EC-Council ATC Logo

ECIHv3

Certified Incident Handler

EC-Council ATC Logo

Das EC-Council Certified Incident Handler (ECIH) Programm ist darauf ausgelegt, die grundlegenden Fähigkeiten zu vermitteln, um Sicherheitsvorfälle in Informationssystemen zu bewältigen und darauf zu reagieren, und bereitet Sie gleichzeitig darauf vor, die ECIH-Prüfung zu bestehen. Der Kurs bietet Schulungen zur Vorfallreaktion, indem er verschiedene grundlegende Prinzipien und Techniken zur Erkennung und Reaktion auf aktuelle und aufkommende Bedrohungen der Computersicherheit behandelt. Nach der Teilnahme am Kurs werden Sie in der Lage sein, Richtlinien zur Handhabung und Reaktion auf Vorfälle zu erstellen und mit verschiedenen Arten von Sicherheitsvorfällen umzugehen.

Die ECIH-Zertifizierung erfüllt vollständig die Anforderungen der NICE 2.0- und CREST-Frameworks und ist international anerkannt. Damit erhalten Sie eine wertvolle Bestätigung Ihrer Kenntnisse im Incident Management. In diesem praxisorientierten Intensivkurs lernen Sie, wie Sie Cyberangriffe erkennen, steuern und beheben können.

Kursinhalt

  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats
  • Handling and Responding to Endpoint Security Incidents
Inhouse-Schulung jetzt anfragen

Zielgruppe

  • Alle Cyber-Sicherheitsfachleute auf mittlerer bis hoher Ebene mit mindestens 3 Jahren Erfahrung
  • Personen aus dem Bereich der Informationssicherheit, die ihre Fähigkeiten und Kenntnisse im Bereich Incident Handling und Response erweitern möchten
  • Personen, die daran interessiert sind, Cyber-Bedrohungen zu verhindern

Voraussetzungen

  • Mindestens ein Jahr Erfahrung in der Verwaltung von Windows/Unix/Linux Systemen
  • Verständnis von gängigen Netzwerk und Security Services

Kursziel

ECIH V3-Zertifizierung (EC-Council Certified Incident Handler)

Introduction to Incident Handling and Response
Understand Information Security Threats and Attack Vectors
Explain Various Attack and Defence Frameworks
Understand Information Security Concepts
Understand Information Security Incidents
Understand the Incident Management Process
Understand Incident Response Automation and Orchestration
Describe Various Incident Handling and Response Best Practices
Explain Various Standards Related to Incident Handling and Response
Explain Various Cybersecurity Frameworks
Understand Incident Handling Laws and Legal Compliance
Incident Handling and Response Process
Understand Incident Handling and Response (IH&R) Process
Explain Preparation Steps for Incident Handling and Response
Understand Incident Recording and Assignment
Understand Incident Triage
Explain the Process of Notification
Understand the Process of Containment
Describe Evidence Gathering and Forensics Analysis
Explain the Process of Eradication
Understand the Process of Recovery
Describe Various Post-Incident Activities
Explain the Importance of Information Sharing Activities
First Response
Explain the Concept of First Response
Understand the Process of Securing and Documenting the Crime Scene
Understand the Process of Collecting Evidence at the Crime Scene
Explain the Process for Preserving, Packaging, and Transporting Evidence
Handling and Responding to Malware Incidents
Understand the Handling of Malware Incidents
Explain Preparation for Handling Malware Incidents
Understand Detection of Malware Incidents
Explain Containment of Malware Incidents
Describe How to Perform Malware Analysis
Understand Eradication of Malware Incidents
Explain Recovery after Malware Incidents
Understand the Handling of Malware Incidents - Case Study
Describe Best Practices against Malware Incidents
Handling and Responding to Email Security Incidents
Understand Email Security Incidents
Explain Preparation Steps for Handling Email Security Incidents
Understand Detection and Containment of Email Security Incidents
Understand Analysis of Email Security Incidents
Explain Eradication of Email Security Incidents
Understand the Process of Recovery after Email Security Incidents
Understand the Handling of Email Security Incidents - Case Study
Explain Best Practices against Email Security Incidents
Handling and Responding to Network Security Incidents
Understand the Handling of Network Security Incidents
Prepare to Handle Network Security Incidents
Understand Detection and Validation of Network Security Incidents
Understand the Handling of Unauthorized Access Incidents
Understand the Handling of Inappropriate Usage Incidents
Understand the Handling of Denial-of-Service Incidents
Understand the Handling of Wireless Network Security Incidents
Understand the Handling of Network Security Incidents - Case Study
Describe Best Practices against Network Security Incidents
Handling and Responding to Web Application Security Incidents
Understand the Handling of Web Application Incidents
Explain Preparation for Handling Web Application Security Incidents
Understand Detection and Containment of Web Application Security Incidents
Explain Analysis of Web Application Security Incidents
Understand Eradication of Web Application Security Incidents
Explain Recovery after Web Application Security Incidents
Understand the Handling of Web Application Security Incidents - Case Study
Describe Best Practices for Securing Web Applications
Handling and Responding to Cloud Security Incidents
Understand the Handling of Cloud Security Incidents
Explain Various Steps Involved in Handling Cloud Security Incidents
Understand How to Handle Azure Security Incidents
Understand How to Handle AWS Security Incidents
Understand How to Handle Google Cloud Security Incidents
Understand the Handling of Cloud Security Incidents - Case Study
Explain Best Practices against Cloud Security Incidents
Handling and Responding to Insider Threats
Understand the Handling of Insider Threats
Explain Preparation Steps for Handling Insider Threats
Understand Detection and Containment of Insider Threats
Explain Analysis of Insider Threats
Understand Eradication of Insider Threats
Understand the Process of Recovery after Insider Attacks
Understand the Handling of Insider Threats - Case Study
Describe Best Practices against Insider Threats
Handling and Responding to Endpoint Security Incidents
Understand the Handling of Endpoint Security Incidents
Explain the Handling of Mobile-based Security Incidents
Explain the Handling of IoT-based Security Incidents
Explain the Handling of OT-based Security Incidents
Understand the Handling of Endpoint Security Incidents - Case Study

Classroom Training

Bevorzugen Sie die klassische Trainingsmethode? Ein Kurs in einem unserer Training Center, mit einem kompetenten Trainer und dem direkten Austausch zwischen allen Teilnehmern? Dann buchen Sie einen der Classroom Training Termine!

Online Training

Möchten Sie einen Kurs online besuchen? Zu diesem Kursthema bieten wir Ihnen Online-Kurstermine an. Als Teilnehmer benötigen Sie dazu einen PC mit Internet-Anschluss (mindestens 1 Mbit/s), ein Headset, falls Sie per VoIP arbeiten möchten und optional eine Kamera. Weitere Informationen und technische Empfehlungen finden Sie hier.

Inhouse-Schulung

Benötigen Sie einen maßgeschneiderten Kurs für Ihr Team? Neben unserem Standard-Angebot bieten wir Ihnen an, Kurse speziell nach Ihren Anforderungen zu gestalten. Gerne beraten wir Sie hierzu und erstellen Ihnen ein individuelles Angebot.
Inhouse-Schulung jetzt anfragen
PDF SymbolDie gesamte Beschreibung dieses Kurses mit Terminen und Preisen zum Download als PDF.

Das EC-Council Certified Incident Handler (ECIH) Programm ist darauf ausgelegt, die grundlegenden Fähigkeiten zu vermitteln, um Sicherheitsvorfälle in Informationssystemen zu bewältigen und darauf zu reagieren, und bereitet Sie gleichzeitig darauf vor, die ECIH-Prüfung zu bestehen. Der Kurs bietet Schulungen zur Vorfallreaktion, indem er verschiedene grundlegende Prinzipien und Techniken zur Erkennung und Reaktion auf aktuelle und aufkommende Bedrohungen der Computersicherheit behandelt. Nach der Teilnahme am Kurs werden Sie in der Lage sein, Richtlinien zur Handhabung und Reaktion auf Vorfälle zu erstellen und mit verschiedenen Arten von Sicherheitsvorfällen umzugehen.

Die ECIH-Zertifizierung erfüllt vollständig die Anforderungen der NICE 2.0- und CREST-Frameworks und ist international anerkannt. Damit erhalten Sie eine wertvolle Bestätigung Ihrer Kenntnisse im Incident Management. In diesem praxisorientierten Intensivkurs lernen Sie, wie Sie Cyberangriffe erkennen, steuern und beheben können.

Kursinhalt

  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats
  • Handling and Responding to Endpoint Security Incidents
Inhouse-Schulung jetzt anfragen

Zielgruppe

  • Alle Cyber-Sicherheitsfachleute auf mittlerer bis hoher Ebene mit mindestens 3 Jahren Erfahrung
  • Personen aus dem Bereich der Informationssicherheit, die ihre Fähigkeiten und Kenntnisse im Bereich Incident Handling und Response erweitern möchten
  • Personen, die daran interessiert sind, Cyber-Bedrohungen zu verhindern

Voraussetzungen

  • Mindestens ein Jahr Erfahrung in der Verwaltung von Windows/Unix/Linux Systemen
  • Verständnis von gängigen Netzwerk und Security Services

Kursziel

ECIH V3-Zertifizierung (EC-Council Certified Incident Handler)

Introduction to Incident Handling and Response
Understand Information Security Threats and Attack Vectors
Explain Various Attack and Defence Frameworks
Understand Information Security Concepts
Understand Information Security Incidents
Understand the Incident Management Process
Understand Incident Response Automation and Orchestration
Describe Various Incident Handling and Response Best Practices
Explain Various Standards Related to Incident Handling and Response
Explain Various Cybersecurity Frameworks
Understand Incident Handling Laws and Legal Compliance
Incident Handling and Response Process
Understand Incident Handling and Response (IH&R) Process
Explain Preparation Steps for Incident Handling and Response
Understand Incident Recording and Assignment
Understand Incident Triage
Explain the Process of Notification
Understand the Process of Containment
Describe Evidence Gathering and Forensics Analysis
Explain the Process of Eradication
Understand the Process of Recovery
Describe Various Post-Incident Activities
Explain the Importance of Information Sharing Activities
First Response
Explain the Concept of First Response
Understand the Process of Securing and Documenting the Crime Scene
Understand the Process of Collecting Evidence at the Crime Scene
Explain the Process for Preserving, Packaging, and Transporting Evidence
Handling and Responding to Malware Incidents
Understand the Handling of Malware Incidents
Explain Preparation for Handling Malware Incidents
Understand Detection of Malware Incidents
Explain Containment of Malware Incidents
Describe How to Perform Malware Analysis
Understand Eradication of Malware Incidents
Explain Recovery after Malware Incidents
Understand the Handling of Malware Incidents - Case Study
Describe Best Practices against Malware Incidents
Handling and Responding to Email Security Incidents
Understand Email Security Incidents
Explain Preparation Steps for Handling Email Security Incidents
Understand Detection and Containment of Email Security Incidents
Understand Analysis of Email Security Incidents
Explain Eradication of Email Security Incidents
Understand the Process of Recovery after Email Security Incidents
Understand the Handling of Email Security Incidents - Case Study
Explain Best Practices against Email Security Incidents
Handling and Responding to Network Security Incidents
Understand the Handling of Network Security Incidents
Prepare to Handle Network Security Incidents
Understand Detection and Validation of Network Security Incidents
Understand the Handling of Unauthorized Access Incidents
Understand the Handling of Inappropriate Usage Incidents
Understand the Handling of Denial-of-Service Incidents
Understand the Handling of Wireless Network Security Incidents
Understand the Handling of Network Security Incidents - Case Study
Describe Best Practices against Network Security Incidents
Handling and Responding to Web Application Security Incidents
Understand the Handling of Web Application Incidents
Explain Preparation for Handling Web Application Security Incidents
Understand Detection and Containment of Web Application Security Incidents
Explain Analysis of Web Application Security Incidents
Understand Eradication of Web Application Security Incidents
Explain Recovery after Web Application Security Incidents
Understand the Handling of Web Application Security Incidents - Case Study
Describe Best Practices for Securing Web Applications
Handling and Responding to Cloud Security Incidents
Understand the Handling of Cloud Security Incidents
Explain Various Steps Involved in Handling Cloud Security Incidents
Understand How to Handle Azure Security Incidents
Understand How to Handle AWS Security Incidents
Understand How to Handle Google Cloud Security Incidents
Understand the Handling of Cloud Security Incidents - Case Study
Explain Best Practices against Cloud Security Incidents
Handling and Responding to Insider Threats
Understand the Handling of Insider Threats
Explain Preparation Steps for Handling Insider Threats
Understand Detection and Containment of Insider Threats
Explain Analysis of Insider Threats
Understand Eradication of Insider Threats
Understand the Process of Recovery after Insider Attacks
Understand the Handling of Insider Threats - Case Study
Describe Best Practices against Insider Threats
Handling and Responding to Endpoint Security Incidents
Understand the Handling of Endpoint Security Incidents
Explain the Handling of Mobile-based Security Incidents
Explain the Handling of IoT-based Security Incidents
Explain the Handling of OT-based Security Incidents
Understand the Handling of Endpoint Security Incidents - Case Study

Classroom Training

Bevorzugen Sie die klassische Trainingsmethode? Ein Kurs in einem unserer Training Center, mit einem kompetenten Trainer und dem direkten Austausch zwischen allen Teilnehmern? Dann buchen Sie einen der Classroom Training Termine!

Online Training

Möchten Sie einen Kurs online besuchen? Zu diesem Kursthema bieten wir Ihnen Online-Kurstermine an. Als Teilnehmer benötigen Sie dazu einen PC mit Internet-Anschluss (mindestens 1 Mbit/s), ein Headset, falls Sie per VoIP arbeiten möchten und optional eine Kamera. Weitere Informationen und technische Empfehlungen finden Sie hier.

Inhouse-Schulung

Benötigen Sie einen maßgeschneiderten Kurs für Ihr Team? Neben unserem Standard-Angebot bieten wir Ihnen an, Kurse speziell nach Ihren Anforderungen zu gestalten. Gerne beraten wir Sie hierzu und erstellen Ihnen ein individuelles Angebot.
Inhouse-Schulung jetzt anfragen

PDF SymbolDie gesamte Beschreibung dieses Kurses mit Terminen und Preisen zum Download als PDF.