EC-Council Certified Incident Handler (ECIH)
- Module 1: Introduction to Incident Handling and Response
– Understanding Information Security Threats and Attack Vectors
– Exploring Attack and Defense Frameworks
– Grasping Information Security Concepts
– Understanding Information Security Incidents
– Insight into Incident Management Processes
– Familiarizing with Incident Response Automation and Orchestration
– Describing Incident Handling and Response Best Practices
– Explanation of Standards Related to Incident Handling and Response
– Exploring Cybersecurity Frameworks
– Understanding Incident Handling Laws and Legal Compliance
Module 2: Incident Handling and Response Process
– Understanding the Incident Handling and Response Process
– Step 1: Preparation for Incident Handling and Response
– Step 2: Incident Recording and Assignment
– Step 3: Incident Triage
– Step 4: Notification
– Step 5: Containment Strategies
– Step 6: Evidence Gathering and Forensic Analysis
– Step 7: Eradication Techniques
– Step 8: Recovery Procedures
– Step 9: Post-Incident Activities
– Information Sharing Best Practices
Module 3: First Response
– Understanding the Concept of First Response
– Securing and Documenting the Crime Scene
– Collecting Evidence at the Crime Scene
– Preserving, Packaging, and Transporting Evidence
Module 4: Handling and Responding to Malware Incidents
– Understanding Malware Incidents
– Preparation for Handling Malware Incidents
– Detection of Malware Incidents
– Containment of Malware Incidents
– Performing Malware Analysis
– Eradication of Malware Incidents
– Recovery after Malware Incidents
– Case Study: Handling of Malware Incidents
– Best Practices against Malware Incidents