ECIH Cert Prep: Certified Incident Handler v2 (212-89)
Offered By: LinkedIn Learning
Course Description
Overview
Learn the skills you need to become a successful incident handler and response team member, with an eye on passing the Certified Incident Handler v2 (E|CIH) exam.
Syllabus
Introduction
- Overview
- ECIH v2 EC-Council certification overview
- Information security and incident management
- What is vulnerability management?
- What are threat assessments?
- Risk management: Vocabulary
- Risk management: The process
- Risk management: The NIST RMF
- Incident handling best practices, standards, and frameworks
- Incident handling and legal compliance
- Step one: Prepare for incident handling and response
- Step two: Incident recording and assignment
- Step three: Incident triage
- Step four: Notification
- Step five: Containment
- Step six: Evidence gathering and forensic analysis
- Step seven: Eradication
- Step eight: Recovery
- Step nine: Postincident activities
- Forensics and first response
- Principles of digital evidence collection
- Data acquisition
- Volatile evidence collection
- Static evidence collection and anti-forensics
- Preparation for handling malware incidents
- Detection of malware incidents
- Containment of malware incidents
- Eradication of malware incidents
- Recovery after malware incidents
- Handling email security incidents
- Preparation handling network security incidents
- Detection and validation of network security incidents
- Handling unauthorized access incidents
- Handling inappropriate usage incidents
- Handling denial-of-service incidents
- Handling wireless network security incidents
- Preparation to handle web app security incidents
- Detecting and analyzing web app security incidents
- Containment of web app security incidents
- Eradication of web app security incidents
- Recovery from web app security incidents
- Web app security threats and attacks
- Cloud computing concepts
- Best practices against cloud security incidents
- Best practices against insider threats
- Security checks using buck-security in Linux
- Volatile evidence collection in Linux and Windows
- Using OSForensics to find hidden material
- Analyzing nonvolatile data using the Autopsy tool
- Malware analysis
- Collecting information by tracing emails
- Using OSSIM
- Using Wireshark and Nmap
- Using Suricata IDS
- What does a SQL injection attack look like?
- What does a XSS attack look like?
Taught by
ITProTV
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy