This course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
This certification will provide professionals greater industry acceptance as the seasoned incident handler.
The course covers computer forensics and its role in handling and responding to incidents; and it also covers incident response teams, incident reporting methods, and incident recovery techniques in detail.
Download EC-Council Certification Track (pdf)
Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling.
After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents.
The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.
This course is aimed to:
The ECIH 212-89 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the ECIH certification.
Characteristics:
The certification exam has the following characteristics:
The course has the following topics:
The course has the following topics:
Introduction to Incident Response and Handling
Risk Assessment
Incident Response and Handling Steps
CSIRT
Handling Network Security Incidents
Handling Malicious Code Incidents
Handling Insider Threats
Forensic Analysis and Incident Response
Incident Reporting
Incident Recovery
Security Policies and Laws
Our instructors are certified in different EC Council, Information Security, Cloud Computing and Risk Management disciplines and have an extensive experience in:
The design and implementation of Information Security Management Systems in the private and in the public sector.
The selection, implementation and configuration of tools and controls which support the Information Security management and which are the ones of most standing and acknowledgement in the market.
First and second level audits for Information Security Management Systems.
Teaching various ITSM, ISO, Information Security and Risk Management courses in the academic and professional field.