Certified Incident Handler ECIHv2

from EC Counci Renowned Certified Incident Handler v2 Course


Duration : 3 Days (21hrs) / 9.30am-5.30pm

Course Summary

The EC-Council Certified Incident Handler v2 (ECIH) course aims to provide the fundamental skills to handle and respond to computer security threats and incidents. The course teaches the underlying principles and techniques for detecting and responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.

It also teaches risk assessment methodologies and the various laws and policies relating to incident handling. In addition, participants will learn about computer forensics and its role in handling and responding to incidents; incident response teams; incident management training response and incident recovery techniques.

What you will learn

At the end of the course,participants will be equipped with skills to create incident handling and response policies with the following:

  • Introduction to Incident Handling & Response
  • Incident Handling and Response Process
  • Forensic Readiness and First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents.
  • Handling and Responding to Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats

This course prepares you for EC-Council Certified Incident Handler exam 212-89.

Why take Courses at iENABLER




The EC-Council Certified Incident Handler v2 (ECIH) course aims to provide the fundamental skills to handle and respond to computer security threats and incidents.

The course teaches the underlying principles and techniques for detecting and responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.


Course Information

Course Objective

EC Counci Certified Incident Handler (ECIHv2)

The EC-Council Certified Incident Handler v2 (ECIH) course aims to provide the fundamental skills to handle and respond to computer security threats and incidents.

The course teaches the underlying principles and techniques for detecting and responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.

It also teaches risk assessment methodologies and the various laws and policies relating to incident handling. In addition, participants will learn about computer forensics and its role in handling and responding to incidents; incident response teams; incident management training response and incident recovery techniques.

At the end of the course, besides the ability to handle the various types of computer security incidents, participants will be equipped with skills to create incident handling and response policies.

Download Course Brochure

Course Fees & SkillsFuture Funding


Government Funding
Course is eligble for SDF Training Grant & Absentee Payroll from SSG. 
Self-Sponsored trainee may offset course fee payable using their SkillsFuture Credit Claim or/& PSEA (subject to available balance in trainee's account). 
Terms and conditions apply. 

SDF Course Title : EC-Council Certified Incident Handler ECIH (SF)
Course Ref No. : CRS-Q-0035775-ICT

WSQ Funding Course Fees
WSQ Funding
Singapore Citizens & Singapore PRs
Total Fee
Incl Regn Fee
Less
SDF Training
Grant
NETT
Fee
Excl GST 7%
NETT
Fee
Incl GST 7%
SME Company S$1,329.00S$1,050.00S$279.00S$372.03
Non-SME CompanyS$1,329.00S$315.00S$1,014.00S$1,107.03
Self-SponsoredS$1,329.00S$315.00S$1,014.00S$1,107.03*
 
Mid-Career Enhanced Scheme (MCES)
- Singaporean, 40 yrs & above
S$1,329.00S$1,050.00S$279.00S$372.03*
 
Note: * - SkillsFuture Credit Claims or/and PSEA may be used to offset the course fees.
Course Fees (Applicable to Non-SDF/Foreigner)
Course Title Normal Course Fees Promotional Course
Fees valid till
31-Dec-2099
Promo Course Fees w GST
Certified Incident Handler ECIHS$1,299.00S$1,299.00S$1,389.93
Registration FeeS$30.00S$30.00S$32.10
Total FeeS$1,329.00S$1,329.00S$1,422.03


(Contact Customer Service @ 6333 4843)

Course Prerequisite

Before taking this course, you should have:
• Basic computer literacy & Basic PC operating system navigation skills
• Basic Internet usage skills & Basic networking knowledge


Course Outline

1.0 Introduction to Incident Handling and Response

  • Overview of Information Security Concepts
  • Understanding Information Security Threats and Attack Vectors
  • Understanding Information Security Incident
  • Overview of Incident Management
  • Overview of Vulnerability Management
  • Overview of Threat Assessment
  • Understanding Risk Management
  • Understanding Incident Response Automation and Orchestration
  • Incident Handling and Response Best Practices
  • Overview of Standards
  • Overview of Cybersecurity Frameworks
  • Importance of Laws in incident Handling
  • Incident Handling and Legal Compliance

  • Download Course brochure

    2.0 Incident Handling and Response Process

  • Overview of Incident Handling and Response (IH&R) Process
  • Step 1: Preparation for incident Handling and Response
  • Step 2: Incident Recording and Assignment
  • Step 3: Incident Triage
  • Step 4: Notification
  • Step5: Containment
  • Step 6: Evidence Gathering and Forensics Analysis
  • Step 7: Eradication
  • Step 8: Recovery
  • Step 9: Post-Incident Activities
  • 3.0 Forensic Readiness and First Response

  • Introduction to Computer Forensics
  • Overview of Forensic Readiness
  • Overview of First Response
  • Overview of Digital Evidence
  • Understanding the Principles of Digital Evidence Collection
  • Collecting the Evidence
  • Securing the Evidence
  • Overview Data Acquisition
  • Understanding the Volatile Evidence Collection
  • Understanding the Static Evidence Collection
  • Performing Evidence Analysis
  • Overview of Anti-Forensics
  • 4.0 Handling and Responding to Malware Incidents

  • Overview of Malware Incident Response
  • Preparation for Handling Malware Incidents
  • Detecting Malware Incidents
  • Containment of Malware Incidents
  • Eradication of Malware Incidents
  • Recovery after Malware Incidents
  • Guidelines for Preventing Malware Incidents
  • 5.0 Handling and Responding to Email Security Incidents

  • Overview of Email Security Incidents
  • Preparation for Handling Email Security Incidents
  • Detection and Containment of Email Security Incidents
  • Eradication of Email Security Incidents
  • Recovery after Email Security Incidents
  • 6.0 Handling and Responding to Network Security Incidents

  • Overview of Network Security Incidents
  • Preparation of Handling Network Security Incidents
  • Detection and Validation of Network Security Incidents
  • Handling Unauthorized Access Incidents
  • Handling inappropriate Usage Incidents
  • Handling Denial-of-Service Incidents
  • Handling Wireless Network Security Incidents
  • 7.0 Handling and Responding to Web Application Security Incidents

  • Overview of Web Application Incident Handling
  • Web Application Security Threats and Attacks
  • Preparation to Handle Web Application Security Incidents
  • Detecting and Analyzing Web Application Security Incidents
  • Containment of Web Application Security Incidents
  • Eradication of Web Application Security Incidents
  • Recovery from Web Application Security Incidents
  • Best Practices for Securing Web Applications
  • 8.0 Handling and Responding to Cloud Security Incidents

  • Cloud Computing Concepts
  • Overview of Handling Cloud Security Incidents
  • Cloud Security Threats and Attacks
  • Preparation for Handling Cloud Security Incidents
  • Detecting and Analyzing Cloud Security Incidents
  • Containment of Cloud Security Incidents
  • Eradication of Cloud Security Incidents
  • Recovering from Cloud Security Incidents
  • Best Practices Against Cloud-based incidents
  • 9.0 Handling and Responding to Insider Threats

  • Introduction to Insider Threats
  • Preparation for Handling Insider Threats
  • Detecting and Analyzing Insider Threats
  • Containment of Insider Threats
  • Eradication of Insider Threats
  • Recovery after Insider Attacks
  • Best Practices Against Insider Threats

  • Course Schedule

    Course Title   Venue Register Online
    Course Mode
    Start Date
    End Date
    Time
    Certified Incident Handler ECIHSingaporeRegisterFULL-TIME22-Sep-202124-Sep-20219:30AM-5:30PM 
    Certified Incident Handler ECIHSingaporeRegisterFULL-TIME17-Nov-202119-Nov-20219:30AM-5:30PM 
    Certified Incident Handler ECIHSingaporeRegisterFULL-TIME20-Dec-202122-Dec-20219:30AM-5:30PM