Contact Us
Search Icon

EC Council Certified Incident Handler (ECIH) Training Course

EC Council Certified Incident Handler (ECIH) Training Course

Level Specialist Duration 3 days
Available to book: Virtual instructor led training £1700 + VAT Book your place
Available to quote: In-house Request a quote

The EC-Council Certified Incident Handler program is designed to provide the CIHfundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.

You will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, you will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make you proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

How will you benefit?

  • Following the course you will be able to create incident handling and response policies and deal with various types of computer security incidents
  • Have the ability to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling
  • The programme is broken into eleven modules:

    • Module 1: Introduction to incident response and handling
    • Module 2: Risk assessment
    • Module 3: Incident response and handling steps
    • Module 4: CSIRT
    • Module 5: Handling network security incidents
    • Module 6: Handling malicious code incidents
    • Module 7: Handling insider threats
    • Module 8: Forensic analysis and incident response
    • Module 9: Incident reporting
    • Module 10: Incident recovery
    • Module 11: Security policies and laws
    • Incident handlers
    • Risk assessment administrators
    • Penetration testers
    • Cyber forensic investigators
    • Venerability assessment auditors
    • System administrators
    • System engineers
    • Firewall administrators
    • Network managers
    • IT managers
    • IT professionals
    • Anyone interested in incident handling and response
    • Course materials
    • Exam
    • A certificate of attendance
Contact Us

Let's shape your organization's future together

Reach out and see how we can help guide you on your path to sustainable operational success.

Get in touch