The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.
Course location: Virtual training
In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail.
The E|CIH certification will provide professionals greater industry acceptance as the seasoned incident handler.
Certification The ECIH 212-89 exam will be conducted on the last day of training. Students need to pass the online exam to receive the ECIH certification.
The incident handling skills taught in E|CIH are complementary to the job roles below as well as many other cybersecurity jobs:
Vulnerability Assessment Auditors
Risk Assessment Administrators
Application Security Engineers
Cyber Forensic Investigators/ Analyst and SOC Analyst
Firewall Administrators and Network Managers/IT Managers
The results of the training
Understand the key issues plaguing the information security world
Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
Learn the fundamentals of incident management including the signs and costs of an incident
Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
Decode the various steps involved in planning an incident handling and response program
Gain an understanding of the fundamentals of computer forensics and forensic readiness
Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents
Prerequisites to the course (recommended): E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.
Module 01: Introduction to Incident Handling and Response
Module 02: Incident Handling and Response Process
Module 03: Forensic Readiness and First Response
Module 04: Handling and Responding to Malware Incidents
Module 05: Handling and Responding to Email Security Incidents
Module 06: Handling and Responding to Network Security Incidents
Module 07: Handling and Responding to Web Application Security Incidents
Module 08: Handling and Responding to Cloud Security Incidents
Module 09: Handling and Responding to Insider Threats
Length: 24 academic hours
Continuing Education Curriculum Group: 0613 Software and Application Development and Analysis Curriculum Group
The prerequisite for issuing the certificate is full participation in training.
The training price also includes: teaching materials; a trainer's consultation on the topics learned by e-mail after the training; certificate; exam.
See you at the training!
Ivica Gjorgjevski is a recognized expert in information and cyber security with more than 15 years of experience in this field. After 4 years working in the army, he joined the National Security Authority (Directorate for Security of Classified Information). Currently working as a head of the sector for information security. Besides the full-time job in the NSA, he also works for Semos Education, leading company in North Macedonia for IT education, as a certified EC-Council instructor and delivers cyber security trainings all over Europe. His field of expertise is ethical hacking, network defending, incident handling. He is currently holding some of the top cybersecurity certifications (CEH, CEI, CND, ECIH, CompTIA Security +).
Registreerudes e-poe, e-kirja või telefoni teel, saadame Teile arve ja täpsema info osalemise kohta. Üksteist päeva enne koolitust saadame Teile e-kirjaga meenutuse osalemise infoga.
Koolitusel osalemine on nimeline, kuid saate osalejat tasuta muuta kuni koolituse alguseni.
Koolituse eest tasumine toimub arvel viidatud arveldusarvele. Arve saadetakse maksja aadressile e-postiga. Arve tuleb tasuda enne koolituse algust arvel märgitud maksetähtajaks.
IT Koolitus on Eesti Töötukassa koolituskaardi koostööpartner. Tutvuge koolituskaardi infoga SIIN. Täpsema info saamiseks võtke meiega ühendust telefonil 618 1727 või [email protected].
Kui te ei saa mingil põhjusel koolitusel osaleda, palun andke sellest teada e-posti aadressil [email protected]. Kui teatate mitteosalemisest vähemalt 7 kalendripäeva ette, lepime Teiega kokku uue aja või tagastame 100% koolituse maksumusest. Tagastame koolituse osalustasu täismahus juhul, kui pole tehtud koolituse korraldamisega seotud kulutusi (ostetud õppematerjale jms). Koolitusele mitteilmumisel, sellest mitteteatamisel või koolituse poolelijätmisel õppetasu ei tagastata.