top of page

Related Courses

Certified Incident Handler (ECIH) v2 Online Course & PDF Guides

PRICE: 20.00 USD | Size: 21.5 GB | Duration : 19+ Hours | 55 Lessons | 

BRAND : Expert TRAINING | ENGLISH | Free PDF Guides |INSTANT DOWNLOAD

Buy Now with USD $ - Certified Incident Handler (ECIH) v2  Online Course & PDF Guides

 

 

  • INTRODUCTION TO INCIDENT HANDLING AND RESPONSE
    • Overview
    • ECIHv2 EC-Council Certification Overview
    • Information Security And Incident Management
    • What Is Vulnerability Management
    • What Are Threat Assessments
    • Risk Management - Vocabulary
    • Risk Management - The Process
    • Risk Management - The NIST RMF
    • Incident Handling Best Practices, Std., Frameworks
    • Incident Handling And Legal Compliance
  • INCIDENT HANDLING AND RESPONSE PROCESS
    • Step 1: Prepare For Incident Handling, Response
    • Step 2: Incident Recording And Assignment
    • Step 3: Incident Triage
    • Step 4: Notification
    • Step 5: Containment
    • Step 6: Evidence Gathering And Forensic Analysis
    • Step 7: Eradication
    • Step 8: Recovery
    • Step 9: Post-Incident Activities
  • FORENSIC READINESS AND FIRST RESPONSE
    • Forensics And First Response
    • Principles Of Digital Evidence Collection
    • Data Acquisition
    • Volatile Evidence Collection
    • Static Evidence Collection And Anti-Forensics
  • HANDLING AND RESPONDING TO MALWARE INCIDENTS
    • Preparation For Handling Malware Incidents
    • Detection Of Malware Incidents
    • Containment Of Malware Incidents
    • Eradication Of Malware Incidents
    • Recovery After Malware Incidents
  • HANDLING AND RESPONDING TO EMAIL SECURITY INCIDENTS
    • Handling Email Security Incidents
  • HANDLING AND RESPONDING TO NETWORK SECURITY INCIDENTS
    • Preparation Handling Network Security Incidents
    • Detection, Validation Network Security Incidents
    • Handling Unauthorized Access Incidents
    • Handling Inappropriate Usage Incidents
    • Handling Denial-Of-Service Incidents
    • Handling Wireless Network Security Incidents
  • HANDLING AND RESPONDING TO WEB APPLICATION SECURITY INCIDENTS
    • Preparation To Handle Web App Security Incidents
    • Detecting, Analyzing Web App Security Incidents
    • Containment Of Web Application Security Incidents
    • Eradication Of Web Application Security Incidents
    • Recovery From Web Application Security Incidents
    • Web Application Security Threats And Attacks
  • HANDLING AND RESPONDING TO CLOUD SECURITY INCIDENTS
    • Cloud Computing Concepts
    • Best Practices Against Cloud Security Incidents
  • HANDLING AND RESPONDING TO INSIDER THREATS
    • Best Practices Against Insider Threats
  • HANDS-ON WITH E|CIH TOOLS
    • Security Checks Using Buck-Security On Linux
    • Volatile Evidence Collection - Linux, Windows
    • Using OSForensics To Find Hidden Material
    • Analyzing Non-Volatile Data Using Autopsy
    • Malware Analysis
    • Collecting Information By Tracing Emails
    • Using OSSIM
    • Using Wireshark And NMAP
    • Using Suricata IDS
    • What Does A SQL Injection Attack Look Like
    • What Does A XSS Attack Look Like

Certified Incident Handler (ECIH) v2 Online Course & PDF Guides

SKU: EXT-23062022-07
$20.00Price
  • You can Instant Download a PDF file 

    After successful payment, 

    This PDF File Contains Course Download links

    You can Download This Course immediately from the click that Links.

bottom of page