Ec-council | Learning
EC-Cuncil Certified Incident Manager
Boost your expertise in incident management with ECIH d
About the Certified Incident Handler (ECIH) course
Course outline
Course outline
- Introduction to Incident Management and Response
- Incident management and response processes
- First reply
- Management and response to malware incidents
- Managing and responding to e-mail security incidents
- Management and response to network security incidents
- Managing and responding to web application security incidents
- Cloud security incident management and response
- Management and response to internal threats
- Management and response to terminal security incidents
Description
The EC-Council Certified Incident Handler certification provides students with a method-based program that uses a holistic approach to cover broad concepts of organizational incident management and response, from the preparation and planning of the incident response process to the recovery of the organization's assets following a security incident. The skills taught in EC-Council's ECIH program are sought out by cybersecurity professionals around the world and are respected by employers.
What you will learn:
- Key issues affecting the world of information security
- Different types of cybersecurity threats, attack vectors, threat actors, and their motives, objectives and goals of cybersecurity attacks
- Various attack and defence frameworks (e.g. Cyber Kill Chain Methodology, MITRE ATT&CK Framework, etc.)
- The fundamentals of information security concepts (vulnerability assessment, risk management, cyber threat intelligence, threat modelling and threat tracking)
- The fundamentals of incident management (information security incidents, signs and costs of an incident, incident management and response, and automation and orchestration of incident response)
- Various best practices, standards, cybersecurity frameworks, laws, acts and regulations related to incident management and response
- The various steps involved in planning an incident management and response program (planning, recording and assigning, sorting, reporting, containment, gathering evidence and forensic analysis, eradication, recovery and post-incident activities)
- The importance of the first response and the first response procedure (evidence collection, documentation, preservation, packaging and transport)
- How to manage and respond to various types of cybersecurity incidents systematically (malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, internal threats and terminal security incidents)
Review
Success Score
In order to maintain the high integrity of our certification exams, the EC-Cuncil exams are offered in several forms (i.e. different question banks). Each form is carefully analyzed through beta tests performed with an appropriate sample group under the supervision of a committee of experts in the field who ensure that each of our examinations has not only academic rigour but also applicability in the "real world". We also have a process to determine the difficulty of each issue. The individual evaluation then contributes to an overall "cut score" for each form of examination. To ensure that each form has fair evaluation standards, cutting scores are set on a "by examination" basis. Depending on the form of examination presented, cutting scores can range from 60% to 78%.
Examination Name: ECIH 212-89
Number of questions: 100
Test Delivery: EC-Cuncil Examination Portal
Test Format: Multiple Choices
Roles
Professional Roles:
- Incident Manager
- Responder to incidents
- Response to incidents
- Consultant/Associate/Analyst/Engineering/Specificist/Expert/Manager
- Analyst/Engineer/Manager CSIRT
- Partner/Analyst/Engineer/Specialist/Information Security Manager
- Consultant/Associate/ Cyber Security and Defence Analyst
- Computer Security Operations Centre Analyst (Analyst/ SOC Engineer)
- Investigator/Consultant/Analyst/Manager in Cybercrime
- Digital Forensic Analyst
- Analyst/Manager of vulnerabilities and cyber risks
- Cyber Intelligence Analyst and Cyber Security Threat Analyst/Specialist
- Cyber Security Incident Response Team Leader
- Intrusion Tester


