<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="18608" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/ec-ecih" lastchanged="2025-07-29T12:17:42+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>EC-Council Certified Incident Handler</title><productcode>ECIH</productcode><vendorcode>EC</vendorcode><vendorname>EC-Council</vendorname><fullproductcode>EC-ECIH</fullproductcode><version>3</version><objective>&lt;ul&gt;
&lt;li&gt;Key issues plaguing the information security world&lt;/li&gt;&lt;li&gt;Various types of cybersecurity threats, attack vectors, threat actors, and their motives, goals, and objectives of cybersecurity attacks&lt;/li&gt;&lt;li&gt;Various attack and defense frameworks (Cyber Kill Chain Methodology, MITRE ATT&amp;amp;CK Framework, etc.)&lt;/li&gt;&lt;li&gt;Fundamentals of information security concepts (vulnerability assessment, risk management, cyber threat intelligence, threat modeling, and threat hunting)&lt;/li&gt;&lt;li&gt;Various attack and defense frameworks (Cyber Kill Chain Methodology, MITRE ATT&amp;amp;CK Framework, etc.)&lt;/li&gt;&lt;li&gt;Fundamentals of incident management (information security incidents, signs and costs of an incident, incident handling and response, and incident response automation and orchestration)&lt;/li&gt;&lt;li&gt;Different incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations&lt;/li&gt;&lt;li&gt;Various steps involved in planning incident handling and response program (planning, recording and assignment, triage, notification, containment, evidence gathering and forensic analysis, eradication, recovery, and post-incident activities)&lt;/li&gt;&lt;li&gt;Importance of first response and first response procedure (evidence collection, documentation, preservation, packaging, and transportation)&lt;/li&gt;&lt;li&gt;How to handle and respond to different types of cybersecurity incidents in a systemic way (malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, insider threat-related incidents, and endpoint security incidents)&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;To qualify for the E|CIH program, one must have at least 3 years of experience working as a cyber security professional.&lt;/p&gt;</essentials><outline>&lt;ul&gt;
&lt;li&gt;Module 01: Introduction to Incident Handling and Response&lt;/li&gt;&lt;li&gt;Module 02: Incident Handling and Response Process&lt;/li&gt;&lt;li&gt;Module 03: First Response&lt;/li&gt;&lt;li&gt;Module 04: Handling and Responding to Malware Incidents&lt;/li&gt;&lt;li&gt;Module 05: Handling and Responding to Emails Security Incidents&lt;/li&gt;&lt;li&gt;Module 06: Handling and Responding to Network Security Incidents&lt;/li&gt;&lt;li&gt;Module 07: Handling and Responding to Web Application Security Incidents&lt;/li&gt;&lt;li&gt;Module 08: Handling and Responding to Cloud Security Incidents&lt;/li&gt;&lt;li&gt;Module 09: Handling and Responding to Insider Threats&lt;/li&gt;&lt;li&gt;Module 10: Handling and Responding to Endpoint Security Incidents&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Key issues plaguing the information security world
- Various types of cybersecurity threats, attack vectors, threat actors, and their motives, goals, and objectives of cybersecurity attacks
- Various attack and defense frameworks (Cyber Kill Chain Methodology, MITRE ATT&amp;CK Framework, etc.)
- Fundamentals of information security concepts (vulnerability assessment, risk management, cyber threat intelligence, threat modeling, and threat hunting)
- Various attack and defense frameworks (Cyber Kill Chain Methodology, MITRE ATT&amp;CK Framework, etc.)
- Fundamentals of incident management (information security incidents, signs and costs of an incident, incident handling and response, and incident response automation and orchestration)
- Different incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Various steps involved in planning incident handling and response program (planning, recording and assignment, triage, notification, containment, evidence gathering and forensic analysis, eradication, recovery, and post-incident activities)
- Importance of first response and first response procedure (evidence collection, documentation, preservation, packaging, and transportation)
- How to handle and respond to different types of cybersecurity incidents in a systemic way (malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, insider threat-related incidents, and endpoint security incidents)</objective_plain><essentials_plain>To qualify for the E|CIH program, one must have at least 3 years of experience working as a cyber security professional.</essentials_plain><outline_plain>- Module 01: Introduction to Incident Handling and Response
- Module 02: Incident Handling and Response Process
- Module 03: First Response
- Module 04: Handling and Responding to Malware Incidents
- Module 05: Handling and Responding to Emails Security Incidents
- Module 06: Handling and Responding to Network Security Incidents
- Module 07: Handling and Responding to Web Application Security Incidents
- Module 08: Handling and Responding to Cloud Security Incidents
- Module 09: Handling and Responding to Insider Threats
- Module 10: Handling and Responding to Endpoint Security Incidents</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="SI" currency="EUR">2950.00</price><price country="UA" currency="EUR">2950.00</price><price country="NL" currency="EUR">2950.00</price><price country="DE" currency="EUR">2950.00</price><price country="IL" currency="ILS">10230.00</price><price country="GR" currency="EUR">2950.00</price><price country="MK" currency="EUR">2950.00</price><price country="HU" currency="EUR">2950.00</price><price country="PL" currency="EUR">2950.00</price><price country="AT" currency="EUR">2950.00</price><price country="CH" currency="CHF">2950.00</price></pricelist><miles/></course>