Skip to main Content

EC-Council Certified Incident Handler (E|CIH) + Exam voucher

  • Kursuskode ECIH
  • Dages adgang 365 dage
  • Version 3.0

E-learning (Selvstudie) Pris

DKR11,995.00

Ekskl. Moms

Køb Køb

Leveringsmetoder

Kurset er tilgængeligt i følgende formater:

  • Firma kursus

    Et lukket firma kursus

  • E-learning (Selvstudie)

    Online kurser som du kan tage når som helst

  • Åbent kursus

    Traditionel klasserumsundervisning

  • Åbent kursus (Virtuelt)

    Live klasserumsundervisning du tilgår virtuelt

Anmod om dette kursus Med en anden leveringsløsning

Beskrivelse

Toppen

EC-Council's Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threat actors in an incident.

This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify, and contain incidents. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling.

After attending the course, students will be able to create IH&R policies and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.

The E|CIH (EC-Council Certified Incident Handler) also covers post-incident activities such as containment, eradication, evidence gathering, and forensic analysis, leading to prosecution or countermeasures to ensure the incident is not repeated.

The E|CIH is a method-driven course that provides a holistic approach covering concepts related to organizational IH&R, from preparing and planning the incident handling response process to recovering organizational assets from the impact of security incidents. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.

With over 95 advanced labs, 800 tools covered, and exposure to incident handling activities on many different operating systems, E|CIH provides a well-rounded and tactical approach to planning for and dealing with cyber incidents.

The E|CIH program addresses all stages involved in the IH&R process, and this attention toward a realistic and futuristic approach makes E|CIH one of the most comprehensive IH&R-related certifications in the market today.

Updated 12/5/2026

e-Learning

Vores E-learning-produkter er designet til at give dig adgang til vores uddannelsesressourcer når som helst, hvor som helst. Her får du adgang til materialer og mulighed for at forberede sig til eksamen.

Målgruppe

Toppen

- Mid-level to high-level cybersecurity professionals with a minimum of 3 years of experience

- Individuals from the information security profession who want to enrich their skills and knowledge in incident handling and response

- Individuals interested in preventing cyber threats

Kursets formål

Toppen

What You Learn from E|CIH?

  • Key issues plaguing the information security world
  • Various types of cybersecurity threats, attack vectors, threat actors, and their motives, goals, and objectives
  • Various attack and defense frameworks (Cyber Kill Chain Methodology, MITRE ATT&CK Framework, etc.)
  • Fundamentals of information security concepts (vulnerability assessment, risk management, cyber threat intelligence, threat modeling, and threat hunting)
  • Fundamentals of incident management (information security incidents, signs and costs of an incident, incident handling and response, and incident response automation and orchestration)
  • Incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
  • Steps involved in planning an incident handling and response program (planning, recording and assignment, triage, notification, containment, evidence gathering and forensic analysis, eradication, recovery, and post-incident activities)
  • Importance of first response and first response procedures (evidence collection, documentation, preservation, packaging, and transportation)
  • Handling and responding to different types of cybersecurity incidents (malware, email security, network security, web application security, cloud security, insider threats, and endpoint security incidents)

Kursusindhold

Toppen

MODULE 01: INTRODUCTION TO INCIDENT HANDLING AND RESPONSE

  • Information security threats and attack vectors
  • Attack and defense frameworks
  • Information security concepts
  • Information security incidents
  • Incident management process
  • Incident response automation and orchestration
  • Incident handling and response best practices
  • Standards related to incident handling and response
  • Cybersecurity frameworks
  • Incident handling laws and legal compliance

MODULE 02: INCIDENT HANDLING AND RESPONSE PROCESS

  • Incident handling and response (IH&R) process
  • Preparation for incident handling and response
  • Incident recording and assignment
  • Incident triage
  • Notification process
  • Containment process
  • Evidence gathering and forensic analysis
  • Eradication process
  • Recovery process
  • Post-incident activities
  • Information sharing activities

MODULE 03: FIRST RESPONSE

  • Concept of first response
  • Securing and documenting the crime scene
  • Collecting evidence at the crime scene
  • Preserving, packaging, and transporting evidence

MODULE 04: HANDLING AND RESPONDING TO MALWARE INCIDENTS

  • Malware incident handling
  • Preparation for malware incidents
  • Detection of malware incidents
  • Containment of malware incidents
  • Malware analysis
  • Eradication of malware incidents
  • Recovery after malware incidents
  • Malware incident case study
  • Best practices against malware incidents

MODULE 05: HANDLING AND RESPONDING TO EMAIL SECURITY INCIDENTS

  • Email security incidents
  • Preparation for email security incidents
  • Detection and containment of email security incidents
  • Analysis of email security incidents
  • Eradication of email security incidents
  • Recovery after email security incidents
  • Email security incident case study
  • Best practices against email security incidents

MODULE 06: HANDLING AND RESPONDING TO NETWORK SECURITY INCIDENTS

  • Network security incident handling
  • Preparation for network security incidents
  • Detection and validation of network security incidents
  • Unauthorized access incidents
  • Inappropriate usage incidents
  • Denial-of-service incidents
  • Wireless network security incidents
  • Network security incident case study
  • Best practices against network security incidents

MODULE 07: HANDLING AND RESPONDING TO WEB APPLICATION SECURITY INCIDENTS

  • Web application incident handling
  • Preparation for web application security incidents
  • Detection and containment of web application security incidents
  • Analysis of web application security incidents
  • Eradication of web application security incidents
  • Recovery after web application security incidents
  • Web application incident case study
  • Best practices for securing web applications

MODULE 08: HANDLING AND RESPONDING TO CLOUD SECURITY INCIDENTS

  • Cloud security incident handling
  • Steps involved in handling cloud security incidents
  • Azure security incident handling
  • AWS security incident handling
  • Google Cloud security incident handling
  • Cloud security incident case study
  • Best practices against cloud security incidents

MODULE 09: HANDLING AND RESPONDING TO INSIDER THREATS

  • Insider threat handling
  • Preparation for insider threats
  • Detection and containment of insider threats
  • Analysis of insider threats
  • Eradication of insider threats
  • Recovery after insider attacks
  • Insider threat case study
  • Best practices against insider threats

MODULE 10: HANDLING AND RESPONDING TO ENDPOINT SECURITY INCIDENTS

  • Endpoint security incident handling
  • Mobile-based security incidents
  • IoT-based security incidents
  • OT-based security incidents
  • Endpoint security incident case study

Forudsætninger

Toppen

Attendees should meet the following prerequisites:

  • It is recommended that you have at least 1 year of experience in the cybersecurity domain in order to maximize course outcomes.

Certificeringstest

Toppen

Recommended as preparation for the following exam:

  • 212-89 - EC-Council Certified Incident Handler

Examination

Exam Availability
ECC Exam Portal

Number of Questions
100

Duration
3 Hours

Test Format
Multiple Choice