Get unlimited Microsoft training for just €6,750*.
Our accelerated courses are now also available online

GIAC - Certified Incident Handler (GCIH)

Duration

Duration:

Only 5 Days

Method

Method:

Classroom / Online / Hybrid

Next date

Next date:

8.2.2021 (Monday)

Overview

Get the skills you need to detect, respond to and resolve computer security incidents in just 5 days. On this accelerated GIAC Certified Incident Handler (GCIH) course, you'll develop the skills and knowledge needed to manage sensitive security incidents.

As organisations strive to improve their cyber security, Incident Handlers are increasingly in demand and the GCIH certification qualifies you for this critical role.

You’ll build knowledge of common attack techniques, vectors and tools as you learn how to defend and respond to potentially devastating cyber attacks. On this GCIH course, you’ll also learn:

  • The incident handling process
  • How to detect malicious applications and network activity
  • High-level containment strategies to prevent attackers causing further damage
  • Incident recovery and system restoration
  • How to detect and analyse system and network vulnerabilities

Firebrand's GCIH training will prepare you for the GIAC Certified Incident Handler (GCIH) exam and provides knowledge equivalent to the SANS SEC504: Hacker Tools, Techniques, Exploits and Incident Handling.

Firebrand’s unique Lecture | Lab | Review methodology will immerse you in your accelerated GCIH course as you combine GIAC curriculum with practical and technical hands-on labs. This is crucial as GIAC recommends hands-on experience with the technology covered by your certification.

This accelerated GCIH training is ideal for IT Incident Handlers, IT Operational Team Leaders, Managers of incident handling teams, IT Security staff, IT System administrators and IT Support staff.

Four reasons why you should sit your GCIH course with Firebrand Training

  1. You'll be GCIH trained and certified faster. Learn more on this 5-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your GCIH course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass GCIH first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study GCIH with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 77119 students saving more than one million hours since 2001

Benefits

Please Note

  • Examination vouchers not included for GIAC, CREST and CISSP CBK Review
  • On site testing not included for GIAC, CREST or ITIL Managers and Revision Certification Courses

Benefits of Training with Firebrand

  • Two options of training - Residential classroom-based, or online courses
  • A purpose-built training centre – get access to dedicated Pearson VUE Select facilities
  • Certification Guarantee – pass first time or train again free (just pay for accommodation, exams and incidental costs)
  • Everything you need to certify – you’ll sit your exam at the earliest available opportunity after the course - either immediately after your classroom course, or as soon as there are slots available, if you've taken it online
  • No hidden extras – one cost covers everything you need to certify

Curriculum

Incident Handling: Identification

  • Get an understanding of important strategies to gather events, analyse them, and determine if you have an incident

Incident Handling: Overview and Preparation

  • Prove your understanding of Incident Handling, why it is important, and gain an understanding of best practices to take in preparation for an incident

Buffer Overflows and Format String Attacks

  • Demonstrate an understanding of how buffer overflows and format string attacks work and how to defend against them

Client Attacks

  • Gain an understanding of various client attacks and how to defend against them

Covering Tracks: Networks

  • Learn how attackers use tunnelling and covert channels to cover their tracks on a network, and the strategies involved in defending against them

Covering Tracks: Systems

  • Discover how attackers hide files and directories on Windows and Linux hosts and how they attempt to cover their tracks

Denial of Service Attacks

  • Get a comprehensive understanding of the different kinds of Denial of Service attacks and how to defend against them

Incident Handling: Containment

  • You’ll demonstrate an understanding of high-level strategies to prevent an attacker from causing further damage to the victim after discovering the incident.

Incident Handling: Eradication, Recovery, and Lessons Learned

  • Gain an understanding of the general approaches to get rid of the attacker's artefacts on compromised machines, the general strategy to safely restore operations, and the importance of the incident report and lessons learned meetings

Network Attacks

  • You’ll get an understanding of various network attacks and how to defend against them

Password Attacks

  • Prove your detailed understanding of the three methods of password cracking

Reconnaissance

  • Demonstrate your understanding of public and open source reconnaissance techniques

Scanning: Discovery and Mapping

  • Get introduced to scanning fundamentals; to discover and map networks and hosts, and reveal services and vulnerabilities

Scanning: Techniques and Defence

  • Learn the techniques and tools used in scanning, and how to response and prepare against scanning

Session Hijacking and Cache Poisoning

  • Demonstrate an understanding of tools and techniques used to perform session hijacking and cache poisoning, and how to respond and prepare against these attacks

Techniques for maintaining access

  • Learn how Trojan horses and rootkits operate, what their capabilities are and how to defend against them

Web Application Attacks

  • Demonstrate an understanding of the value of the Open Web Application Security Project (OWASP), as well as different Web App attacks such as account harvesting, SQL injection, Cross-Site Scripting and other Web Session attacks

Worms, Bots & Bot-Nets

  • Demonstrate a detailed understanding of what worms, bots and bot-nets are, and how to protect against them

FAQs

Frequently asked questions

Q. How do I get my GIAC GCIH certification?

To achieve your GCIH certification, you must pass the GIAC Certified Incident Handler (GCIH) exam.

Q. How much does the accelerated GCIH course cost?

You can find the accelerated GCIH course price here.

Q. What are the GCIH course prerequisites?

There are no official prerequisites to take any GIAC certification, including GCIH. However, you should be aware of the technical level of the course you want to take.

For this GCIH course, you should possess knowledge of networking protocols, Windows Command Line, and an understanding of basic computer networking and security.

Q. Are GIAC exams open book?

Yes, GIAC exams are open book and you’re encouraged to take advantage of this.

Q. What happens if I fail my GCIH exam?

If you fail your GCIH exam, you’ll be subjected to a 30-day waiting period before you can sit the exam again. The 30-day period provides candidates with additional time that can be used to master certification knowledge.

Q. Are GIAC certifications recognised by employers?

GIAC certifications are a good indication of cyber security skill and knowledge and are used by employers to select employees for hiring and promotion.

GIAC certifications fill gaps in security knowledge and few other qualifications cover the same material. Plus, GIAC certifications also contain invaluable practical knowledge, proving you know how to perform the task required.

Q. What’s the average salary for a GCIH certified professional?

The average salary for a GIAC Certified Incident Handler (GCIH) professional is £60,000 in the UK, according to ITJobsWatch.

Q. What is GIAC Gold?

The GIAC Gold is a second level certification which requires completion of a technical paper covering an important area of security.

GIAC Gold demonstrates that a GIAC certification holder understands and can communicate their knowledge in key areas of information security.

Pass any GIAC certification and you’ll get the option to apply for GIAC Gold. Applicants will work closely with an advisor to develop a technical report.

If the report is approved, you will receive GIAC Gold status and you report will be accepted into the SANS Reading Room.

Q. What is the GIAC Advisory Board, and how can I join it?

Score an average of 90% or above on your GIAC certification exam and you’ll be invited to join the GIAC Advisory Board.

Exam Track

This accelerated GCIH course will prepare you for the following exam. The exam fee is not included in the course price; if you wish to take the exam, we’ll provide instructions on how to register with GIAC.

  • GIAC Certified Incident Handler (GCIH) exam
    • Number of Questions: 150
    • Duration: 4 hours
    • Type: Proctored Exam
    • Passing score: 73%

You will be required to renew your GCIH certification every four years through Continuing Professional Experience (CPE) credits.

What's Included

The following is included on your accelerated GCIH course:

  • Firebrand courseware

Your accelerated course includes:

  • Accommodation *
  • Meals, unlimited snacks, beverages, tea and coffee *
  • On-site exams **
  • Exam vouchers **
  • Practice tests **
  • Certification Guarantee ***
  • Courseware
  • Up-to 12 hours of instructor-led training each day
  • 24-hour lab access
  • Digital courseware **
  • * For residential training only. Doesn't apply for online courses
  • ** Some exceptions apply. Please refer to the Exam Track or speak with our experts
  • *** Pass first time or train again free (just pay for accommodation, exams and incidental costs)

Prerequisites

You should possess:

  • An understanding of basic computer networking and security principles
  • Knowledge of networking protocols
  • Knowledge of the Windows command line

Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 77119 students and asked them all to review our Accelerated Learning. Currently, 96.71% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"Good knowledge and experience on Cyber Security for ICS."
Anonymous (21.11.2016 (Monday) to 25.11.2016 (Friday))

"Firebrand provided a first class course and testing centre and makes getting the certification very simple. Having both training and exam in a single centre was very helpful."
Anonymous (21.11.2016 (Monday) to 25.11.2016 (Friday))

"Perfect!"
Anonymous (21.11.2016 (Monday) to 25.11.2016 (Friday))

"Great course with big knowledge in a team of different experiences."
Anonymous (21.11.2016 (Monday) to 25.11.2016 (Friday))

"Excellent delivery and great facility."
David Chisholm, Rolls Royce. (21.10.2019 (Monday) to 25.10.2019 (Friday))

Course Dates

Start

Finish

Status

Location

Book now

24.8.2020 (Monday)

28.8.2020 (Friday)

Finished - Leave feedback

-

 

 

8.2.2021 (Monday)

12.2.2021 (Friday)

Limited availability

Nationwide

 

22.3.2021 (Monday)

26.3.2021 (Friday)

Open

Nationwide

 

3.5.2021 (Monday)

7.5.2021 (Friday)

Open

Nationwide

 

14.6.2021 (Monday)

18.6.2021 (Friday)

Open

Nationwide

 

Latest Reviews from our students