The latest revision of EC-Council’s Certified Incident Handler (E|CIH) certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process. This IH&R process includes stages such as; incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among the incident responders in knowing how to respond to various types of security incidents happening in organisations today.The types of cybersecurity incidents covered include malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents.
It is a comprehensive specialist level program, that imparts knowledge and skills on how organisations can effectively handle post breach consequences by reducing the impact of the incident, both financially and reputationally. The learning objectives are emphasised through practical learning with 40% of this course covering hands-on experience of the latest incident handling and response tools, techniques, methodologies, frameworks, etc.
The E|CIH lab environment consists of the latest and patched operating systems including Windows 10, Windows Server 2016, Ubuntu Linux, and OSSIM for performing labs.
Students will have access to over 50 labs, 800 tools, and 4 OSs! as well as a large array of templates, check lists, and cheat sheets.
The ECIH Program is 100% Compliant with the NICE 2.0 Framework AND CREST Framework.
Please Note: An exam voucher is included with this course
Introduction to Incident Handling and Response
Incident Handling and Response Process
Forensic Readiness and First Response
Handling and Response to Malware Incidents
Handling and Responding to Email Security Incidents
Handling and Responding to Network Security Incidents
Handling and Responding to Web Application Security Incidents
Handling and Responding to Cloud Security Incidents
Handling and Responding to Insider Threats
After completing this course you should be able to:
Attendees should meet the following prerequsites:
This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in incident handling and response.
NOK 30.000
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
COURSE CONTENT: Security Incident Response Overview • Identify the goals of Security Incident Response (SIR) • Discuss the importance of understanding customers and their goals, and discuss how Security…
COURSE CONTENT: Types of Encryption Standards and their differencesHow to select the best standard for your organizationHow to enhance your pen-testing knowledge in encryptionCorrect and incorrect deployment of encryption…