Course overview
This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post-breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective. E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. These concepts are essential for handling and responding to security incidents to protect organizations from future threats or attacks.
What you'll learn
- Understand the key issues plaguing the information security world
- Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
- Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Decode the various steps involved in planning an incident handling and response program
- Gain an understanding of the fundamentals of computer forensics and forensic readiness
- Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
- Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents
Study method
- Online
- Blended
- In-class

coursesonline.co.uk customers are now eligible to apply for an XO Student Discount Card.
Enrol in a course today to unlock exclusive deals.
Entry requirements
- Good understanding of common network and security services is required
- Basic PC operating system navigation skills
- Basic Internet usage skills
- Basic IP addressing knowledge
Course features
- 15 hours
- 12 months course access
Assessment
Certificate of completion available and is included in the price
Who's it for?
- Penetration Testers
- Vulnerability Assessment Auditors
- Risk Assessment Administrators
- Network Administrators
- Application Security Engineers
- Cyber Forensic Investigators/ Analyst and SOC Analyst
- System Administrators/Engineers
- Firewall Administrators and Network Managers/IT Managers
About eTrain
With over 900 online courses to choose from, we’re sure you will find the right one. Most of our courses are accredited and certified by the CPD.
All our courses are online with dedicated tutors on hand to answer your queries and provide support throughout your learning.
We’ve made our courses affordable for everyone as we believe that education shouldn’t be out of anyone’s reach. What’s more, we can offer you payment plans to suit your budget.
We’re so confident that you’ll love our courses that we’re offering a 14 day 100% money back guarantee if you are dissatisfied for any reason.