EC-Council Certified Incident Handler (ECIH V2)


EC-Council Certified Incident Handler (ECIH V2) Certification Training Course Overview

The EC-Council Certified Incident Handler (ECIH V2) Training and certification course will address the needs of the professionals who want to get equipped with the principles and knowledge for detecting and responding to the current security incidents and threats emerging in an information system. The course has been structured to equip professionals in creating incident handling codes, learning about laws and policies for incident handling and differentiating between various types of incidents such as network security incidents, malicious code incidents, and insider attack incidents.

Who should do EC-Council Certified Incident Handler (ECIH V2) Training?

  • Incident handlers
  • Risk assessment administrators
  • Penetration testers
  • Cyber forensic investigators
  • Venerability assessment auditors
  • System administrators and engineers
  • Firewall administrators
  • Network managers
  • IT managers
This course prepares you for Exam ECIH. Download Course Contents Test your current knowledge Qubits42

EC-Council Certified Incident Handler (ECIH V2) Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 3 Days (6 Days for 4 Hours/Day)
Fee : 1,000 (Includes Taxes) Includes Exam 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)






Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Get Quote

Course Prerequisites

  • One year of experience managing Windows/Unix/Linux systems or have equivalent knowledge and skills
  • Good understanding of common network and security services is required
     


On completion of this training, you will know:

  • Introduction to Incident Handling and Response
  • Incident Handling and Response Process
  • Forensic Readiness and First Response
  • Handling and Responding to Malware Incidents
  • Handling and Responding to Email Security Incidents
  • Handling and Responding to Network Security Incidents
  • Handling and Responding to   Web Application Security Incidents
  • Handling and Responding to Cloud Security Incidents
  • Handling and Responding to Insider Threats