The EC-Council Certified Incident Handler (ECIH V2) Training and certification course will address the needs of the professionals who want to get equipped with the principles and knowledge for detecting and responding to the current security incidents and threats emerging in an information system. The course has been structured to equip professionals in creating incident handling codes, learning about laws and policies for incident handling and differentiating between various types of incidents such as network security incidents, malicious code incidents, and insider attack incidents.
Who should do EC-Council Certified Incident Handler (ECIH V2) Training?
- Incident handlers
- Risk assessment administrators
- Penetration testers
- Cyber forensic investigators
- Venerability assessment auditors
- System administrators and engineers
- Firewall administrators
- Network managers
- IT managers
Course Prerequisites
- One year of experience managing Windows/Unix/Linux systems or have equivalent knowledge and skills
- Good understanding of common network and security services is required
On completion of this training, you will know:
- Introduction to Incident Handling and Response
- Incident Handling and Response Process
- Forensic Readiness and First Response
- Handling and Responding to Malware Incidents
- Handling and Responding to Email Security Incidents
- Handling and Responding to Network Security Incidents
- Handling and Responding to Web Application Security Incidents
- Handling and Responding to Cloud Security Incidents
- Handling and Responding to Insider Threats
- Module 1: Introduction to Incident Handling and Response
- Module 2: Incident Handling and Response Process
- Module 3: Forensic Readiness and First Response
- Module 4: Handling and Responding to Malware Incidents
- Module 5: Handling and Responding to Email Security Incidents
- Module 6: Handling and Responding to Network Security Incidents
- Module 7: Handling and Responding to Web Application Security Incidents
- Module 8: Handling and Responding to Cloud Security Incidents
- Module 9: Handling and Responding to Insider Threats
-