EC-Council Certified Incident Handler (ECIH)

Price
$1,398.00
Duration
 3 Days
Delivery Methods
 VILT    Private Group

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling.

In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail.

 

Upcoming Class Dates and Times

This class is not currently scheduled.
Contact us and we will help you get the training you need!

Who Should Attend

E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain. E|CIH members are ambitious security professionals who work in Fortune 500 organizations globally.

Course Objectives

    After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

Agenda

1 - Introduction to Incident Response and Handling
2 - Incident Handling and Response Process
3 - Forensic Readiness and First Response
4 - Handling and Responding to Malware Incidents
5 - Handling and Responding to Email Security Incidents
6 - Handling and Responding to Network Security Incidents
7 - Handling and Responding to Web Application Security Incidents
8 - Handling and Responding to Cloud Security Incidents
9 - Handling and Responding to Insider Threats
 

Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with United Training