المزيد من هذا المعهدعرض الكل

دورة EC-Council معالج الحوادث المعتمد ECIH V2

1.100 ر.س3.550 ر.س

(0 التعليقات)

The EC-Council Certified Incident Handler (ECIH V2) Training and certification course will address the needs of the professionals who want to get equipped with the principles and knowledge for detecting and responding to the current security incidents and threats emerging in an information system..

وقت الدورة: من 6 مساءً إلى 10 مساءً
عدد أيام الدورة: 5 يوم
عدد ساعات الدورة: 40 ساعة
طريقة حضور الدورة: حضور و أونلاين
مقر التدريب: بمقر المعهد أو أونلاين على زووم
لغة التدريب: العربية
الجنس: للرجال و النساء
شهادة تدريب نهاية الدورة: نعم
شهادة معتمدة: نعم
رقم الإعتماد: ١٨٤٧٥٦٥١٩
جهة الإعتماد: المؤسسة العامة للتدريب التقني
ملاحظات اضافية: كوفي بريك وحقيبه تدريبة للحضور / الأونلاين يتم تسجل جميع المحاضرات وتسليمها للمتدرب نهاية الدورة / شهادة عربي انجليزي

بلغ عن هذه الدورة

الوصف

دورة EC-Council معالج الحوادث المعتمد ECIH V2

Overview

The EC-Council Certified Incident Handler (ECIH V2) Training and certification course will address the needs of the professionals who want to get equipped with the principles and knowledge for detecting and responding to the current security incidents and threats emerging in an information system.
The course has been structured to equip professionals in creating incident handling codes, learning about laws and policies for incident handling and differentiating between various types of incidents such as network security incidents, malicious code incidents, and insider attack incidents.

Benefits
On completion of this training, you will know:

Introduction to Incident Handling and Response
Incident Handling and Response Process
Forensic Readiness and First Response
Handling and Responding to Malware Incidents
Handling and Responding to Email Security Incidents
Handling and Responding to Network Security Incidents
Handling and Responding to Web Application Security Incidents
Handling and Responding to Cloud Security Incidents
Handling and Responding to Insider Threats

The Main Topic of the Course

Module 1: Introduction to Incident Handling and Response
Module 2: Incident Handling and Response Process
Module 3: Forensic Readiness and First Response
Module 4: Handling and Responding to Malware Incidents
Module 5: Handling and Responding to Email Security Incidents
Module 6: Handling and Responding to Network Security Incidents
Module 7: Handling and Responding to Web Application Security Incidents
Module 8: Handling and Responding to Cloud Security Incidents
Module 9: Handling and Responding to Insider Threats

Course Requirements

Knowledge of networking and operating systems
One year of experience managing Windows/Unix/Linux systems or have equivalent knowledge and skills
Good understanding of common network and security services is required

Target Audience

Incident handlers
Risk assessment administrators
Penetration testers
Cyber forensic investigators
Venerability assessment auditors
System administrators and engineers
Firewall administrators
Network managers
IT managers

LAB Requirement
It is recommended to have LAB in this course
Main Course Objectives

Understand the key issues plaguing the information security world
Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
Learn the fundamentals of incident management including the signs and costs of an incident
Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
Decode the various steps involved in planning an incident handling and response program
Gain an understanding of the fundamentals of computer forensics and forensic readiness
Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents

معلومات إضافية

طريقة حضور الدورة

أونلاين مباشر تفاعلي مع المدرب, حضور

0.0 متوسط التقييم Rated (0 التعليقات)

Rated
0%
Rated
0%
Rated
0%
Rated
0%
Rated
0%

كن أول من يقيم “دورة EC-Council معالج الحوادث المعتمد ECIH V2”

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

يجب عليك تسجيل الدخول لإضافة الصور

FAHAD ALBAKRIلم يتم العثور على تقييمات حتى الآن!
  • اسم المعهد: معهد علوم الهندسة العالي للتدريب
  • العنوان: المرسلات طريق الامام ســعـود بن عـبدالعـزيز بن محمد., بـجـانب مـكـتب شـركـة الاتـصـالات السـعـوديـة., الرياض 105230, الرياض, 11646, المملكة العربية السعودية
زيارة صفحة المعهد
المزيد من الدورات