Course Objectives
Cybersecurity Professionals interested in pursuing incident handling and response as a career require comprehensive training that not only imparts concepts but also allows them to experience real scenarios. The ECIH program includes hands-on learning delivered through labs within the training program. True employability after earning a certification can only be achieved when the core of the curricula maps to and is compliant with government and industry-published incident and response frameworks.
The Certified Incident Handler prepares a security professional to work as an Incident Handler. ECIH training confirms the capacities of an analyst to not only detect incidents, but also quickly manage and respond holistically to these incidents.
Skills that Participants will Gain from this Course:
- Understand the key issues plaguing the information security world
- Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
- Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Decode the various steps involved in planning an incident handling and response program
- Gain an understanding of the fundamentals of computer forensics and forensic readiness
- Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
- Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents
Pre-requisites
Knowledge, Skills & Experience
It is recommended that the participant have at least 1 years of relevant working experience in IT industry with knowledge in the area of Ethical Hacking / network security.
Recommended courses prior to taking ECIH:
- CompTIA A+
- CompTIA Network +
- CompTIA Security+
- ISACA Cybersecurity Fundamentals
- Identity and Access Management Essentials (SF)
- EC-Council Certified Network Defender (CND) (SF)
Recommended for Career Path Advancement
- EC Council Computer Hacking Forensic Investigator (CHFI) (For Incident Response and Forensics)
- EC Council Certified Incident Handler (ECIH) (For Incident Response and Forensics)
- EC Council Certified SOC Analyst (CSA) (For SOC Operations)
- Cisco CCNA Cyber Security Operations (For SOC Operations)
- ISC2 Certified Information Systems Security Professional (CISSP) (For Security Engineer)
- Certificate of Cloud Auditing Knowledge (CCAK) (For Cloud Security)
- ISC2 Certified Cloud Security Professional (CCSP) (For Cloud Security)
Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.
System Requirement |
Must Have:
Please ensure that your computer or laptop meets the following requirements.
Good to Have:
Not Recommended: Using tablets is not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration. |
Course Outline
Session 1 – Introduction to Incident Handling and Response
Session 2 – Incident Handling and Response Process
Session 3 – Forensic Readiness and First Response
Session 4 – Handling and Responding to Malware Incidents
Session 5 – Handling and Responding to Email Security Incidents
Session 6 – Handling and Responding to Network Security Incidents Learning
Session 7 – Handling and Responding to Web Application Security Incidents
Session 8 – Handling and Responding to Cloud Security Incidents
Session 9 – Handling and Responding to Insider Threats
Certificate Obtained and Conferred by
- Certificate of Completion from NTUC LearningHub
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.
- Statement of Attainment (SOA) from SkillsFuture Singapore
Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):
ICT-OUS-3003-2.1 Cyber and Data Breach Incident Management
- External Certification
After completing this course and upon passing the official “EC-Council Certified Incident Handler (ECIH)” certification exam, candidates will receive the official certification from EC Council. The certification is governed and maintained by EC Council. For more information: https://cert.eccouncil.org/ec-council-certified-incident-handler.html
Categories
More Information
- NTUC LearningHub
Add a review