الوصف
دورة EC-Council معالج الحوادث المعتمد ECIH V2
Overview
The EC-Council Certified Incident Handler (ECIH V2) Training and certification course will address the needs of the professionals who want to get equipped with the principles and knowledge for detecting and responding to the current security incidents and threats emerging in an information system.
The course has been structured to equip professionals in creating incident handling codes, learning about laws and policies for incident handling and differentiating between various types of incidents such as network security incidents, malicious code incidents, and insider attack incidents.
Benefits
On completion of this training, you will know:
Introduction to Incident Handling and Response
Incident Handling and Response Process
Forensic Readiness and First Response
Handling and Responding to Malware Incidents
Handling and Responding to Email Security Incidents
Handling and Responding to Network Security Incidents
Handling and Responding to Web Application Security Incidents
Handling and Responding to Cloud Security Incidents
Handling and Responding to Insider Threats
The Main Topic of the Course
Module 1: Introduction to Incident Handling and Response
Module 2: Incident Handling and Response Process
Module 3: Forensic Readiness and First Response
Module 4: Handling and Responding to Malware Incidents
Module 5: Handling and Responding to Email Security Incidents
Module 6: Handling and Responding to Network Security Incidents
Module 7: Handling and Responding to Web Application Security Incidents
Module 8: Handling and Responding to Cloud Security Incidents
Module 9: Handling and Responding to Insider Threats
Course Requirements
Knowledge of networking and operating systems
One year of experience managing Windows/Unix/Linux systems or have equivalent knowledge and skills
Good understanding of common network and security services is required
Target Audience
Incident handlers
Risk assessment administrators
Penetration testers
Cyber forensic investigators
Venerability assessment auditors
System administrators and engineers
Firewall administrators
Network managers
IT managers
LAB Requirement
It is recommended to have LAB in this course
Main Course Objectives
Understand the key issues plaguing the information security world
Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
Learn the fundamentals of incident management including the signs and costs of an incident
Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
Decode the various steps involved in planning an incident handling and response program
Gain an understanding of the fundamentals of computer forensics and forensic readiness
Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents
0.0 متوسط التقييم Rated (0 التعليقات)