EC-Council Certified Incident Handler (ECIH)

 

Course Overview

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

Who should attend

  • Penetration Testers
  • Vulnerability Assessment Auditors
  • Risk Assessment Administrators
  • Network Administrators
  • Application Security Engineers
  • Cyber Forensic Investigators/Analyst and SOC Analyst
  • System Administrators/Engineers
  • Firewall Administrators and Network Managers/IT Managers

Course Objectives

  • Understand the key issues plaguing the information security world
  • Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
  • Learn the fundamentals of incident management including the signs and costs of an incident
  • Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
  • Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
  • Decode the various steps involved in planning an incident handling and response program
  • Gain an understanding of the fundamentals of computer forensics and forensic readiness
  • Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
  • Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
  • Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents

Course Content

  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • Forensic Readiness and First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats

Prices & Delivery methods

Online Training

Duration
3 days

Classroom Training

Duration
3 days

Click on town name or "Online Training" to book Schedule

Germany

Online Training This is a FLEX course in German language. Time zone: Central European Summer Time (CEST)
Online Training This is a FLEX course in German language. Time zone: Central European Time (CET)

Bulgaria

Online Training This is a FLEX course in English language. Time zone: Eastern European Summer Time (EEST)

Croatia

Online Training This is a FLEX course in English language. Time zone: Central European Summer Time (CEST)

Czech Republic

Online Training This is a FLEX course in English language. Time zone: Central European Time (CET)

North Macedonia

Online Training This is a FLEX course in English language. Time zone: Central European Summer Time (CEST)

United Kingdom

Online Training Time zone: Greenwich Mean Time (GMT) Course language: English
Online Training Time zone: British Summer Time (BST) Course language: English
London
London
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.
This is a FLEX course, which is delivered both virtually and in the classroom.