EC-Council Certified Incident Handler (ECIH) - Just 2 Days

Why

What do our customers say?

"Good training also for people without much experience."
Anon. - EC-Council Certified Incident Handler (ECIH) (2 days), 24/7/2018 to 25/7/2018

Four reasons why you should sit your ECIH course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be ECIH trained and certified faster. Learn more on this 2-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your ECIH course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass ECIH first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study ECIH with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 68.075 students saving more than one million hours since 2001

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

On this two day EC-Council Certified Incident Handler (ECIH) course, you’ll gain skills to handle and respond to a range of information security incidents.

Through accelerated learning you'll get 50% more training time than traditional 9-5pm courses. Meaning you'll spend more time learning and applying principles and techniques to detecting and respond to current and emerging computer security threats.

During the ECIH certification course you’ll learn to tackle a wide range of incident types that threaten your organisation including:

  • Network security incidents
  • Malicious code incidents
  • Insider attacks

As well as handling the incidents directly, you’ll develop the skills to prepare for and recover from incidents. This will include:

  • Risk assessment
  • Providing incident reports
  • Incident recovery plans
  • Incident recovery testing
  • Security policies

The ECIH course is perfect if you're an incident handler, risk assessment administrator, pen tester, cyber forensic investigator, venerability assessment auditor, system administrator, system engineer, firewall administrator or network manager. It will also benefit you if you're interested in incident handling and response.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 78 79 16 53

Read more ...

Interested? See prices or call 78 79 16 53

1 - Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

2 - Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

3 - Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

4 - CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

5 - Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

6 - Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

7 - Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

8 - Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

9 - Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 - Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 - Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Read more ...

Interested? See prices or call 78 79 16 53

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Read more ...

Interested? See prices or call 78 79 16 53

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 78 79 16 53.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC, CREST and CISSP CBK Review. Exam vouchers may also not be included for Apprentices and will require a separate purchase by an employer due to Education and Skills Funding Agency guidelines.
  • *** On site testing is not included for our PMI, GIAC, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 78 79 16 53

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Are you ready to get certified in record time?

We interview all applicants for the course on their technical background, degrees and certifications held, and general suitability. If you get through this screening process, it means you stand a great chance of passing.

Firebrand Training is an immersive training environment. You must be committed to the course. The above prerequisites are guidelines, but many students with less experience have other background or traits that have enabled their success in accelerated training through Firebrand Training.

If you have any doubts as to whether you meet the pre-requisites please call 78 79 16 53 and speak to one of our enrolment consultants, who can help you with a training plan.

Interested? See prices or call 78 79 16 53

When

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Finished

 

Open

Book now

Open

Book now

Open

Book now

Reviews

We've currently trained 68.075 students in 12 years. We asked them all to review our Accelerated Learning. Currently,
96,71% have said Firebrand exceeded their expectations:

"Good training also for people without much experience."
Anonymous - EC-Council Certified Incident Handler (ECIH) (2 days) (24/7/2018 to 25/7/2018)

"Good training also for people without much experience."
Anonymous - EC-Council Certified Incident Handler (ECIH) (2 days) (24/7/2018 to 25/7/2018)

"I dont think Ive learned this much in 5 days before, and Ive got tons of more information to dig into. This really is accelerated training. I really prefer this way of learning over the traditional, slow style of learning. It is really intense, but you also learn a lot - dont expect any lazyness here! Be rested before you arrive, theres a lot of information to take in. The Firebrand staff is very nice and accomodating."
E.Ø.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/7/2016 to 8/7/2016)

"Good teachers make accelerated learning possible!"
Peder Illum, MedCom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/4/2016 to 15/4/2016)

"Brilliant teacher, high speed education in a well working testenvironment."
Tom Thomsson . - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"Would definitely recommend Firebrand to fellow work mates and friends. Super educational experience where everything that can be done to made you feel comfortable and immersed in an academic environment is done. Its the real deal and I wouldnt hesitate coming back for another course. Bring on the next course certification. "
I.R.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"CEH course is very exciting and give you a 5 days journey in high level stuff."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"Excellent condensed training. A lot of subjects covered in small time."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (1/2/2016 to 5/2/2016)

"An excellent training to systemize your knowledge and learn from experts in the information security field."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/11/2015 to 6/11/2015)

"Good, funny and knowledgeable instructor. Nice accommodations and friendly staff."
S.B.F.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/11/2015 to 6/11/2015)

"I had a great time, lots of fun. But brace yourselves, information overflow and sleepless nights are coming."
Oliver Rickfors . - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/11/2015 to 6/11/2015)

"Intense studying gives good results, highly recommend!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"Fast paced course allowing you to save time but only appropriate if you have the right background knowledge and energy."
Francisco Blas Izquierdo Riera , Coresec Systems AB. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"Hard week on CEH, I was a little misplaced, but I had so much fun and I have learned a lot anyway. I it has defiantly given me the information I need to carry out my work. "
Thomas Bonde Ejby , AXVICE. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"brilliant training provider. would definitely come back!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/8/2015 to 28/8/2015)

"Intensive and filled with info that will keep one busy for the coming weeks."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/5/2015 to 8/5/2015)

"Could be shorter, but overall a great experience."
Johan Bogg , Iftac AB. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/5/2015 to 8/5/2015)

"It was a very high tempo, but I have learnt a lot! Would definitely go here again."
Marcus Persson , Sigma. - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/2/2015 to 6/2/2015)

"Purely proffesional, my best certification experience by a mile. Will do it again"
Jahmai Enime , CoreLogic. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/11/2014 to 7/11/2014)

"Sundsgården and Firebrand staff ROCKS. "
Peder Illum , Medcom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/11/2014 to 7/11/2014)

"NICE STAFF! Good food and accommodation. "
Andreas Lindkvist . - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/11/2014 to 7/11/2014)

"Absolutely perfect."
Stefan Karjalainen , Atea Sverige. - EC-Council Disaster Recovery Professional Certification (5 days) (15/9/2014 to 19/9/2014)

"Very much Worth it"
Jens Arnfelt , -. - EC-Council Certified Ethical Hacker (CEH) (5 days) (5/5/2014 to 9/5/2014)

"Like Nike says, "Just do it"!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/2/2014 to 7/2/2014)

"First time on a Firebrand course. Great concept. Would recommend to others."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"Its hard but its worth it"
Bjarne Warming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"The course provided me with the right knowledge to get the job done."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"Simply great training!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/9/2013 to 6/9/2013)

"If you know what you want & are passionate about hacking this is the place to be"
Caj Abrahamsson, Betsson. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/3/2013 to 8/3/2013)

"Intense - time flyes when you are having fun."
Lars Fischer , The Danish Board of Technology. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/5/2012 to 18/5/2012)

"Very good intensive training. Good hands-on training"
Anonymous, Ficora NCSA-FI - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/5/2012 to 18/5/2012)

"Awesome training and personell. Wonderful to be able to loose yourself in the subject. "
Thomas Eriksen, FDE A/S. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/5/2012 to 18/5/2012)

"Nice to get to an isloated studyplace, and to focus 100% on the material. Good teacher, with experiance from the realworld."
Nils Bystrom , Uppsala University. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/2/2012 to 17/2/2012)

"Great training and a great instructor who often uses real worldscenarios, and not only training material."
Giuliano Maras, Onevinn AB. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/2/2012 to 17/2/2012)

"Great training with everything needed. I was able to concentrate on training with no distractions."
Grant Gibson, AGI Media. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/7/2018 to 13/7/2018)

"The instructor has a very good knowledge and experience on the training subjects. The training was over my expectation and I hoped I had visited such training in the past."
Anonymous - EC-Council ECSA (5 days) (25/6/2018 to 29/6/2018)

"Appreciated the fact that the instructor clearly had wide ranging knowledge around all the topics covered and brought the course to life with great enthusiasm."
Richard Pople, Virgin Media. - EC-Council ECSA (5 days) (25/6/2018 to 29/6/2018)

"Usual good training, helps with everything being located on site. "
Anonymous - EC-Council ECSA (5 days) (25/6/2018 to 29/6/2018)

"Great instructor, who worked really hard to help us learn and develop after the course."
Andrew Moore, University of London. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Now on my fifth course with Firebrand. Feeling tired now, but definitely worthwhile."
Jonathan Freedman , Howard Kennedy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"The trainer has been a very good. He has managed to make the course very interesting, providing his experience and real use cases. I'd recommend taking a course with him."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Really enjoyed my second time here - really educational with lots of information, tools and help."
J.G.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Extraordinary good trainer! He was skilled, well educated and made course material a lot more understandable by giving examples from his own professional experience. The training itself was well prepared and well organized."
Malte Fiedler , T-Systems. - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"Courses are given in an interactive way by a highly qualified trainer which makes the courses very lively and interesting to follow."
Anonymous - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"This was my first Firebrand course, I found it intense but very rewarding when I successfully passed at the end of the week. "
Richard Matthew, Lloyds Banking Group. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic training, very long hours but worth it in the end. Will be booking my next course here."
Ian Lindley, Innogy Business Services. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Extremely good knowledgeable trainer, good course great location to the hotel. I feel like I have learnt a lot in the 5 days that I have been here ."
Mark Ben Langley, NMI metrology and gaming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Our instructor is incredible, cant say I've ever learned more on a course. We covered the course material but he added real life experience for pen testing which is invaluable. He is great at motivating people."
A.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic course delivered by a true expert."
Andrew Starr, OpenIP Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"As the first external training by the company, i can report back and give some very positive feedback :-)"
Steven Davies, S-Connect. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

See prices