×
EC-Council

ECIH – Certified Incident Handler

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This two day, instructor led EC-Council Certified Incident Handler (ECIH) course is an intensive training program designed to equip participants with the essential knowledge and practical skills needed to effectively manage and respond to cybersecurity incidents. This course is tailored to provide a deep understanding of incident handling and response processes, emphasizing the identification, containment, mitigation, and recovery from security breaches and cyberattacks. ECIH combines theoretical concepts with real-world scenarios, ensuring that participants can confidently address incidents in diverse, dynamic environments. At the completion of this course, participants will be able to:

  • Understand the fundamentals of incident handling and response.
  • Identify and classify different types of cybersecurity incidents.
  • Develop the skills to effectively contain and eradicate security incidents.
  • Understand how to perform the techniques for incident recovery and post-incident analysis.
  • Gain insights into the legal and ethical aspects of incident handling.
  • Acquire hands-on experience with incident handling tools and technologies.
  • Improve their incident handling and response capabilities in real-world scenarios.
  • Be prepared to take the EC-Council Certified Incident Handler (ECIH) certification exam.

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

Program Level

Advanced

Duration

2 Days / 16 hours Training

Course Outline

Overview of Incident Response and Handling

  • Statistics on Cyber Incidents
  • Computer Security (CS)
  • Business Assets – Information
  • Classifying Data
  • Common Terms
  • Information Warfare
  • Key Theories For Information Security
  • Vulnerability, Threat, and Attack
  • CS Incident Types and Examples
  • Incidents and Disaster Recovery Plans
  • Common Signals of an Incident
  • Low, Middle and High Level Categories of Incidents
  • Prioritization
  • Response and Handling
  • Technologies for Disaster Recovery
  • Virtualization’s Impact
  • Incident Costs
  • Reporting
  • Vulnerability Resources

Risk Assessments

  • Overview of Risk
  • Policies and Assessment
  • Method for Risk Assessment by NIST
  • Assessing Workplace Risk
  • Strategies for Analyzing and Mitigating Risk
  • Cost/Benefit Analysis
  • Method for Control Implementation by NIST
  • Residual Risk
  • Tools for Managing Risk

Steps for Incident Response and Handling

  • Identifying and Handling an Incident
  • Need for and Goals of Incident Response
  • Creating an Effective Plan for Incident Response
  • 17 Steps for Incident Response and Handling
  • Training and Creating Awareness
  • Security Training and Awareness Checklist
  • Managing Incidents
  • Incident Response Team
  • Interrelationship Between Incident Response, Handling, and Management
  • Common Best Practices and Policy
  • Creating a Checklist
  • RTIR – Incident Handling System
  • RPIER – 1st Responder Framework

CSIRT

  • Computer Security Incident Response Team (CSIRT)
  • Purpose of an IRT
  • Goals, Strategy and Vision of a CSIRT
  • CSIRT – Common Names
  • Mission Statement
  • Constituency and CSIRT’s Place within an Organization
  • Peer Relationship
  • Environment Types for CSIRT
  • Creating a CSIRT
  • Team Roles
  • Services, Policies and Procedures
  • Handling a Case and the Incident Report Form
  • Techniques for Tracking and Reporting
  • CERT
  • CERT-CC
  • CERT(R) Coordination Center: Incident Reporting Form
  • CERT:OCTAVE
  • World CERTs
  • IRTs Around the World

Handling Incidents with Network Security

  • DoS and DDoS Incidents
  • Detecting a DoS Attack
  • Preparing for a DoS Attack and How to Handle It
  • Incidents of Unauthorized Access
  • Incidents of Inappropriate Usage
  • Incidents with Many Components
  • Tools for Monitoring Network Traffic
  • Tools for Auditing the Network
  • Network Protection Tools

Malicious Code Incidents

  • Malware Samples Count
  • Viruses, Worms, Trojans and Spywares
  • Preparing for Incident Handling
  • Incident Prevention
  • Detection of Malware
  • Creating a Strategy for Containment
  • Gathering and Handling Evidence
  • Eradication and Recovery
  • Recommendations
  • Antivirus Systems

Insider Threats

  • Overview and Anatomy of an Insider Attack
  • Risk Matrix
  • Detecting and Responding to Insider Threats
  • Insider’s Incident Response Plan
  • Common Guidelines for Threat Detection and Prevention
  • Tools for Monitoring Employees

Forensic Analysis and Incident Response

  • Computer Forensics
  • Objectives and Role of Forensic Analysis
  • Forensic Readiness And Business Continuity
  • Forensic Types
  • Computer Forensic Investigators and the Investigation Process
  • Overview and Characteristics of Digital Evidence
  • Overview and Challenges of Collecting Evidence
  • Forensic Policy
  • Forensics in the IS Life Cycle
  • Guidelines and Tools for Forensic Analysis

Incident Reporting

  • Overview of Incident Reporting and Why You Should Report Any Incidents
  • Why Many Organizations Don’t Report
  • Creating the Report and Where to Send It
  • Preliminary Reporting Form
  • CERT Incident Reference Numbers
  • Incorporating Contact Information
  • Host Summary and Activity Description
  • Log Extracts
  • Time Zone
  • Incident Categories
  • Organizations to Report Computer Incident
  • Guidelines to Follow
  • Sample Reporting Forms

Incident Recovery

  • Overview of Incident Recovery and Common Principles
  • Steps for Recovery
  • Contingency and Continuity of Operations Planning
  • Business Continuity Planning
  • Incident Recovery Plans and the Planning Process

Security Laws and Policies

  • Introduction to and the Key Pieces of a Security Policy
  • Common Policy Goals and Characteristics
  • Designing and Implementing a Security Policy
  • Acceptable Use Policy (AUP)
  • Access and Asset Control Policies
  • Audit Trail
  • Logging
  • Documenting
  • Collecting and Preserving Evidence
  • Information Security
  • NIACAP Policy
  • Physical Security Guidelines and Policies
  • Personnel Security Guidelines and Policies
  • Law and Incident Handling
  • Laws and Acts
  • IP Laws

Exam Information

Exam Details:

Code: 212-89

Number of Questions: 50

Passing Score: 70%

Duration: 2 hours

Format: multiple choice

Delivery: Prometric and Pearson VUE

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)