top of page

ECIH

Certified Incident Handler.

audience-icon.png

Target audience.

The incident handling skills taught in E|CIH are complementary to the job roles below as well as many other cybersecurity jobs:

  • Penetration Testers

  • Vulnerability Assessment Auditors

  • Risk Assessment Administrators

  • Network Administrators

  • Application Security Engineers

  • Cyber Forensic Investigators/ Analyst and SOC Analyst

  • System Administrators/Engineers

  • Firewall Administrators and Network Managers/IT Managers

target-yellow.png

Purpose of the course.

  • To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.

  • To ensure that organization can identify, contain, and recover from an attack.

  • To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.

  • To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.

  • To minimize the loss and after-effects breach of the incident.

  • For individuals: To enhance skills on incident handling and boost their employability.

clock-icon.png

Details.

Duration of studies: 2 days / 16 hours
Language of instruction (students may choose): Russian, English

Language of materials and test: English

 

This course package includes:

  • Certified trainer

  • Access to e-library with learning resources

  • Access to labs during training

  • Exam voucher 

  • Course completion certificate

  • CVA cetification upon passing the exam

program-yellow.png

Course Outline.

Module 01: Introduction to Incident Handling and Response

Module 02: Incident Handling and Response Process

Module 03: Forensic Readiness and First Response

Module 04: Handling and Responding to Malware Incidents

Module 05: Handling and Responding to Email Security Incidents

Module 06: Handling and Responding to Network Security Incidents

Module 07: Handling and Responding to Web Application Security Incidents

Module 08: Handling and Responding to Cloud Security Incidents

Module 09: Handling and Responding to Insider Threats

bottom of page