ECIH Certified Incident Handler

The Certified Incident Handler (ECIH) course is designed to provide the essential skills to handle and respond to computer security incidents in an information system, The course covers various basic principles and techniques for detecting and responding to current and emerging computer security threats. Participants will be empowered on how to deal with different types of incidents, and risk assessment methodologies, Various laws and policies related to handling accidents.

The Certified Incident Handler (ECIH) course is designed to provide the essential skills to handle and respond to computer security incidents in an information system, The course covers various basic principles and techniques for detecting and responding to current and emerging computer security threats. Participants will be empowered on how to deal with different types of incidents, and risk assessment methodologies, Various laws and policies related to handling accidents.
The program also aims to raise the efficiency of the participants and their knowledge of various security incidents and response to them. such as network security incidents, malicious code incidents, Insider attack threats can create incident handling and response policies and handle different types of computer security incidents.

Course outputs
• Empowering individuals and organizations who have the ability to handle different types of cyber security incidents and respond to them in a systematic manner.
• Learn how to ensure that the organization can identify, contain and recover an attack.
• Learn how to restore the normal operations of the organization as soon as possible and mitigate the negative impact on business operations.
• Learn to minimize loss and after-busting effects of the accident.
• Enable participants to effectively formulate safety policies and ensure that quality of services is maintained at agreed levels.
• Learn how to enhance skills in dealing with incidents and enhance their operability.

interlocutor
• Introduction to incident handling and response
• Incident handling and response process
• Criminal preparedness and first response
• Handling and responding to malware incidents
• Handling and responding to email security incidents
• Handling and responding to network security incidents
• Handling and responding to web application security incidents
• Handling and responding to security cloud incidents
• Dealing with and responding to internal threats