Certified Incident Handler
Certified Incident Handler
Certified Incident Handler

Certified Incident Handler

This course is designed to provide fundamental skills to handle and respond to computer security incidents through principles and techniques for detecting and responding to current and emerging computer security threats.Contact Us

Ideal For

The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.

The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.

The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.

What to Expect

SKILL LEVEL
Intermediate
DURATION
3 Months
CERTIFICATION
After Completion
LANGUAGE
English

Skills You Will Learn

  • Introduction to Incident Handling and Response

  • Incident Handling and Response Process

  • Forensic Readiness and First Response

  • Handling and Responding to Malware Incidents

  • Handling and Responding to Email Security Incidents

  • Handling and Responding to Network Security Incidents

  • Handling and Responding to Web Application Security Incidents

  • Handling and Responding to Cloud Security Incidents

  • Handling and Responding to Insider Threats

  • Introduction to Incident Handling and Response

  • Incident Handling and Response Process

  • Forensic Readiness and First Response

  • Handling and Responding to Malware Incidents

  • Handling and Responding to Email Security Incidents

  • Handling and Responding to Network Security Incidents

  • Handling and Responding to Web Application Security Incidents

  • Handling and Responding to Cloud Security Incidents

  • Handling and Responding to Insider Threats

  • Introduction to Incident Handling and Response

  • Incident Handling and Response Process

  • Forensic Readiness and First Response

  • Handling and Responding to Malware Incidents

  • Handling and Responding to Email Security Incidents

  • Handling and Responding to Network Security Incidents

  • Handling and Responding to Web Application Security Incidents

  • Handling and Responding to Cloud Security Incidents

  • Handling and Responding to Insider Threats

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Course Outcome

  • Principals, processes and techniques for detecting and responding to security threats/breaches

  • Liaison with legal and regulatory bodies

  • Learn to handle incidents and conduct assessments

  • Cover various incidents like malicious code, network attacks, and insider attacks

  • Principals, processes and techniques for detecting and responding to security threats/breaches

  • Liaison with legal and regulatory bodies

  • Learn to handle incidents and conduct assessments

  • Cover various incidents like malicious code, network attacks, and insider attacks

  • Principals, processes and techniques for detecting and responding to security threats/breaches

  • Liaison with legal and regulatory bodies

  • Learn to handle incidents and conduct assessments

  • Cover various incidents like malicious code, network attacks, and insider attacks

Course Intake

1 Jan 2025 → 1 March 2025

2 days | Monday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2