EC-Council Certified Incident Handler (ECIH) - Kun 2 dage

Hvorfor

Hvad siger vores kunder?

"Tekniknørderi med andre nørder i en hel uge er balsam for sjælen :)"
Silas Hansen - EC-Council Certified Ethical Hacker (CEH) (5 dage), 2/11/2015 til 6/11/2015

Her er 4 gode grunde til at du skal tage ECIH hos Firebrand:

Se Hvordan Vi Hjælper Dig Med at Få Nye Færdigheder Hurtigt

  1. Du bliver ECIH uddannet og certificeret hurtigere. Du lærer mere på vores 2 dages accelererede kursus og får mindst 12 timers daglig uddannelse i et distraktionsfrit miljø.
  2. Dit ECIH kursus er alt-inklusiv. Du får en gennemskuelig pris, der dækker alle kursusmaterialer, eksamen, overnatning og forplejning. Du skal ikke tænke på andet end at lære.
  3. Bestå ECIH den første gang eller kom tilbage, gratis. Din instruktør er ekspert, og træner dig ud fra accelererede metoder, så du lærer hurtigere og har de bedste muligheder for at bestå eksamen første gang. Men hvis du mod forventning ikke består, er du dækket af vores Certificeringsgaranti.
  4. Tag ECIH hos en prisvindende uddannelsesleverandør. Vi har vundet adskillige udmærkelser heriblandt Microsofts "Årets Learning Partner" hele fem gange og to Børsen Gazelle priser. Firebrand er din hurtigste vej til uddannelse, og vi har sparet 70.652 deltagere for mere end en million spildte timer siden 2001.

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.

Hvad

01 Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

02 Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

03 Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

04 CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

05 Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

06 Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the t malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

07 Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

08 Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

09 Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Firebrand Training tilbyder kvalificerede uddannelses- og certificeringsprogram som inkluderer alt, er enkelt for kunden og udviklet med fokus på de specifikke behov som vores deltagere har. Vi sørger for, at alle detaljer er på plads, så du kun skal fokusere på dine indlærings- og certificeringsmål.

Vores kursus- og certificeringsprogram inkluderer alt med;

  • Praktisk orienteret undervisning som anvender vores Præsentation|Øvelse|Diskussion metodik
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program med 24 timers adgang til både undervisningslokale, labudstyr og instruktøren
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the
  • Vores certificeringsgaranti som indebærer, at vi giver en uvilkårlig garanti for at du opnår din certificering. Du har ret til at komme tilbage til kurset så mange gange du ønsker, indenfor de første 12 måneder, indtil du har fået din certificering. Det eneste du skal betale er eventuelle nye eksamens- og logiomkostninger
  • Transport til og fra nærmeste lufthavn/togstation både før og efter kurset

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • On site eksaminering som en del af dit kursus
  • Certificeringsgaranti

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 78 79 16 53 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Interesseret? Se vores priser her eller ring 78 79 16 53

Hvornår

Hvornår vil du tage dit accelererede kursus?

Starter

Slutter

Tilgængelighed

Tilmelding

Tilgængelige pladser

Tilmelding

Tilgængelige pladser

Tilmelding

Tilgængelige pladser

Tilmelding

Kundereferencer

Vi har uddannet over 70.652 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,75% sagt, at Firebrand oversteg deres forventninger:

"Great experience on my second visit. Definitely would recommend this method of training."
Christopher Dyke, Atos. - EC-Council Certified Incident Handler (ECIH) (2 dage) (17/9/2018 til 18/9/2018)

"Good training also for people without much experience."
Anonym - EC-Council Certified Incident Handler (ECIH) (2 dage) (24/7/2018 til 25/7/2018)

"Godt kursus, gode faciliteter og god forplejning."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Godt kursus, dejligt sted og god mad."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Der har ikke været tid til at være social, da alt har været studie, men det hele har været interessant."
Ebbe Vestergaard. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Fantastiske omgivelser, god support stab, gode undervisningsfaciliteter, gode vaerelser og fantastisk instruktor. Sundsgaarden med fantastisk udsigt til Danmark"
Leif Andersen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Tekniknørderi med andre nørder i en hel uge er balsam for sjælen :)"
Silas Hansen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Utroligt stort udbytte set i forhold til den tid man investerer i et kursus."
Preben Bensen , Finansforbundet. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (10/12/2012 til 14/12/2012)

"I dont think Ive learned this much in 5 days before, and Ive got tons of more information to dig into. This really is accelerated training. I really prefer this way of learning over the traditional, slow style of learning. It is really intense, but you also learn a lot - dont expect any lazyness here! Be rested before you arrive, theres a lot of information to take in. The Firebrand staff is very nice and accomodating."
E.Ø.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/7/2016 til 8/7/2016)

"Good teachers make accelerated learning possible!"
Peder Illum, MedCom. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Brilliant teacher, high speed education in a well working testenvironment."
Tom Thomsson . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"Would definitely recommend Firebrand to fellow work mates and friends. Super educational experience where everything that can be done to made you feel comfortable and immersed in an academic environment is done. Its the real deal and I wouldnt hesitate coming back for another course. Bring on the next course certification. "
I.R.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"CEH course is very exciting and give you a 5 days journey in high level stuff."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"Excellent condensed training. A lot of subjects covered in small time."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"An excellent training to systemize your knowledge and learn from experts in the information security field."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Good, funny and knowledgeable instructor. Nice accommodations and friendly staff."
S.B.F.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"I had a great time, lots of fun. But brace yourselves, information overflow and sleepless nights are coming."
Oliver Rickfors . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Intense studying gives good results, highly recommend!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Fast paced course allowing you to save time but only appropriate if you have the right background knowledge and energy."
Francisco Blas Izquierdo Riera , Coresec Systems AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Hard week on CEH, I was a little misplaced, but I had so much fun and I have learned a lot anyway. I it has defiantly given me the information I need to carry out my work. "
Thomas Bonde Ejby , AXVICE. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"brilliant training provider. would definitely come back!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Intensive and filled with info that will keep one busy for the coming weeks."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/5/2015 til 8/5/2015)

"Could be shorter, but overall a great experience."
Johan Bogg , Iftac AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/5/2015 til 8/5/2015)

"It was a very high tempo, but I have learnt a lot! Would definitely go here again."
Marcus Persson , Sigma. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/2/2015 til 6/2/2015)

"Purely proffesional, my best certification experience by a mile. Will do it again"
Jahmai Enime , CoreLogic. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"Sundsgården and Firebrand staff ROCKS. "
Peder Illum , Medcom. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"NICE STAFF! Good food and accommodation. "
Andreas Lindkvist . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"Absolutely perfect."
Stefan Karjalainen , Atea Sverige. - EC-Council Disaster Recovery Professional Certification (5 dage) (15/9/2014 til 19/9/2014)

"Very much Worth it"
Jens Arnfelt , -. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (5/5/2014 til 9/5/2014)

"Like Nike says, "Just do it"!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/2/2014 til 7/2/2014)

"First time on a Firebrand course. Great concept. Would recommend to others."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"Its hard but its worth it"
Bjarne Warming . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"The course provided me with the right knowledge to get the job done."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"Simply great training!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"If you know what you want & are passionate about hacking this is the place to be"
Caj Abrahamsson, Betsson. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/3/2013 til 8/3/2013)

"Intense - time flyes when you are having fun."
Lars Fischer , The Danish Board of Technology. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Very good intensive training. Good hands-on training"
Anonym, Ficora NCSA-FI - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Awesome training and personell. Wonderful to be able to loose yourself in the subject. "
Thomas Eriksen, FDE A/S. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Nice to get to an isloated studyplace, and to focus 100% on the material. Good teacher, with experiance from the realworld."
Nils Bystrom , Uppsala University. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (13/2/2012 til 17/2/2012)

"Great training and a great instructor who often uses real worldscenarios, and not only training material."
Giuliano Maras, Onevinn AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (13/2/2012 til 17/2/2012)

"Great course, make sure you sleep first as there are long days!"
Tim Smith, AJ Bell. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"One of the best courses I''ve ever done. This is the second time I have done it, absolutely fabulous!"
Samuel-Alexander Couchman. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"Very focused, intense with rich learning opportunities. Very knowledgeable instructor."
G.M.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"Facilities excellent"
Andrew Wilson, Gen2 City and Guilds Group. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"One of the best courses I''ve attended. People are organised and experienced."
Feras Alsubaiai, Aljfs. - EC-Council Certified Chief Information Security Officer (CCISO) (3 dage) (3/12/2018 til 5/12/2018)

"The level of knowledge and insight provided by the instructor was fantastic. I really enjoyed the way he taught away from the Powerpoint, and drew diagrams and explained things fully."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dage) (12/11/2018 til 15/11/2018)

"I feel the instructor is a fantastic trainer using real world examples to help explain key terminology. even though there were many slides very little time was spent looking at them and it was more engaging by his own written examples and demonstrations. I hope I get the instructor as a trainer on my next Firebrand course."
J.S.. - EC-Council Certified Network Defender (CND) (4 dage) (12/11/2018 til 15/11/2018)

"A wealth of information and a really interactive classroom environment. Great to meet people from different companies and share our knowledge."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dage) (12/11/2018 til 15/11/2018)

"The instructor was a great teacher;the course was really engaging."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dage) (12/11/2018 til 15/11/2018)

"Long days and tiring but you learn a lot in an accelerated time. "
Anonymous. - EC-Council Certified Network Defender (CND) (4 dage) (12/11/2018 til 15/11/2018)

Se priser