Certified Incident Handler
This course is designed to provide fundamental skills to handle and respond to computer security incidents through principles and techniques for detecting and responding to current and emerging computer security threats.Contact Us



Ideal For
The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.
The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.
The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.
What to Expect
SKILL LEVEL
Intermediate
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Introduction to Incident Handling and Response
Incident Handling and Response Process
Forensic Readiness and First Response
Handling and Responding to Malware Incidents
Handling and Responding to Email Security Incidents
Handling and Responding to Network Security Incidents
Handling and Responding to Web Application Security Incidents
Handling and Responding to Cloud Security Incidents
Handling and Responding to Insider Threats
Introduction to Incident Handling and Response
Incident Handling and Response Process
Forensic Readiness and First Response
Handling and Responding to Malware Incidents
Handling and Responding to Email Security Incidents
Handling and Responding to Network Security Incidents
Handling and Responding to Web Application Security Incidents
Handling and Responding to Cloud Security Incidents
Handling and Responding to Insider Threats
Introduction to Incident Handling and Response
Incident Handling and Response Process
Forensic Readiness and First Response
Handling and Responding to Malware Incidents
Handling and Responding to Email Security Incidents
Handling and Responding to Network Security Incidents
Handling and Responding to Web Application Security Incidents
Handling and Responding to Cloud Security Incidents
Handling and Responding to Insider Threats
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Course Outcome
Principals, processes and techniques for detecting and responding to security threats/breaches
Liaison with legal and regulatory bodies
Learn to handle incidents and conduct assessments
Cover various incidents like malicious code, network attacks, and insider attacks
Principals, processes and techniques for detecting and responding to security threats/breaches
Liaison with legal and regulatory bodies
Learn to handle incidents and conduct assessments
Cover various incidents like malicious code, network attacks, and insider attacks
Principals, processes and techniques for detecting and responding to security threats/breaches
Liaison with legal and regulatory bodies
Learn to handle incidents and conduct assessments
Cover various incidents like malicious code, network attacks, and insider attacks
Course Intake
1 Jan 2025 → 1 March 2025
2 days | Monday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2