EC Council Certified Incident Handler (ECIH) - Ireland

Provided by

About the course

The EC-Council Certified Incident Handler program is designed to provide the CIHfundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.

You will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, you will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make you proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.


Who should attend?

Incident handlers
Risk assessment administrators
Penetration testers
Cyber forensic investigators
Venerability assessment auditors
System administrators
System engineers
Firewall administrators
Network managers
IT managers
IT professionals
Anyone interested in incident handling and response

What will I learn?

The programme is broken into eleven modules:

Module 1: Introduction to incident response and handling
Module 2: Risk assessment
Module 3: Incident response and handling steps
Module 4: CSIRT
Module 5: Handling network security incidents
Module 6: Handling malicious code incidents
Module 7: Handling insider threats
Module 8: Forensic analysis and incident response
Module 9: Incident reporting
Module 10: Incident recovery
Module 11: Security policies and laws

How will I benefit?

Following the course you will be able to create incident handling and response policies and deal with various types of computer security incidents
Have the ability to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling

What's included?

Lunch
Refreshments
Course materials
Exam
A certificate of attendance

Related article

As we become more reliant on digital technologies, the cyber security industry has grown in order to protect organisations against online attacks. ...