EC-Council Certified Incident Handler (ECIH) Course Summary
EC-Council Certified Incident Handler (ECIH) Course Summary
Course Summary
Description
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to
handle and respond to the computer security incidents in an information system. The course addresses
various underlying principles and techniques for detecting and responding to current and emerging
computer security threats. Students will learn how to handle various types of incidents, risk assessment
methodologies and various laws and policy related to incident handling. After attending the course, they
will be able to create incident handling and response policies and deal with various types of computer
security incidents. The comprehensive training program will make students proficient in handling and
responding to various security incidents such as network security incidents, malicious code incidents and
insider attack threats.
In addition, the students will learn about computer forensics and its role in handling and responding to
incidents. The course also covers incident response teams, incident reporting methods and incident
recovery techniques in detail.
The ECIH certification will provide professionals greater industry acceptance as the seasoned incident
handler.
Topics
Audience
This course will significantly benefit incident handlers, risk assessment administrators, penetration testers,
cyber forensic investigators, venerability assessment auditors, system administrators, system engineers,
firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in
incident handling and response.
Prerequisites
Duration
Two days
Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for
informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these
names generically
"Charting the Course ...
Course Outline
I. Introduction to Incident Response and 2. Step 2: Determine Who Will be
Handling Harmed and How
A. Cyber Incident Statistics 3. Step 3: Analyze Risks and Check for
B. Computer Security Incident Precautions
C. Information as Business Asset 4. Step 4: Implement Results of Risk
D. Data Classification Assessment
E. Common Terminologies 5. Step 5: Review Risk Assessment
F. Information Warfare F. Risk Analysis
G. Key Concepts of Information Security 1. Need for Risk Analysis
H. Vulnerability, Threat, and Attack 2. Risk Analysis: Approach
I. Types of Computer Security Incidents G. Risk Mitigation
J. Examples of Computer Security Incidents 1. Risk Mitigation Strategies
K. Verizon Data Breach Investigations Report H. Cost/Benefit Analysis
– 2008 I. NIST Approach for Control Implementation
L. Incidents That Required the Execution of J. Residual Risk
Disaster Recovery Plans K. Risk Management Tools
M. Signs of an Incident 1. CRAMM
N. Incident Categories 2. Acuity STREAM
1. Incident Categories: Low Level 3. Callio Secura 17799
2. Incident Categories: Middle Level 4. EAR / Pilar
3. Incident Categories: High Level
O. Incident Prioritization III. Incident Response and Handling Steps
P. Incident Response A. How to Identify an Incident
Q. Incident Handling B. Handling Incidents
R. Use of Disaster Recovery Technologies C. Need for Incident Response
S. Impact of Virtualization on Incident D. Goals of Incident Response
Response and Handling E. Incident Response Plan
T. Estimating Cost of an Incident 1. Purpose of Incident Response Plan
U. Symantec Global Disaster Recovery 2. Requirements of Incident Response
Survey – 2009 Plan
V. Key Findings of 3. Preparation
W. Incident Reporting F. Incident Response and Handling Steps
X. Incident Reporting Organizations 1. Step 1: Identification
Y. Vulnerability Resources 2. Step 2: Incident Recording
3. Step 3: Initial Response
II. Risk Assessment 4. Step 4: Communicating the Incident
A. Risk 5. Step 5: Containment
B. Risk Policy 6. Step 6: Formulating a Response
C. Risk Assessment Strategy
D. NIST’s Risk Assessment Methodology 7. Step 7: Incident Classification
1. Step 1: System Characterization 8. Step 8: Incident Investigation
2. Step 2: Threats Identification 9. Step 9: Data Collection
3. Step 3: Identify Vulnerabilities 10. Step 10: Forensic Analysis
4. Step 4: Control Analysis 11. Step 11: Evidence Protection
5. Step 5: Likelihood Determination 12. Step 12: Notify External Agencies
6. Step 6: Impact Analysis 13. Step 13: Eradication
7. Step 7: Risk Determination 14. Step 14: Systems Recovery
8. Step 8: Control Recommendations 15. Step 15: Incident Documentation
9. Step 9: Results Documentation 16. Step 16: Incident Damage and Cost
E. Steps to Assess Risks at Work Place Assessment
1. Step 1: Identify Hazard
Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for
informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these
names generically
"Charting the Course ...
Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for
informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these
names generically
"Charting the Course ...
Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for
informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these
names generically
"Charting the Course ...
Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for
informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these
names generically