business Continuity
F.3
Liability
F.4
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Definition of Discovery
G.2
Spoliation
G.3
Scope of Discovery
G.4
G.5
E-Discovery Steps
G.6
Liability
H.2
Investigation Steps
H.3
H.4
Liability
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
8.18.15, V17
Individualization/Classification
Association
Reconstruction
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
10
8.18.15, V17
B. 5
Examination/Investigation Goals
Hypothesis Formulation/Criteria
Experimental Design and Tool Selection
Examination Plan Execution
Results Review and Evaluation
Conclusions and Opinions Formulation
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
11
8.18.15, V17
E.3
E.4
E.5
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
12
8.18.15, V17
Storage Media (e.g., Flash Memory, Cards, CDs/DVDs, Drives, Disk Images)
A.3
Hardware/Firmware/Interfaces
A.4
A.5
A.6
A.7
Encrypted Drives
A.8
Corrupted/Damaged Media
A.9
Configuration/Control/Registry/Device Drivers
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
13
8.18.15, V17
B.4
B.5
C.2
C.3
C.4
Network Shares
C.5
Network Services
C.6
Log Files
C.7
D.3
D.4
D.5
D.6
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
14
8.18.15, V17
Types of Data
E.3
F.3
F.4
G.3
G.4
Data Recovery
H.3
Password Recovery
H.4
File Carving
H.5
Metadata Carving
H.6
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
15
8.18.15, V17
H.8
Header Analysis
H.9
Timeline Analysis
H.10
H.11
Event Correlation
H.12
Cryptanalysis/Steganalysis
H.13
Sandboxing
H.14
Network Sniffing
H.15
H.16
H.17
Data Mining
H.18
Evidence Visualization
I.3
Protection/Logging Disabling
I.4
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
16
8.18.15, V17
A.3
A.4
B.2
B.3
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
17
8.18.15, V17
Malware Behavior
Malware Impact on Investigations
Malware Analysis Techniques (e.g., Static Analysis and Dynamic
Analysis)
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
18
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
19
8.18.15, V17
Forensic Implications
Forensic Implications
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
20
8.18.15, V17
REFERENCES
This reference list is NOT intended to be an all-inclusive collection representing the CCFP Core
Body of Knowledge (CBK). Its purpose is to provide candidates a starting point for their studies
in domains which need supplementary learning in order to complement their associated level
of work and academic experience. Candidates may also consider other references, which are
not on this list but adequately cover domain content.
Note: (ISC)2 does not endorse any particular text or author and does not imply that any or all
references be acquired or consulted. (ISC)2 does not imply nor guarantee that the study of
these references will result in an examination pass.
Supplementary Reference
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android. Syngress.
Hoog, A. (2011)
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert
Technical Witness. Addison-Wesley Professional. Smith, F., Bace, R. (2002)
Handbook of Digital Forensics and Investigation. Academic Press. Casey, E. (2009)
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity.
Syngress. Liu, D. (2009)
Clifford, Ralph D., Cybercrime: The Investigation, Prosecution and Defense of a ComputerRelated Crime. Ralph D. Clifford, CYBERCRIME: THE INVESTIGATION, PROSECUTION AND
DEFENSE OF A COMPUTER-RELATED CRIME, Carolina Academic Press, (2011). Available at
SSRN: http://ssrn.com/abstract=287574
Computer Evidence: Collection and Preservation, Second Edition. Course Technology PTR.
Brown, C. (2009)
Computer Forensics: Incident Response Essentials (1st ed.). Addison-Wesley Professional.
MA, E. C. B., Kruse II, W., Heiser, J., (2001)
Cyber Crime Investigations. Syngress. Reyes, A., Brittson, R., OShea, K., Steele, J. (2007)
Digital Evidence and Computer Crime, Third Edition. Academic Press. Casey, E. (2011)
Digital Forensics for Legal Professionals. Syngress. Daniel, L., Daniel, L. (2011)
Digital Forensics with Open Source Tools. Syngress. Altheide, C., Carvey, H. (2011)
Digital Triage Forensics: Processing the Digital Crime Scene. Syngress. Pearson, S. (2010)
File System Forensic Analysis (2nd ed.). Addison-Wesley Professional.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
21
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
22
8.18.15, V17
1.
With virtualization, the Analyst needs to acquire which of the following to support the
investigation?
(A)
(B)
(C)
(D)
Answer A
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
23
8.18.15, V17
Fees
Please visit the (ISC) website https://www.isc2.org/certification-register-now.aspx for the most
current examination registration fees.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
24
8.18.15, V17
CBT Demonstration
Candidates can experience a demonstration and tutorial of the CBT experie nce
on our Pearson VUE web page. The tutorial may be found at
www.pearsonvue.com/isc2 .
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
25
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
26
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
27
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
28
8.18.15, V17
You will be required to leave your personal belongings outside the testing room.
Secure storage will be provided. Storage space is small, so candidates should plan
appropriately. Pearson Professional Centers assume no responsibility for candidates
personal belongings.
The Test Administrator (TA) will give you a short orientation, and then will escort you to
a computer terminal. You must remain in your seat during the examination, except
when authorized to leave by test center staff. You may not change your computer
terminal unless a TA directs you to do so.
Breaks
You will have up to six hours to complete the CISSP, and up to four hours to complete the CSSLP
and CCFP up to three hours to complete the following examinations:
SSCP
CAP
HCISPP
ISSAP
ISSEP
ISSMP
Total examination time includes any unscheduled breaks you may take. All breaks count
against your testing time. You must leave the testing room during your break, but you may not
leave the building or access any personal belongings unless absolutely necessary (e.g. for
retrieving medication). Additionally, when you take a break, you will be required to submit to a
palm vein scan before and after your break.
The CISSP examination consists of 250 multiple choice questions with four (4) choices
each.
The CSSLP examination consists of 175 multiple choice questions with four (4) choices
each.
The HCISPP examination contains 125 multiple choice questions with four (4) choices
each.
The CCFP examination contains 125 multiple choice questions with four (4) choices each.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
29
8.18.15, V17
The SSCP examination contains 125 multiple choice questions with four (4) choices
each.
The ISSAP, ISSEP, and ISSMP concentration examinations contain 125, 150, 125
multiple choice questions respectively with four (4) choices each.
The Certified Authorization Professional (CAP) examination contains 125 multiple choice
questions with four (4) choices each. Also, administered in computers.
There may be scenario-based items which may have more than one multiple choice
question associated with it. These items will be specifically identified in the test booklet.
Each of these exams contains 25 questions which are included for research purposes only.
The research questions are not identified; therefore, answer all questions to the best of your
ability. There is no penalty for guessing, so candidates should not leave any item unanswered.
Examination results will be based only on the scored questions on the examination. There
are several versions of the examination. It is important that each candidate have an
equal opportunity to pass the examination, no matter which version is administered. Subject
Matter Experts (SMEs) have provided input as to the difficulty level of all questions used in the
examinations. That information is used to develop examination forms that have comparable
difficulty levels. When there are differences in the examination difficulty, a mathematical
procedure called equating is used to make the difficulty level of each test form equal.
Because the number of questions required to pass the examination may be different for each
version, the scores are converted onto a reporting scale to ensure a common standard. The
passing grade required is a scale score of 700 out of a possible 1000 points on the grading
scale.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
30
8.18.15, V17
Technical Issues
On rare occasions, technical problems may require rescheduling of a candidates examination.
If circumstances arise causing you to wait more than 30 minutes after your scheduled
appointment time, or a restart delay lasts longer than 30 minutes, you will be given the choice
of continuing to wait, or rescheduling your appointment without an additional fee.
If you choose to wait, but later change your mind at any time prior to beginning or
restarting the examination, you will be allowed to take exam at a later date, at
no additional cost.
If you choose not to reschedule, but rather test after a delay, you will have no
further recourse, and your test results will be considered valid.
If you choose to reschedule your appointment, or the problem causing the delay
cannot be resolved, you will be allowed to test at a later date at no additional
charge. Every attempt will be made to contact candidates if technical problems
are identified prior to a scheduled appointment.
Testing Environment
Pearson Professional Centers administer many types of examinations including some that
require written responses (essay-type). Pearson Professional Centers have no control over typing
noises made by candidates sitting next to you while writing their examination. Typing noise is
considered a normal part of the computerized testing environment, just as the noise of turning
pages is a normal part of the paper-and pencil testing environment. Earplugs are available
upon request.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
31
8.18.15, V17
Results Reporting
Candidates will receive their unofficial test result at the test center. The results will be handed
out by the Test Administrator during the checkout process. (ISC) will then follow up with an
official result via email. All test results are subject to (ISC)s psychometric and forensic
evaluation. Based on the number of tests administered, this evaluation may be conducted
after candidates receive the official results email. Any candidate whose score is affected by
the psychometric and forensic evaluation will be notified by (ISC).
In some instances, real time results may not be available. A comprehensive statistical and
psychometric analysis of the score data is conducted during every testing cycle before scores
are released. A minimum number of candidates are required to take the exam before this
analysis can be completed. Depending upon the volume of test takers for a given cycle, there
may be occasions when scores are delayed for approximately 6-8 weeks in order to complete
this critical process. Results WILL NOT be released over the phone. They will be sent via email
from (ISC) as soon as the scores are finalized. If you have any questions regarding this policy,
you should contact (ISC) prior to your examination.
Retake Policy
Test takers who do not pass the exam the first time will be able to retest after 90 days. Test
takers that fail a second time will need to wait 90 days prior to sitting for the exam again. In the
unfortunate event that a candidate fails a third time, the next available time to sit for the exam
will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)
exams a maximum of 3 times within a calendar year.
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
32
8.18.15, V17
Recertification by Examination
Candidates and members may recertify by examination for the following reasons ONLY;
The candidate has become decertified due to reaching the expiration of the time limit
for endorsement.
The member has become decertified for not meeting the number of required continuing
professional education credits.
Any questions?
(ISC)2 Candidate Services
311 Park Place Blvd, Suite 400
Clearwater, FL 33759
Phone: 1.866.331.ISC2 (4722) in the United States
1.727.785.0189 all others
Fax: 1.727.683.0785
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
33
8.18.15, V17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited.
34
8.18.15, V17