Language : Bangla || English
"IT EXPERT BD" is a Premier EC-Council Accredited Training Center in Bangladesh

Opening Hours

Mon-Sat, 10AM - 6PM

Training Details

EC-Council Certified Incident Handler (ECIH)

EC-Council

What is an Ethical Hacker?
To beat a hacker, you need to think like one!
Ethical Hacking is often referred to as the process of penetrating one’s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place. Around the world, partners and customers look to the EC-Council to deliver the highest quality exams and certifications. EC-Council has developed a number of policies to support the goals of the EC-Council certification program, including: Become a Certified Ethical Hacker A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The Certified Ethical Hacker credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

What is an Ethical Hacker?
The EC-Council Certified Incident Handler (ECIH) is a certification designed for professionals who want to develop the skills necessary to respond effectively to security incidents. It focuses on incident management, detection, response, and recovery strategies for cybersecurity incidents.

Training Outline

1. Introduction to Incident Handling

  • Overview and importance of incident handling
  • Incident handling frameworks
2. Incident Response Life Cycle
  • Phases: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned
3. Incident Handling Procedures
  • Developing incident response policies and teams
  • Reporting and documenting incidents
4. Digital Evidence Collection
  • Techniques for collecting and preserving evidence
  • Chain of custody and data acquisition
5. Incident Response Tools
  • Tools for monitoring, analysis, and forensics (e.g., SIEM, log analyzers)
6. Threat and Vulnerability Management
  • Identifying threats (malware, ransomware) and managing vulnerabilities
7. Communication and Reporting
  • Internal and external communication
  • Writing incident reports and legal considerations
8. Case Studies and Hands-on Labs
  • Real-world examples and practical exercises
9. Post-Incident Activities
  • Post-mortem analysis and implementing improvements

Who is it for?

  • Incident Response Team Members
  • Cybersecurity Analysts
  • Security Operations Center (SOC) Personnel
  • IT Professionals involved in security management
  • Network Engineers and Security Engineers
  • Vendor Exam Certification

    Exam Details:

    • Exam Code: ECIH
    • Format: Multiple-choice questions
    • Number of Questions: 100 questions
    • Duration: 4 hours
    • Passing Score: 70% or higher
    • Language: English

    Exam Registration

    The privacy and contract outlines the terms and conditions of a person who shares confidential information with IT Expert BD. in business or professional relationships to protect sensitive information from being disclosed to unauthorized parties.

    Get In Touch

    151/7 Green Road, Good luck center, (5th Floor), Dhaka-1205, Bangladesh.

    info@itexpert-bd.com

    www.itexpert-bd.com

    Copyright © IT EXPERT BD. All Rights Reserved.