Course information

Certified Incident Handler Certification Course Outline

Module 1: Introduction to Incident Handling and Response

  • Understand Information Security Threats and Attack Vectors
  • Explain Various Attack and Defence Frameworks
  • Understand Information Security Concepts
  • Understand Information Security Incidents
  • Understand the Incident Management Process
  • Understand Incident Response Automation and Orchestration
  • Describe Various Incident Handling and Response Best Practices
  • Explain Various Standards Related to Incident Handling and Response
  • Explain Various Cyber Security Frameworks
  • Understand Incident Handling Laws and Legal Compliance

Module 2: Incident Handling and Response Process

  • Understand Incident Handling and Response (IH&R) Process
  • Explain Preparation Steps for Incident Handling and Response
  • Understand Incident Recording and Assignment
  • Understand Incident Triage
  • Explain the Process of Notification
  • Understand the Process of Containment
  • Describe Evidence Gathering and Forensics Analysis
  • Explain the Process of Eradication
  • Understand the Process of Recovery
  • Describe Various Post-Incident Activities
  • Explain the Importance of Information Sharing Activities

Module 3: First Response

  • Explain the Concept of First Response
  • Understand the Process of Securing and Documenting the Crime Scene
  • Understand the Process of Collecting Evidence at the Crime Scene
  • Explain the Process for Preserving, Packaging, and Transporting Evidence

Module 4: Handling and Responding to Malware Incidents

  • Understand the Handling of Malware Incidents
  • Explain Preparation for Handling Malware Incidents
  • Understand Detection of Malware Incidents
  • Explain Containment of Malware Incidents
  • Describe How to Perform Malware Analysis
  • Understand Eradication of Malware Incidents
  • Explain Recovery after Malware Incidents
  • Case Study: Understand the Handling of Malware Incidents
  • Describe Best Practices against Malware Incidents

Module 5: Handling and Responding to Email Security Incidents

  • Understand Email Security Incidents
  • Explain Preparation Steps for Handling Email Security Incidents
  • Understand Detection and Containment of Email Security Incidents
  • Understand Analysis of Email Security Incidents
  • Explain Eradication of Email Security Incidents
  • Understand the Process of Recovery after Email Incidents
  • Case Study: Understand the Handling of Email Security Incidents
  • Explain Best Practices against Email Security Incidents

Module 6: Handling and Responding to Network Security Incidents

  • Understand the Handling of Network Security Incidents
  • Prepare to Handle Network Security Incidents
  • Understand Detection and Validation of Network Security Incidents
  • Understand the Handling of Unauthorised Access Incidents
  • Understand the Handling of Inappropriate Usage Incidents
  • Understand the Handling of Denial-of-Service Incidents
  • Understand the Handling of Wireless Network Security Incidents
  • Case Study: Understand the Handling of Network Security Incidents
  • Describe Best Practices against Network Security Incidents

Module 7: Handling and Responding to Web Application Security Incidents

  • Understand the Handling of Web Application Incidents
  • Explain Preparation for Handling Web Application Security Incidents
  • Understand Detection and Containment of Web Application Security Incidents
  • Explain Analysis of Web Application Security Incidents
  • Understand Eradication of Web Application Security Incidents
  • Explain Recovery after Web Application Security Incidents
  • Case Study: Understand the Handling of Web Application Security Incidents
  • Describe Best Practices for Securing Web Applications

Module 8: Handling and Responding to Cloud Security Incidents

  • Understand the Handling of Cloud Security Incidents
  • Explain Various Steps Involved in Handling Cloud Security Incidents
  • Understand How to Handle Azure Security Incidents
  • Understand How to Handle AWS Security Incidents
  • Understand How to Handle Google Cloud Security Incidents
  • Case Study: Understand the Handling of Cloud Security Incidents
  • Explain Best Practices against Cloud Security Incidents

Module 9: Handling and Responding to Insider Threats

  • Understand the Handling of Insider Threats
  • Explain Preparation Steps for Handling Insider Threats
  • Understand Detection and Containment of Insider Threats
  • Explain Analysis of Insider Threats
  • Understand Eradication of Insider Threats
  • Understand the Process of Recovery after Insider Attacks
  • Case Study: Understand the Handling of Insider Threats
  • Describe Best Practices against Insider Threats

Module 10: Handling and Responding to Endpoint Security Incidents

  • Understand the Handling of Endpoint Security Incidents
  • Explain the Handling of Mobile-based Security Incidents
  • Explain the Handling of IoT-based Security Incidents
  • Explain the Handling of OT-based Security Incidents
  • Case Study: Understand the Handling of Endpoint Security Incidents

Show moredowndown

Who should attend this EC-Council Certified Incident Handler (ECIH) Certification Course?

The ECIH Training is designed to equip participants with the skills necessary to manage and mitigate the impact of various security incidents. This training course is ideal for a diverse range of professionals who are involved in, affected by, or interested in incident response and handling within their organisations. This certification course benefits a wide range of professionals, including:

  • Incident Handlers
  • Risk Assessment Administrators
  • System Administrators
  • Firewall Administrators
  • Network Managers
  • Operations Managers
  • Technical Support Engineers
  • Cybersecurity Professionals

Prerequisites of the EC-Council Certified Incident Handler (ECIH) Certification Course

There are no formal prerequisites for attending this ECIH Course.

EC-Council Certified Incident Handler (ECIH) Certification Course Overview

Incident Handling is critical in Cybersecurity, focusing on preparing for, managing, and recovering from security breaches and cyber-attacks. In an age where data breaches and security incidents are commonplace, effectively handling these situations is crucial for maintaining the integrity, confidentiality, and availability of information systems.

This Certified Incident Handler Certification is vital for Cybersecurity Professionals, System Administrators, and Network Engineers who protect an organisation’s IT infrastructure. Understanding incident handling is essential for these professionals to quickly contain and mitigate the effects of incidents, thereby reducing the potential damage and recovery time.

The Knowledge Academy’s 3-day Certified Incident Handler Certification provides comprehensive training in the strategies and actions necessary for effective incident handling and response. Delegates will learn through theoretical knowledge and practical exercises, covering incident response preparation, detection, and recovery processes.

Course Objectives

  • To equip delegates with the skills to prepare for and respond to cybersecurity incidents
  • To understand the lifecycle of incident handling, from detection to recovery
  • To teach practical skills in system forensics, response, and analysis
  • To enable professionals to mitigate the impact of security incidents effectively
  • To instil best practices in documenting and reporting incidents
  • To prepare participants for the Certified Incident Handler examination

Upon obtaining this certification, delegates will possess a robust framework for incident handling that enhances their organisation's resilience against cyber threats. They will be prepared to manage and mitigate incidents efficiently, ensuring rapid recovery and minimal impact on business operations.

Show moredowndown

What's included in this Certified Incident Handler (ECIH) Certification Course?

  • Certified Incident Handler Examination (ECIH 212-89)
  • World-Class Training Sessions from Experienced Instructors 
  • Certified Incident Handler (ECIH) Certificate 
  • Digital Delegate Pack

Certified Incident Handler Certification Exam Information

The ECIH Certification exam, offered by EC-Council, assesses a candidate expertise in handling and responding to various types of cybersecurity incidents. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 100

Why choose us

Our Adelaide venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

The city of Adelaide is the capital of the state of South Australia. The population of Adelaide currently stands at approximately 1.30 million people, making it the 5th moth populated city in Australia. The city and its residents are referred to as Adelaidean’s. The unemployment rate for Adelaide currently stands at just under 6%. This is slightly lower in comparison to the national average unemployment rate which currently stands at just over 6%. Adelaide has three public universities that are local to the city, as well as a private university and three colleges of foreign universities. The University of Adelaide is consistently ranked in the top 1% of universities worldwide, as well as being part of the Group of Eight, as well as the Sandstone Universities. The university has produced 104 Rhodes scholars as well as five Nobel laureates. The University of South Australia is the largest in the state with a student enrolment rate of over 33,000 students, more than 10,000 of them being international. 

Show moredown

Address

36 franklin Street, 

South Australia 5000,

Adelaide, 

Australia

T: +61 272026926

Ways to take this course

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Incident Handler Certification in Adelaide. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

Unlock your potential with The Knowledge Academy's Certified Incident Handler Certification in Adelaide, accessible anytime, anywhere on any device. Enjoy 90 days of online course access, extendable upon request, and benefit from the support of our expert trainers. Elevate your skills at your own pace with our Online Self-paced sessions.

Experience the most sought-after learning style with The Knowledge Academy's Certified Incident Handler Certification in Adelaide. Available in 490+ locations across 190+ countries, our hand-picked Classroom venues offer an invaluable human touch. Immerse yourself in a comprehensive, interactive experience with our expert-led Certified Incident Handler Certification in Adelaide sessions.

best_trainers

Highly experienced trainers

Boost your skills with our expert trainers, boasting 10+ years of real-world experience, ensuring an engaging and informative training experience

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

Our Classroom courses with limited class sizes foster discussions and provide a personalised, interactive learning environment

value_for_money

Great value for money

Achieve certification without breaking the bank. Find a lower price elsewhere? We'll match it to guarantee you the best value

Streamline large-scale training requirements with The Knowledge Academy's In-house/Onsite at your business premises. Experience expert-led classroom learning from the comfort of your workplace and engage professional development.

tailored_learning_experience

Tailored learning experience

Leverage benefits offered from a certification that fits your unique business or project needs

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

Our offers a unique chance for your team to bond and engage in discussions, enriching the learning experience beyond traditional classroom settings

monitor_progress

Monitor employees progress

The course know-how will help you track and evaluate your employees' progression and performance with relative ease

What our customers are saying

Certified Incident Handler Certification in Adelaide FAQs

This certification validates expertise in handling and responding to cybersecurity incidents effectively, ensuring systems and data integrity.
This training equips you with advanced skills to manage and mitigate cyber threats, enhancing job security and career growth in Cybersecurity.
The ECIH Course enhances your skills in incident response, increases job prospects, and positions you as a valuable asset in cybersecurity.
There are no formal prerequisites to attend this training.
Yes, the ECIH (EC-Council Certified Incident Handler) Certification focuses on incident handling and response, while CIH (Certified Information Systems Security Professional Incident Handler) or E|CIH might refer to other incident response certifications with different scopes.
Yes, we provide support via phone & email prior to attending, during and after the course.
In this course, delegates will have training with our experienced instructors, a digital delegate pack consisting of important notes related to this course, and a certificate after course completion.
The CIH course enhances skills in handling and responding to cyber incidents, improving an organisation's defense strategies against security breaches and cyber threats.
Certified professionals can pursue roles such as Incident Handler, Security Analyst, and Cybersecurity Specialist, with increased job opportunities and higher earning potential in the cybersecurity field.
Yes, delegates receive an EC-Council Certified Incident Handler Certificate upon successful course completion, validating their skills and knowledge in cybersecurity incident handling.
To prepare effectively, study the course materials thoroughly, practice with mock exams, and participate in hands-on exercises to gain practical experience.
Course confirmation details are sent within 24 to 48 hours after registration. Check your email, including the spam folder, for confirmation.
The Knowledge Academy stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking this certification.
The training fees for Certified Incident Handler ECIH Certificationin Adelaide starts from AUD9995
The Knowledge Academy is the Leading global training provider for Certified Incident Handler ECIH Certification.
Show more down

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on EC – Council Certification Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on +61 272026926 and speak to our training experts, we should be able to help you with your requirements.

cross

BIGGEST
BLACK FRIDAY SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.