Length
3 days
Version
2

Overview

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies and various laws and policies related to incident handling.

Professionals interested in pursuing incident handling and response as a career require comprehensive training that not only imparts concepts but also allows them to experience real-scenarios. The E|CIH program includes hands-on learning delivered through labs within the training program. True employability after earning a certification can only be achieved when the core of the curricula maps to and is compliant with government and industry-published incident and response frameworks.

E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

Please note that exam vouchers are included with EC-Council courses. Exams are not taken at the conclusion of the course. Exam candidates are required to book their exam after completion of the course. Your EC-Council Exam Centre Voucher will come with an expiry date. Please refer to the DDLS booking Terms and Conditions regarding exam voucher validity.

Key Topics

Detailed Info
  • Introduction to Incident Handling and Response
  • Forensic Readiness and First Response
  • Network Security Incidents
  • Cloud Security Incidents
  • Incident Handling and Response Process
  • Malware Incidents
  • Email Security Incidents
  • Web Application Security Incidents
  • Insider Threats
Skills Gained
Key Topics
Target Audience
Prerequisites

Skills Gained

Attendees will learn:

  • Understand the key issues plaguing the information security world
  • Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
  • Learn the fundamentals of incident management including the signs and costs of an incident
  • Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
  • Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
  • Decode the various steps involved in planning an incident handling and response program
  • Gain an understanding of the fundamentals of computer forensics and forensic readiness
  • Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
  • Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
  • Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents

Key Topics

Module 01: Introduction to Incident Handling and Response
Module 02: Incident Handling and Response Process
Module 03: Forensic Readiness and First Response
Module 04: Handling and Responding to Malware Incidents
Module 05: Handling and Responding to Email Security Incidents
Module 06: Handling and Responding to Network Security Incidents
Module 07: Handling and Responding to Web Application Security Incidents
Module 08: Handling and Responding to Cloud Security Incidents
Module 09: Handling and Responding to Insider Threats

Target Audience

The incident handling skills taught in this course are complementary to the job roles below as well as many other cybersecurity jobs:

    • Penetration Testers
    • Vulnerability Assessment Auditors
    • Risk Assessment Administrators
    • Network Administrators
    • Application Security Engineers
    • Cyber Forensic Investigators / Analyst and SOC Analyst
    • System Administrators/Engineers
    • Firewall Administrators and Network
    • Managers/IT Managers

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please call us at +632 8244 2098 or email [email protected].

Prerequisites

E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. It is recommended that one needs to have at least 1 year of experience in the cybersecurity domain in order to maximize course outcomes.

You should also have some understanding of networks and computer systems:

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic internet usage skills
  • Basic address knowledge

CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. It is recommended that one needs to have at least 1 year of experience in the cybersecurity domain in order to maximize course outcomes.

You should also have some understanding of networks and computer systems:

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic internet usage skills
  • Basic address knowledge
Print course details

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Book Your Course

Virtual Classroom
October 7 2020 - October 9 2020

Email Course Outline
Request a Callback

Enter your details below and we'll email you a pdf of the course outline.

Enter your details below and one of our team will give you a call to answer any questions you may have.

Pre-Course Requirements

This course has requirements which must be completed before commencing.
Please click here to view.