logo
Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt
Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat.

    Email: admin@aitconline.org || Phone +234 (0) 8177777327, 7035118386
    RC 1072910

    EC-Council Certified Incident Handler (ECIH)

    ACE INTERNATIONAL TRAINING CENTER / EC-Council Certified Incident Handler (ECIH)

    The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. After attending this course, they will be able to create incident handling and response policies as well as deal with various types of computer security incidents. The IT incident management training program will enable students to be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler.

    Modules

    • Introduction to Incident Handling and Response
    • Incident Handling and Response Process
    • Forensic Readiness and First Response
    • Handling and Responding to Malware Incidents
    • Handling and Responding to Email Security Incidents
    • Handling and Responding to Network Security Incidents
    • Handling and Responding to Web Application Security Incidents
    • Handling and Responding to Cloud Security Incidents
    • Handling and Responding to Insider Threats

    Duration: 18hrs

    Who to Attend?

    Penetration testers, risk assessment administrators, cyber forensic investigators, IT managers, system engineers & administrators, vulnerability assessment auditorse.t.c

    Register