EC-Council Certified Incident Handler v2
Hours of learning
- Presented by highly qualified, industry leading experts
- 12 Months access
This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.
It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.
Following a rigorous development which included a careful Job Task Analysis (JTA) related to incident handling and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based, intensive 3-day training program and certification that provides a structured approach to learning real-world incident handling and response requirements.
E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.
Understand the key issues plaguing the information security world
Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
Learn the fundamentals of incident management including the signs and costs of an incident
Understand the fundamentals of vulnerability management, threat assessment, risk management, and
incident response automation and orchestration
Master all incident handling and response best practices, standards, cybersecurity frameworks, laws,
acts, and regulations
Decode the various steps involved in planning an incident handling and response program
Gain an understanding of the fundamentals of computer forensics and forensic readiness
This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals, and anyone who is interested in incident handling and response.