| Select Package | Comprehensive Assured Pacakge, Training with Examination, Training with LMS |
|---|
EC-Council Certified Incident Handler (ECIH)
The goal of the Certified Incident Handler v2 Exam Preparatory Course is to give students the information and abilities needed to manage and react to a variety of cybersecurity issues. Preparation, detection, containment, eradication, and recovery are among the core concepts of incident handling and response that are covered in the course.
Security officers, auditors, security experts, site administrators, and anybody else involved in incident handling and response are the target audience for this course. Network security incidents, malicious code incidents, insider attacks, and physical security incidents are just a few of the occurrences that participants will learn how to address.
Overview
The Certified Incident Handler v2 Exam Preparatory Course is intended for anyone who want to improve their incident handling and response abilities. Those who are in charge of keeping computer systems and networks secure, as well as those who want to work in cybersecurity, will find the course especially helpful.
The overall goal of the Certified Incident Handler v2 Exam Preparatory Course is to give participants the information and abilities required to properly handle and respond to a variety of cybersecurity occurrences. Participants will have the information needed to pass the Certified Incident Handler certification exam and obtain the Certified Incident Handler certificate after completing the course.
What you will Learn in this EC-Council Certified Incident Handler (ECIH) course?
-
Understanding the fundamentals of incident handling and response, including the incident handling process and procedures.
-
Developing an incident response plan and establishing communication channels to ensure a prompt and effective response to incidents.
-
Identifying and classifying incidents, analyzing their impact, and responding appropriately.
-
Implementing containment strategies to limit the impact of incidents and eradicating the cause of incidents.
-
Restoring systems and data affected by incidents and conducting post-incident activities, including forensic analysis and lessons learned sessions.
-
Understanding legal and ethical considerations in incident handling and response.
-
Applying incident handling and response techniques to various types of incidents, including network security incidents, malicious code incidents, insider attack
- Developing incident handling policies and procedures to ensure consistent and effective incident response across the organization.
Who should go for EC-Council Certified Incident Handler (ECIH) course?
- Security officers: Security officers responsible for monitoring and responding to security incidents within an organization.
- Site administrators: Site administrators responsible for managing and securing computer systems and networks.
- Auditors: Auditors responsible for assessing the security posture of an organization and identifying vulnerabilities.
- Security professionals: Security professionals responsible for designing and implementing security solutions within an organization.
- Network administrators: Network administrators responsible for managing and securing computer networks.
- Incident responders: Incident responders responsible for investigating and responding to security incidents.
- Anyone interested in cybersecurity: Anyone interested in learning about incident handling and response in the context of cybersecurity.
Our Package
- Overview4:48
- Information Security and Incident Management23:57
- What is Vulnerability Management24:55
- What are Threat Assessments19:22
- Risk Management – Vocabulary17:33
- Risk Management – The Process27:35
- Risk Management – The NIST RMF22:26
- Incident Handling best practices, std., frameworks21:22
- Incident Handling and Legal Compliance
- Step 1: Prepare for Incident Handling, Response23:31
- Step 2: Incident Recording and Assignment16:48
- Step 3: Incident Triage20:55
- Step 4: Notification22:52
- Step 5: Containment14:49
- Step 6: Evidence Gathering and Forensic Analysis25:49
- Step 7: Eradication11:49
- Step 8: Recovery19:25
- Step 9: Post-Incident Activities
- Forensics and first response20:11
- Principles of Digital Evidence Collection26:18
- Data Acquisition24:06
- Volatile Evidence Collection22:30
- Static Evidence Collection and Anti-Forensics
- Preparation for Handling Malware Incidents25:13
- Detection of Malware Incidents23:34
- Containment of Malware Incidents21:46
- Eradication of Malware Incidents20:05
- Recovery after Malware Incidents
- Handling Email Security Incidents
- Preparation Handling Network Security Incidents18:46
- Detection, Validation Network Security Incidents21:03
- Handling Unauthorized Access Incidents24:13
- Handling Inappropriate Usage Incidents20:26
- Handling Denial-of-Service Incidents22:49
- Handling Wireless Network Security Incidents
- Preparation to Handle Web App Security Incidents23:49
- Detecting, Analyzing Web App Security Incidents25:05
- Containment of Web Application Security Incidents11:22
- Eradication of Web Application Security Incidents25:25
- Recovery from Web Application Security Incidents14:52
- Web Application Security Threats and Attacks
- Cloud Computing Concepts22:39
- Best Practices Against Cloud Security Incidents
- Best Practices Against Insider Threats
- Security checks using buck-security on Linux8:28
- Volatile evidence collection – Linux, Windows24:59
- Using OSForensics to find hidden material25:19
- Analyzing non-volatile data using Autopsy22:53
- Malware analysis23:13
- Collecting information by tracing emails14:35
- Using OSSIM25:58
- Using Wireshark and NMAP27:10
- Using Suricata IDS26:23
- What does a SQL Injection Attack look like22:01
What does a XSS Attack look like
Upcoming Batch
April 20th (Weekends)
FRI & SAT (4 Weeks)
08:30 PM to 01:00 AM (CDT)
April 18th (Weekdays)
MON – FRI (18 Days)
10:00 AM to 12:00 PM (CDT)
Enter the Title






Reviews
There are no reviews yet.