EC-Council Certified Incident Handler (ECIH) - Bare 2 dager

Hvorfor

Hva sier kundene våre?

"Intensivt og informativt. "
Anon. - Microsoft Dynamics AX 2012 R3 Financials (5 dager), 14/9/2015 til 18/9/2015

Her er 8 grunner til hvorfor du skal gjennomføre ditt ECIH hos Firebrand Training:

Finn ut hvordan vi raskt hjelper deg med å lære nye ferdigheter

  1. Du blir utdannet og sertifisert på bare 2 dager. Hos oss får du din utdanning og sertifisering på rekordtid, en sertifisering du også gjennomfører der og da som en integrert del av den intensive, akselererte utdanningen.
  2. Alt er inkludert. Et engangsbeløp dekker alt kursmaterial, eksamen, kost og losji og tilbyr den mest kostnadseffektive måten å gjennomføre ditt ECIH kurs og sertifisering på. Og dette uten noen uannonserte ytterligere kostnader.
  3. Du klarer sertifiseringen første gangen eller kan gå kurset om igjen kostnadsfritt. Det er vår garanti. Vi er sikre på at du vil klare din ECIH sertifisering første gangen. Men skulle du mot formodning ikke gjøre det kan du innen et år komme tilbake og kun betale for eventuelle overnattinger og din eksamen. Alt annet er gratis.
  4. Du lærer deg mer.Tradisjonelle utdanningsdager varer fra kl. 09.00 til 16.00 med lange lunsj- og kaffepauser. Hos Firebrand Training får du minst 12 timers effektiv og fokusert kvalitetsutdanning hver dag sammen med din instruktør, uten private eller arbeidsrelaterte, forstyrrende momenter.
  5. Du lærer deg ECIH raskere. Vi kombinerer de tre innlæringsmetodene (Presentasjon |Øving| Diskusjon) slik at vi gjennomfører kurset på en måte som sikrer at du lærer deg raskere og lettere.
  6. Du er i sikre hender.Vi har utdannet og sertifisert 68.075 personer, vi er partner med alle de store navn i bransjen og vi har vunnet atskillige utmerkelser, bla. a. "Årets Learning Partner 2010, 2011, 2012, 2013 og 2015” fra Microsoft Danmark og med en vekst på 1430 % siden 2009 er vi årets Gazelle prisvinner på Sjælland, Danmark.
  7. Du lærer deg ikke bare teorien. Vi har videreutviklet ECIH kursen og tilbyr flere praktiske øvelser og sikrer på den måten, at du kan bruke dine ferdigheter for å løse daglige praktiske problemstillinger.
  8. Du lærer av de beste. Våre instruktører på ECIH er de beste i bransjen og tilbyr en helt unik blanding av kunnskap, praktisk erfaring og pasjon for å lære bort.

Er du klar for kurset? Ta en GRATIS test for å måle og vurdere kunnskapsnivået ditt.

Hva

01 Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

02 Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

03 Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

04 CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

05 Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

06 Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the t malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

07 Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

08 Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

09 Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Interessert? Se våre priser her eller ring oss på 21 96 61 82

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Interessert? Se våre priser her eller ring oss på 21 96 61 82

Firebrand Training tilbyr kvalifiserte kurs- og sertifiseringsprogram som inkluderer alt, er enkelt for kunden og er utviklet med fokus på de spesifikke behov som våre deltagere har. Vi sikrer at alle detaljer vil bli tatt hånd om slik at du helt kan fokusere på dine kunnskaps- og sertifiseringsmål.

Våre kurs- og sertifiseringsprogram inkluderer alt med:

  • Praktisk orientert utdanning som bruker vår unike metodikk (Presentasjon |Øving |Diskusjon).
  • Omfattande kursmaterial och labbmanualer – vi utvecklar traditionella kursmaterial för att motsvara de specifika krav som accelererad inlärning ställer.
  • En resultatorientert, beskrivende og analytisk øvelseshåndbok – øvelsene som demonstreres i kursmaterialet er testet mot de nyeste operativsystemene med alle tillegg og rettingen tatt i bruk.
  • Et helt instruktørsstyrt kursprogram med 24 timers tilgang til klasserom, labutstyr og instruktør.
  • Eksamensvoucher og sertifiseringstest som gjennomføres på plass under kurset.
  • Vår sertifiseringsgaranti som betyr at vi tilbyr en uvilkårlig garanti om at du mottar din sertifisering. Du har rett til å gjenta ditt kurs så mange ganger du trenger innen en 12 måneders periode til sertifiseringen er oppnådd. Alt du tenger å betale er eventuelle nye test- og losjigebyrer.
  • Kost og losji, samt tilgang til kaffe, te, frukt og snacks under hele kurset.
  • Transport til og fra nærmeste flyplass/ togstasjon før og etter gjennomført kurs.

Interessert? Se våre priser her eller ring oss på 21 96 61 82

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Interessert? Se våre priser her eller ring oss på 21 96 61 82

Når

Når ønsker du å ta det akselererte kurset?

Start

Slutt

Kapasitet

Registrer deg

Ferdig

 

Ledige plasser

Registrer deg

Ledige plasser

Registrer deg

Ledige plasser

Registrer deg

Anmeldelser

Vi har lært opp 68.075 personer på 12 år. Vi ba dem om å anmelde vår akselererte opplæring. Akkurat nå har 96,73% angitt at Firebrand overgikk forventningene:

"Great experience on my second visit. Definitely would recommend this method of training."
Christopher Dyke, Atos. - EC-Council Certified Incident Handler (ECIH) (2 dager) (17/9/2018 til 18/9/2018)

"Good training also for people without much experience."
Anonym - EC-Council Certified Incident Handler (ECIH) (2 dager) (24/7/2018 til 25/7/2018)

"I dont think Ive learned this much in 5 days before, and Ive got tons of more information to dig into. This really is accelerated training. I really prefer this way of learning over the traditional, slow style of learning. It is really intense, but you also learn a lot - dont expect any lazyness here! Be rested before you arrive, theres a lot of information to take in. The Firebrand staff is very nice and accomodating."
E.Ø.. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/7/2016 til 8/7/2016)

"Good teachers make accelerated learning possible!"
Peder Illum, MedCom. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (11/4/2016 til 15/4/2016)

"Brilliant teacher, high speed education in a well working testenvironment."
Tom Thomsson . - EC-Council Certified Ethical Hacker (CEH) (5 dager) (1/2/2016 til 5/2/2016)

"Would definitely recommend Firebrand to fellow work mates and friends. Super educational experience where everything that can be done to made you feel comfortable and immersed in an academic environment is done. Its the real deal and I wouldnt hesitate coming back for another course. Bring on the next course certification. "
I.R.. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (1/2/2016 til 5/2/2016)

"CEH course is very exciting and give you a 5 days journey in high level stuff."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (1/2/2016 til 5/2/2016)

"Excellent condensed training. A lot of subjects covered in small time."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (1/2/2016 til 5/2/2016)

"An excellent training to systemize your knowledge and learn from experts in the information security field."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/11/2015 til 6/11/2015)

"Good, funny and knowledgeable instructor. Nice accommodations and friendly staff."
S.B.F.. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/11/2015 til 6/11/2015)

"I had a great time, lots of fun. But brace yourselves, information overflow and sleepless nights are coming."
Oliver Rickfors . - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/11/2015 til 6/11/2015)

"Intense studying gives good results, highly recommend!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (24/8/2015 til 28/8/2015)

"Fast paced course allowing you to save time but only appropriate if you have the right background knowledge and energy."
Francisco Blas Izquierdo Riera , Coresec Systems AB. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (24/8/2015 til 28/8/2015)

"Hard week on CEH, I was a little misplaced, but I had so much fun and I have learned a lot anyway. I it has defiantly given me the information I need to carry out my work. "
Thomas Bonde Ejby , AXVICE. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (24/8/2015 til 28/8/2015)

"brilliant training provider. would definitely come back!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (24/8/2015 til 28/8/2015)

"Intensive and filled with info that will keep one busy for the coming weeks."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/5/2015 til 8/5/2015)

"Could be shorter, but overall a great experience."
Johan Bogg , Iftac AB. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/5/2015 til 8/5/2015)

"It was a very high tempo, but I have learnt a lot! Would definitely go here again."
Marcus Persson , Sigma. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/2/2015 til 6/2/2015)

"Purely proffesional, my best certification experience by a mile. Will do it again"
Jahmai Enime , CoreLogic. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (3/11/2014 til 7/11/2014)

"Sundsgården and Firebrand staff ROCKS. "
Peder Illum , Medcom. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (3/11/2014 til 7/11/2014)

"NICE STAFF! Good food and accommodation. "
Andreas Lindkvist . - EC-Council Certified Ethical Hacker (CEH) (5 dager) (3/11/2014 til 7/11/2014)

"Absolutely perfect."
Stefan Karjalainen , Atea Sverige. - EC-Council Disaster Recovery Professional Certification (5 dager) (15/9/2014 til 19/9/2014)

"Very much Worth it"
Jens Arnfelt , -. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (5/5/2014 til 9/5/2014)

"Like Nike says, "Just do it"!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (3/2/2014 til 7/2/2014)

"First time on a Firebrand course. Great concept. Would recommend to others."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/9/2013 til 6/9/2013)

"Its hard but its worth it"
Bjarne Warming . - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/9/2013 til 6/9/2013)

"The course provided me with the right knowledge to get the job done."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/9/2013 til 6/9/2013)

"Simply great training!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (2/9/2013 til 6/9/2013)

"If you know what you want & are passionate about hacking this is the place to be"
Caj Abrahamsson, Betsson. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/3/2013 til 8/3/2013)

"Intense - time flyes when you are having fun."
Lars Fischer , The Danish Board of Technology. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (14/5/2012 til 18/5/2012)

"Very good intensive training. Good hands-on training"
Anonym, Ficora NCSA-FI - EC-Council Certified Ethical Hacker (CEH) (5 dager) (14/5/2012 til 18/5/2012)

"Awesome training and personell. Wonderful to be able to loose yourself in the subject. "
Thomas Eriksen, FDE A/S. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (14/5/2012 til 18/5/2012)

"Nice to get to an isloated studyplace, and to focus 100% on the material. Good teacher, with experiance from the realworld."
Nils Bystrom , Uppsala University. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (13/2/2012 til 17/2/2012)

"Great training and a great instructor who often uses real worldscenarios, and not only training material."
Giuliano Maras, Onevinn AB. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (13/2/2012 til 17/2/2012)

"One of the best courses I've attended. People are organised and experienced."
Feras Alsubaiai, Aljfs. - EC-Council Certified Chief Information Security Officer (CCISO) (3 dager) (3/12/2018 til 5/12/2018)

"The level of knowledge and insight provided by the instructor was fantastic. I really enjoyed the way he taught away from the Powerpoint, and drew diagrams and explained things fully."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"I feel the instructor is a fantastic trainer using real world examples to help explain key terminology. even though there were many slides very little time was spent looking at them and it was more engaging by his own written examples and demonstrations. I hope I get the instructor as a trainer on my next Firebrand course."
J.S.. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"A wealth of information and a really interactive classroom environment. Great to meet people from different companies and share our knowledge."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"The instructor was a great teacher;the course was really engaging."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"Long days and tiring but you learn a lot in an accelerated time. "
Anonymous. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"Good information, lots of knowledge, good time."
Anonymous. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"The instructor had excellent industry experience and was able to give us useful insight into the CND modules with his valued experience. "
Anonymous, Precis Properties Ltd. - EC-Council Certified Network Defender (CND) (4 dager) (12/11/2018 til 15/11/2018)

"Long hard days but great course."
Nicholas Craib, N/A. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (1/10/2018 til 5/10/2018)

"Great training with everything needed. I was able to concentrate on training with no distractions."
Grant Gibson, AGI Media. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (9/7/2018 til 13/7/2018)

"The instructor has a very good knowledge and experience on the training subjects. The training was over my expectation and I hoped I had visited such training in the past."
Anonym - EC-Council Certified Security Analyst (ECSA) (5 dager) (25/6/2018 til 29/6/2018)

"Appreciated the fact that the instructor clearly had wide ranging knowledge around all the topics covered and brought the course to life with great enthusiasm."
Richard Pople, Virgin Media. - EC-Council Certified Security Analyst (ECSA) (5 dager) (25/6/2018 til 29/6/2018)

"Usual good training, helps with everything being located on site. "
Anonym - EC-Council Certified Security Analyst (ECSA) (5 dager) (25/6/2018 til 29/6/2018)

"Great instructor, who worked really hard to help us learn and develop after the course."
Andrew Moore, University of London. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/6/2018 til 8/6/2018)

"Now on my fifth course with Firebrand. Feeling tired now, but definitely worthwhile."
Jonathan Freedman , Howard Kennedy. - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/6/2018 til 8/6/2018)

"The trainer has been a very good. He has managed to make the course very interesting, providing his experience and real use cases. I'd recommend taking a course with him."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dager) (4/6/2018 til 8/6/2018)

Se priser