EC-Council Certified Incident Handler (ECIH) - Kun 2 dage

Hvorfor

Hvad siger vores kunder?

"Tekniknørderi med andre nørder i en hel uge er balsam for sjælen :)"
Silas Hansen - EC-Council Certified Ethical Hacker (CEH) (5 dage), 2/11/2015 til 6/11/2015

Her er 4 gode grunde til at du skal tage ECIH hos Firebrand:

Se Hvordan Vi Hjælper Dig Med at Få Nye Færdigheder Hurtigt

  1. Du bliver ECIH uddannet og certificeret hurtigere. Du lærer mere på vores 2 dages accelererede kursus og får mindst 12 timers daglig uddannelse i et distraktionsfrit miljø.
  2. Dit ECIH kursus er alt-inklusiv. Du får en gennemskuelig pris, der dækker alle kursusmaterialer, eksamen, overnatning og forplejning. Du skal ikke tænke på andet end at lære.
  3. Bestå ECIH den første gang eller kom tilbage, gratis. Din instruktør er ekspert, og træner dig ud fra accelererede metoder, så du lærer hurtigere og har de bedste muligheder for at bestå eksamen første gang. Men hvis du mod forventning ikke består, er du dækket af vores Certificeringsgaranti.
  4. Tag ECIH hos en prisvindende uddannelsesleverandør. Vi har vundet adskillige udmærkelser heriblandt Microsofts "Årets Learning Partner" hele fem gange og to Børsen Gazelle priser. Firebrand er din hurtigste vej til uddannelse, og vi har sparet 68.075 deltagere for mere end en million spildte timer siden 2001.

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.

Hvad

01 Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

02 Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

03 Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

04 CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

05 Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

06 Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the t malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

07 Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

08 Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

09 Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Firebrand Training tilbyder kvalificerede uddannelses- og certificeringsprogram som inkluderer alt, er enkelt for kunden og udviklet med fokus på de specifikke behov som vores deltagere har. Vi sørger for, at alle detaljer er på plads, så du kun skal fokusere på dine indlærings- og certificeringsmål.

Vores kursus- og certificeringsprogram inkluderer alt med;

  • Praktisk orienteret undervisning som anvender vores Præsentation|Øvelse|Diskussion metodik
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program med 24 timers adgang til både undervisningslokale, labudstyr og instruktøren
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the
  • Vores certificeringsgaranti som indebærer, at vi giver en uvilkårlig garanti for at du opnår din certificering. Du har ret til at komme tilbage til kurset så mange gange du ønsker, indenfor de første 12 måneder, indtil du har fået din certificering. Det eneste du skal betale er eventuelle nye eksamens- og logiomkostninger
  • Transport til og fra nærmeste lufthavn/togstation både før og efter kurset

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • On site eksaminering som en del af dit kursus
  • Certificeringsgaranti

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 78 79 16 53 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Interesseret? Se vores priser her eller ring 78 79 16 53

Hvornår

Hvornår vil du tage dit accelererede kursus?

Starter

Slutter

Tilgængelighed

Tilmelding

Afsluttet

 

Begrænsede pladser

Tilmelding

Tilgængelige pladser

Tilmelding

Kundereferencer

Vi har uddannet over 68.075 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,69% sagt, at Firebrand oversteg deres forventninger:

"Godt kursus, gode faciliteter og god forplejning."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Godt kursus, dejligt sted og god mad."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Der har ikke været tid til at være social, da alt har været studie, men det hele har været interessant."
Ebbe Vestergaard. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Fantastiske omgivelser, god support stab, gode undervisningsfaciliteter, gode vaerelser og fantastisk instruktor. Sundsgaarden med fantastisk udsigt til Danmark"
Leif Andersen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Tekniknørderi med andre nørder i en hel uge er balsam for sjælen :)"
Silas Hansen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Utroligt stort udbytte set i forhold til den tid man investerer i et kursus."
Preben Bensen , Finansforbundet. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (10/12/2012 til 14/12/2012)

"I dont think Ive learned this much in 5 days before, and Ive got tons of more information to dig into. This really is accelerated training. I really prefer this way of learning over the traditional, slow style of learning. It is really intense, but you also learn a lot - dont expect any lazyness here! Be rested before you arrive, theres a lot of information to take in. The Firebrand staff is very nice and accomodating."
E.Ø.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/7/2016 til 8/7/2016)

"Good teachers make accelerated learning possible!"
Peder Illum, MedCom. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Brilliant teacher, high speed education in a well working testenvironment."
Tom Thomsson . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"Would definitely recommend Firebrand to fellow work mates and friends. Super educational experience where everything that can be done to made you feel comfortable and immersed in an academic environment is done. Its the real deal and I wouldnt hesitate coming back for another course. Bring on the next course certification. "
I.R.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"CEH course is very exciting and give you a 5 days journey in high level stuff."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"Excellent condensed training. A lot of subjects covered in small time."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"An excellent training to systemize your knowledge and learn from experts in the information security field."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Good, funny and knowledgeable instructor. Nice accommodations and friendly staff."
S.B.F.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"I had a great time, lots of fun. But brace yourselves, information overflow and sleepless nights are coming."
Oliver Rickfors . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Intense studying gives good results, highly recommend!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Fast paced course allowing you to save time but only appropriate if you have the right background knowledge and energy."
Francisco Blas Izquierdo Riera , Coresec Systems AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Hard week on CEH, I was a little misplaced, but I had so much fun and I have learned a lot anyway. I it has defiantly given me the information I need to carry out my work. "
Thomas Bonde Ejby , AXVICE. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"brilliant training provider. would definitely come back!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Intensive and filled with info that will keep one busy for the coming weeks."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/5/2015 til 8/5/2015)

"Could be shorter, but overall a great experience."
Johan Bogg , Iftac AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/5/2015 til 8/5/2015)

"It was a very high tempo, but I have learnt a lot! Would definitely go here again."
Marcus Persson , Sigma. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/2/2015 til 6/2/2015)

"Purely proffesional, my best certification experience by a mile. Will do it again"
Jahmai Enime , CoreLogic. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"Sundsgården and Firebrand staff ROCKS. "
Peder Illum , Medcom. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"NICE STAFF! Good food and accommodation. "
Andreas Lindkvist . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"Absolutely perfect."
Stefan Karjalainen , Atea Sverige. - EC-Council Disaster Recovery Professional Certification (5 dage) (15/9/2014 til 19/9/2014)

"Very much Worth it"
Jens Arnfelt , -. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (5/5/2014 til 9/5/2014)

"Like Nike says, "Just do it"!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/2/2014 til 7/2/2014)

"First time on a Firebrand course. Great concept. Would recommend to others."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"Its hard but its worth it"
Bjarne Warming . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"The course provided me with the right knowledge to get the job done."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"Simply great training!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"If you know what you want & are passionate about hacking this is the place to be"
Caj Abrahamsson, Betsson. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/3/2013 til 8/3/2013)

"Intense - time flyes when you are having fun."
Lars Fischer , The Danish Board of Technology. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Very good intensive training. Good hands-on training"
Anonym, Ficora NCSA-FI - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Awesome training and personell. Wonderful to be able to loose yourself in the subject. "
Thomas Eriksen, FDE A/S. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Nice to get to an isloated studyplace, and to focus 100% on the material. Good teacher, with experiance from the realworld."
Nils Bystrom , Uppsala University. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (13/2/2012 til 17/2/2012)

"Great training and a great instructor who often uses real worldscenarios, and not only training material."
Giuliano Maras, Onevinn AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (13/2/2012 til 17/2/2012)

"Great training with everything needed. I was able to concentrate on training with no distractions."
Grant Gibson, AGI Media. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (9/7/2018 til 13/7/2018)

"The instructor has a very good knowledge and experience on the training subjects. The training was over my expectation and I hoped I had visited such training in the past."
Anonym - EC-Council ECSA (5 dage) (25/6/2018 til 29/6/2018)

"Appreciated the fact that the instructor clearly had wide ranging knowledge around all the topics covered and brought the course to life with great enthusiasm."
Richard Pople, Virgin Media. - EC-Council ECSA (5 dage) (25/6/2018 til 29/6/2018)

"Usual good training, helps with everything being located on site. "
Anonym - EC-Council ECSA (5 dage) (25/6/2018 til 29/6/2018)

"Great instructor, who worked really hard to help us learn and develop after the course."
Andrew Moore, University of London. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/6/2018 til 8/6/2018)

"Now on my fifth course with Firebrand. Feeling tired now, but definitely worthwhile."
Jonathan Freedman , Howard Kennedy. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/6/2018 til 8/6/2018)

"The trainer has been a very good. He has managed to make the course very interesting, providing his experience and real use cases. I'd recommend taking a course with him."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/6/2018 til 8/6/2018)

"Really enjoyed my second time here - really educational with lots of information, tools and help."
J.G.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/6/2018 til 8/6/2018)

"Extraordinary good trainer! He was skilled, well educated and made course material a lot more understandable by giving examples from his own professional experience. The training itself was well prepared and well organized."
Malte Fiedler , T-Systems. - EC-Council Certified Network Defender (CND) (4 dage) (28/5/2018 til 31/5/2018)

"Courses are given in an interactive way by a highly qualified trainer which makes the courses very lively and interesting to follow."
Anonym - EC-Council Certified Network Defender (CND) (4 dage) (28/5/2018 til 31/5/2018)

"This was my first Firebrand course, I found it intense but very rewarding when I successfully passed at the end of the week. "
Richard Matthew, Lloyds Banking Group. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (30/4/2018 til 4/5/2018)

"Fantastic training, very long hours but worth it in the end. Will be booking my next course here."
Ian Lindley, Innogy Business Services. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (30/4/2018 til 4/5/2018)

Se priser