The 312-49 test measures an individual’s ability to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Before taking the 312-49 test, you should practice the following:

  1. Understand Internet laws of different countries.
  2. Review first responder procedure and CSIRT.
  3. Know the functions of file system, hard disk, and digital media devices.
  4. Understand Windows, Linux and Macintosh boot process.
  5. Practice Windows forensic tools.
  6. Identify commands and different kits of Linux forensics.
  7. Identify software and hardware tools for data acquisition and duplication.
  8. Identify partition recovery tools and methods.
  9. Understand different attacks and tools of steganography.
  10. Know about the password cracking tools and attacks.
  11. Understand wireless and Web attacks.
  12. Continue reading

Q. What is the Computer Hacking Forensic Investigator (CHFI) 312-49 exam?
A. The Computer Hacking Forensic Investigator (CHFI) 312-49 exam recognizes knowledge and skills of a candidate to identify, track, and prosecute the cyber-criminals. It also recognizes the knowledge of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. It deals with the various possible applications and methods of cyber crime. The computer hacking forensic investigator exam give knowledge about preparation and application of forensic methods in electronic media.

Q. What are the prerequisites for the Hacking Forensic Investigator (CHFI) 312-49 exam?
A. There are no prerequisites for writing the Hacking Forensic Investigator (CHFI) 312-49 exam, although it is recommended that candidate take CEH Exam before enrolling into CHFI program. However it is not mandatory to pass CEH exam before applying for CHFI exam.
Continue reading

Q. What is the 312-50 CEH-v6 exam?

A. EC-Council Certified Ethical Hacking test is designed to measure your level of knowledge and hack skill based on Ethical Hacking Concept. The EC-Council Certified Ethical Hacking exam covers the hacking concepts such as hacking fundamentals, footprinting, scanning, enumeration, Google hacking, System Hacking, Linux System Security, Trojans, Backdoors, virus, worms, Sniffers, IDS, Firewalls, Honeypots, session hijacking, Web server hacking, Wireless hacking, Cryptography, Database Hacking, physical security, and social engineering attacks.

Q. What are the prerequisites for the 312-50 CEH-v6 exam?

A. There are two eligibility criteria for appearing in this exam:

  • Candidate has attended training for the CEH course at any EC-Council authorized training center.
  • OR

  • If the candidate chooses self study, he must have at least two years of information security related experience.

Continue reading

EC-Council has specified more than 80 objectives for the CEH-v6 certification exam, which are grouped under 26 modules. Following are some important areas in which an individual should possess good knowledge before taking the CEH-v6 312-50 Ethical Hacker exam:

  1. Understanding elements of security, security fundamentals, and security Testing.
  2. Understanding seven-step information gathering process.
  3. Performing information gathering, determining network range, identify active machines, finding open ports and applications, OS fingerprinting, and mapping the network.
  4. Continue reading

The Microsoft test 70-502 measures an individual’s ability to develop and implement Windows-based applications based on the Windows Presentation Foundation technology by using Microsoft .NET Framework 3.5. The individual must have a sound knowledge of Visual Studio 2008. Before taking the 70-502 test, you should practice the following:

  1. Select an application type and manage its responsiveness.
  2. Configure event handling, commands, page-based navigation, and application settings.
  3. Select and configure content controls, item controls, and layout panels.
  4. Integrate Windows Forms controls into a WPF application.
  5. Create user and custom controls.
  6. Create and display two-dimensional and three-dimensional graphics.
  7. Create and manipulate documents.
  8. Continue reading