Select Page

Certified Incident Handler (ECIH)

R2,890.00

  • 14:43:00

    Hours of learning

  • Presented by highly qualified, industry leading experts
  • 12 Months access
SKU: 864f1d21ad47 Category:
DESCRIPTION

Overview

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.  It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident,   from both a financial and a reputational perspective.  E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident.   These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

Objectives

  • Understand the key issues plaguing the information security world
  • Learn to combat different types of cybersecurity threats,   attack vectors,   threat actors and their motives
  • Learn the fundamentals of incident management including the signs and costs of an incident
  • Understand the fundamentals of vulnerability management,  threat assessment,  risk management,  and incident response automation and orchestration
  • Master all incident handling and response best practices,  standards,  cybersecurity frameworks,  laws,  acts,  and regulations
  • Decode the various steps involved in planning an incident handling and response program
  • Gain an understanding of the fundamentals of computer forensics and forensic readiness
  • Comprehend the importance of the first response procedure including evidence collection,  packaging,  transportation,  storing,  data acquisition,  volatile and static evidence collection,  and evidence analysis
  • Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
  • Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents,  email security incidents,  network security incidents,  web application security incidents,  cloud security incidents,  and insider threat-related incidents

Prerequisites

  • Good understanding of common network and security services is required
  • Basic PC operating system navigation skills
  • Basic Internet usage skills
  • Basic IP addressing knowledge

Target Audience

  • Penetration Testers
  • Vulnerability Assessment Auditors
  • Risk Assessment Administrators
  • Network Administrators
  • Application Security Engineers
  • Cyber Forensic Investigators/ Analyst and SOC Analyst
  • System Administrators/Engineers
  • Firewall Administrators and Network Managers/IT Managers