The EC-Council’s ECIH-Certified Incident Handler certification is a program that will provide students the skills they will need in order to identify and minimize the damage caused by computer security incidents. This incident response course will cover the basics of computer security incidents, including introducing students to the different kinds of security incidents and the ways these incidents can expose an information system to the risks of unauthorized access or loss of information. Certified students will gain knowledge in assessing risk, computer forensics, and creating computer security incident response teams.
Students will learn about the legal implications they will have to consider when attempting to neutralize the damage that can be caused by network security threats. The course will also cover designing suitable business continuity plans, providing students with the knowledge they will need to help their organizations continue operations in the event of a significant security incident.
Classroom Based E|CIH Certification Training
This course is offered at our two training locations in Ashburn, VA and Greenbelt, MD. Students will learn about the legal implications they will have to consider when attempting to neutralize the damage that can be caused by network security threats. The course will also cover designing suitable business continuity plans, providing students with the knowledge they will need to help their organizations continue operations in the event of a significant security incident.
Classroom-Based Training Cost: $1,995 Per Enrollment
All Times Listed in Eastern Standard Time (EST)
For information related to scheduling, please fill out the information request form to the left.
Self-Paced Online Training
Some individuals have extremely busy schedules and cannot afford to take time off to come to an on-site training class. For a more flexible option, give our online training a shot! TrainACE's online, self-paced training allows attendees to experience the benefits of classroom learning at any time, anywhere!
All of the topics and courseware follow EC-Council's authorized curriculum. Students will be provided with pre-recorded lessons to ensure they are well-prepared to successfully take on the ECIH exam!
Our ECIH Self-Paced training includes the following features:
- Interactive & explanatory instruction & lectures
- User-friendly interface with comprehensive course curriculum
- Step-by-step instructional videos
- Live, virtual lab environment(s)
- Toll-Free Educational Support
- Money-Back Guarantee
Online, Self-Paced ECIH Training Cost: $695 Per Enrollment
Custom Training for Your Organization
Is a Custom Class Right?? Not sure. Tell us about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
Topics & Concepts Covered in ECIH Training Include:
- Principles and techniques for detecting and responding to current and emerging computer security threats
- How to handle various types of incidents
- Risk assessment methodologies
- Various laws and policies related to incident handling
Recommended Training Audience and Prerequisites
Students who finish the certification will be able to enter the computer security field with the knowledge required to set up appropriate and effective policies to deal with a variety of computer security incidents. System administrators, IT managers and directors, and anyone who works in computer security can benefit from obtaining this certification.
E|CIH Certification Requirements
In order to be certified, students will need to take a two hour exam, ECIH 212-89. During the exam, the students will have to demonstrate their knowledge of several areas related to computer security incident handling, including risk assessment, the steps to identifying security incidents, in particular malicious code incidents and insider threats, and incident reporting and recovery.