Skip links

Ec-council | Learning

EC-Council Certified Incident Handler

EC-Council-s Certified Incident Handler program teams students with the knowledge, skills, and abilities to effectively prepare for, deal with, and eradicate threats and threats in an incident.

This program provides the entire process of Incident Handling and Response and hands-on labs that teach the practical procedures and techniques required to effectively plan, record, sort, notify and contain.

ECIH also covers post incident activities such as Container, Eradication, Evidence Gathering and Forensic Analysis, leading to prosecution or countermeasures to ensure the incident is not reproduced.

With over 95 labs, 800 tools covered, and exhibition to Incident Handling activities on oven different operating systems, E|CIH provides a well-rounded, but tactical approach to planning for and dealing with cyber incidents.

About the Certified Incident Handle (ECIH) Race

Outline Race
  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats
  • Handling and Responding to Endpoint Security Incidents
 

EC-Council-s Certified Incident Handler provides students with a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recover organizational assets after a security incident. The skills taught in EC-Councils ECIH program are intended by cybersecurity professionals from around the world and is respected by employers.

What you will learn:
  • Key issues plaguing the information security world
  • Various types of cyber security threats, attack vectors, threats actors, and their motivations, goals, and objectives of cyber security attacks
  • Various attack and defence frameworks (Cyber Kill Chain Methodology, MITRE ATT&CK Framework, etc.)
  • Fundamentals of information security concepts
  • (information security incidents, signs and costs of an incident, incident handling and response, and incident response automation and orchestration)
  • Different incident handling and response best practices, standards, cyber security frameworks, laws, acts, and regulations
  • Various steps involved in planning incident handling and response program (Planning, recording and assignment, triage, notification, containment, evidence sharing and forensic analysis, eradication, recovery, and post-incident activities)
  • Importance of first response and first response procedure
  • How to handle and respond to different types of cyber security incidents in a system way (malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, insider threats-related incidents, and endpoint security incidents)
Passing Score

In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms. Each form is carefully analyzed through beta testing with an appropriate sample group under the search of a committe of subject matter experts that ensure that each of our reviews not only has academic rigor but also has "real world" applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributors to an overall "Cut Score" for each exam form. To ensure each form has equal assessment standard, cut scores are set on a "per exam form" basis. Depending on which exam form is challenged, cut scores can range from 60% to 78%.

Review Name: ECIH 212-89

Number of Questions: 100

Delivery Test: EC-Council Exam Portal

Test Format: Multiple Choice

Job Roles
  • Incident Handler
  • Incident Responder
  • Incident Response
  • Consultant/Associate/Analyst/Engineer/Specialist/Expert/Manager CSIRT Analyst/Engineer/Manager
  • Information Security Associate/ Analyst/Engineer/Specialist/Manager
  • Cyber Defense Security Consultant/Associate/Analyst

 

  • IT Security Operations Center Analyst (SOC Analyst/Engineer)
  • Cyber Forensic Investigator/Consultant/Analyst/Manager Digital Forensic Analyst
  • Cyber Risk Vulnerability Analyst/Manager
  • Cyber Intelligence Analyst and Cyber Security Threat Analyst/Specialist
  • Cyber Security Incident Response Team Lead
  • Penetration Testing
This website uses cookies to improve your web experience.
EnglishenEnglishEnglish
0