Specialized Pentesting Courses | Home | About | Contact | Blog | Glossary         

 QUICK CONTACT

NAME :
EMAIL :
PHONE :
COUNTRY :
STATE :
SUBJECT :
COURSE :
MESSAGE :
  
   







Download in PDF:    This Course   

EC-Council Certified Incident Handler[E|CIH]

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The IT incident management training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, it incident management training methods, and incident recovery techniques in detail.

The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.



[E|CIH] Certification Track

Exams Exam Code Recommended Training
 Exam 1   212-89   EC-Council E|CIH


Training we offer:

Course Name  EC-Council E|CIH 
Course Duration  5 days (9am-5pm) or 2 months (2hrs/day) 
Course Mode  Training Academy or On-site Training for Corporates & Colleges
Prerequisite  EC-Council C|EH 



[E|CIH] Syllabus

  1. Introduction to Incident Response and Handling
  2. Risk Assessment
  3. Incident Response and Handling Steps
  4. CSIRT
  5. Handling Network Security Incidents
  6. Handling Malicious Code Incidents
  7. Handling Insider Threats
  8. Forensic Analysis and Incident Response
  9. Incident Reporting
  10. Incident Recovery
  11. Security Policies and Laws
 



Back to top





































































ARIZONA Infotech © Copyright 2017 . All Rights Reserved