Select Page

EC-Council Certified Incident Handler v2

R2,890.00

  • 19:26:00

    Hours of learning

  • Presented by highly qualified, industry leading experts
  • 12 Months access
SKU: 236973138b57 Category:
DESCRIPTION

Overview

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

Following a rigorous development which included a careful Job Task Analysis (JTA) related to incident handling and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based, intensive 3-day training program and certification that provides a structured approach to learning real-world incident handling and response requirements.

E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

Objectives

  • Understand the key issues plaguing the information security world

  • Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives

  • Learn the fundamentals of incident management including the signs and costs of an incident

  • Understand the fundamentals of vulnerability management, threat assessment, risk management, and

    incident response automation and orchestration

  • Master all incident handling and response best practices, standards, cybersecurity frameworks, laws,

    acts, and regulations

  • Decode the various steps involved in planning an incident handling and response program

  • Gain an understanding of the fundamentals of computer forensics and forensic readiness

Target Audience

This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals, and anyone who is interested in incident handling and response.