The latest revision of EC-Council’s Certified Incident Handler (E|CIH) v3 certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe. This course includes access to labs and exam voucher.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process. This IH&R process includes stages such as incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among the incident responders in knowing how to respond to various types of security incidents happening in organisations today. The types of cybersecurity incidents covered include malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents.
It is a comprehensive specialist level program, that imparts knowledge and skills on how organisations can effectively handle post breach consequences by reducing the impact of the incident, both financially and reputationally. The learning objectives are emphasised through practical learning with 40% of this course covering hands-on experience of the latest incident handling and response tools, techniques, methodologies, frameworks, etc.
The E|CIH lab environment consists of the latest and patched operating systems including Windows 10, Windows Server 2016, Ubuntu Linux, and OSSIM for performing labs.
Students will have access to over 50 labs, 800 tools, and 4 OSs! as well as a large array of templates, check lists, and cheat sheets.
The ECIH Program is 100% Compliant with the NICE 2.0 Framework AND CREST Framework.
It is recommended that you have at least 1 year of experience in the cybersecurity domain in order to maximize course outcomes.
This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in incident handling and response.
After completing this course you should be able to:
Module 1 - Introduction to Incident Handling and Response
Module 2 - Incident Handling and Response Process
Module 3 - Forensic Readiness and First Response
Module 4 - Handling and Response to Malware Incidents
Module 5 - Handling and Responding to Email Security Incidents
Module 6 - Handling and Responding to Network Security Incidents
Module 7 - Handling and Responding to Web Application Security Incidents
Module 8 - Handling and Responding to Cloud Security Incidents
Module 9 - Handling and Responding to Insider Threats
Join our public courses in our New Zealand facilities. Private class trainings will be organized at the location of your preference, according to your schedule.
S. K. - Siber Savunma Uzmanı
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Rated the training 5 stars.
D. D. - SOC Analist
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Rated the training 5 stars.