EC-Council Certified Incident Handler (ECIH)

Catalog Home Cybersecurity, Hacking & IT Auditing EC-Council

There are no scheduled dates for this course.

  Available by Request

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents and insider attack threats.In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods and incident recovery techniques in detail.The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.

There are no prerequisites for this course.

2 Days/Lecture & Labs

This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in incident handling and response.

  • Introduction to Incident Response and Handling
  • Risk Assessment
  • Incident Response and Handling Steps
  • CSIRT
  • Handling Network Security Incidents
  • Handling Malicious Code Incidents
  • Handling Insider Threats
  • Forensic Analysis and Incident Response
  • Incident Reporting
  • Incident Recovery
  • Security Policies and Laws




< >

Copyright © 2018 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media