Certified Incident Handler

This course is designed to provide fundamental skills to handle and respond to computer security incidents through principles and techniques for detecting and responding to current and emerging computer security threats.

<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><script> hbspt.forms.create({ region: "na1", portalId: "8057651", formId: "6a3ff7a7-c223-47d4-9399-1559c6940d97" });</script>
Live instructor-led
Onsite or Virtual / Public or Private Class
3 days (Live Training) + Examination

Enhance your skills to handle the next cybersecurity incident effectively and boost your employability:

Learn How To Detect & Handle Real-World Incidents Methodically.
100% Compliant with the NICE 2.0 Framework and the CREST Framework.
Ensure your organisation is ready to identify, contain, and recover from an attack.
Gain access to an array of resources and major hands-on component with 50 labs, 800 tools, and 4 OS to enhance your capabilities.

Prerequisites:

The E|CIH course is designed to cater to mid-level to senior-level cyber security professionals. Candidates with a minimum of 3 years of experience in the cyber security domain can apply for this program. Individuals who have experience in information security and who want to expand their knowledge and skills in incident handling and response are also eligible.

Who Should Attend:

E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.

Business Outcomes:

  • Principals, processes and techniques for detecting and responding to security threats/breaches
  • Liaison with legal and regulatory bodies
  • Learn to handle incidents and conduct assessments
  • Cover various incidents like malicious code, network attacks, and insider attacks

Curriculum Outline:

  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • Forensic Readiness and First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats

OUR EXPERT INSTRUCTORS

Col. Rajesh Dubey

General Manager at ITI Ltd

Col. Rajesh Dubey

General Manager at ITI Ltd

Dr Athirah Mohd Ramly

Lecturer at Sunway University, Department of Computing and Information Systems

Dr Athirah Mohd Ramly

Lecturer at Sunway University, Department of Computing and Information Systems

Prefer personalised consultation on corporate training?

<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script><script> hbspt.forms.create({ region: "na1", portalId: "8057651", formId: "6a3ff7a7-c223-47d4-9399-1559c6940d97" });</script>

WHAT LEARNERS SAY