Description
Price: 15.00 USD | Size: 13.6 GB | Duration : 19 + Hours | 56 Course Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND: Expert TRAINING | ENGLISH | Bonus : ECIH v2 PDF Guides | INSTANT DOWNLOAD
Certified Incident Handler (ECIH) v2 19+ Hours Course + PDF Guides
01. Introduction
001. Overview
002. ECIH v2 EC-Council certification overview
02. Incident Handling and Response Process
003. Information security and incident management
004. What is vulnerability management
005. What are threat assessments
006. Risk management Vocabulary
007. Risk management The process
008. Risk management The NIST RMF
009. Incident handling best practices, standards, and frameworks
010. Incident handling and legal compliance
03. Forensic Readiness and First Response
011. Step one Prepare for incident handling and response
012. Step two Incident recording and assignment
013. Step three Incident triage
014. Step four Notification
015. Step five Containment
016. Step six Evidence gathering and forensic analysis
017. Step seven Eradication
018. Step eight Recovery
019. Step nine Postincident activities
04. Handling and Responding to Malware Incidents
020. Forensics and first response
021. Principles of digital evidence collection
022. Data acquisition
023. Volatile evidence collection
024. Static evidence collection and anti-forensics
05. Handling and Responding to Email Security Incidents
025. Preparation for handling malware incidents
026. Detection of malware incidents
027. Containment of malware incidents
028. Eradication of malware incidents
029. Recovery after malware incidents
06. Handling and Responding to Network Security Incidents
030. Handling email security incidents
07. Handling and Responding to Web Application Security Incidents
031. Preparation handling network security incidents
032. Detection and validation of network security incidents
033. Handling unauthorized access incidents
034. Handling inappropriate usage incidents
035. Handling denial-of-service incidents
036. Handling wireless network security incidents
08. Handling and Responding to Cloud Security Incidents
037. Preparation to handle web app security incidents
038. Detecting and analyzing web app security incidents
039. Containment of web app security incidents
040. Eradication of web app security incidents
041. Recovery from web app security incidents
042. Web app security threats and attacks
09. Handling and Responding to Insider Threats
043. Cloud computing concepts
044. Best practices against cloud security incidents
10. Hands-On with ECIH Tools
045. Best practices against insider threats
11. Conclusion
046. Security checks using buck-security in Linux
047. Volatile evidence collection in Linux and Windows
048. Using OSForensics to find hidden material
049. Analyzing nonvolatile data using the Autopsy tool
050. Malware analysis
051. Collecting information by tracing emails
052. Using OSSIM
053. Using Wireshark and Nmap
054. Using Suricata IDS
055. What does a SQL injection attack look like
056. What does a XSS attack look like
Exercise Files
ecihv2-10-10-1-what-does-a-SQL-Injection-attack-look-like
ecihv2-10-11-1-what-does-a-XSS-attack-look-like
ecihv2-10-1-1-conducting-security-checks-using-buck-security-on-Linux
ecihv2-10-2-1-volatile-evidence-collection-Linux-and-Windows
ecihv2-10-3-1-using-OSForensics-to-find-hidden-material
ecihv2-10-4-1-analyzing-non-volatile-data-using-Autopsy
ecihv2-10-5-1-malware-analysis
ecihv2-10-6-1-collecting-information-by-tracing-emails
ecihv2-10-7-1-using-OSSIM
ecihv2-10-8-1-using-wireshark-and-nmap
ecihv2-10-9-1-using-Suricata-IDS
ecihv2-1-1-1-information-security-and-incident-management
ecihv2-1-2-1-what-is-vulnerability-management
ecihv2-1-3-1-what-are-threat-assessments
ecihv2-1-4-1-risk-management-vocabulary
ecihv2-1-5-1-risk-management-the-process
ecihv2-1-6-1-risk-management-the-NIST-RMF
ecihv2-1-7-1-incident-handling-best-practices-standards-and-frameworks
ecihv2-1-8-1-incident-handling-and-legal-compliance
ecihv2-2-1-1-step-1-preparation-for-incident-handling-and-response
ecihv2-2-2-1-step-2-incident-recording-and-assignment
ecihv2-2-3-1-step-3-incident-triage
ecihv2-2-4-1-step-4-notification
ecihv2-2-5-1-step-5-containment
ecihv2-2-6-1-step-6-evidence-gathering-and-forensic-analysis
ecihv2-2-7-1-step-7-eradication
ecihv2-2-8-1-step-8-recovery
ecihv2-2-9-1-step-9-post-incident-activities
ecihv2-3-1-1-forensics-and-first-response
ecihv2-3-2-1-principles-of-digital-evidence-collection
ecihv2-3-3-1-data-acquisition
ecihv2-3-4-1-volatile-evidence-collection
ecihv2-3-5-1-static-evidence-collection-and-anti-forensics
ecihv2-4-1-1-preparation-for-handling-malware-incidents
ecihv2-4-2-1-detection-of-malware-incidents
ecihv2-4-3-1-containment-of-malware-incidents
ecihv2-4-4-1-eradication-of-malware-incidents
ecihv2-4-5-1-recovery-after-malware-incidents
ecihv2-5-1-1-handling-email-security-incidents
ecihv2-6-1-1-preparation-for-handling-network-security-incidents
ecihv2-6-2-1-detection-and-validation-of-network-security-incidents
ecihv2-6-3-1-handling-unauthorized-access-incidents
ecihv2-6-4-1-handling-inappropriate-usage-incidents
ecihv2-6-5-1-handling-denial-of-service-incidents
ecihv2-6-6-1-handling-wireless-network-security-incidents
ecihv2-7-1-1-preparation-to-handle-web-application-security-incidents
ecihv2-7-2-1-detecting-and-analyzing-web-application-security-incidents
ecihv2-7-3-1-containment-of-web-application-security-incidents
ecihv2-7-4-1-eradication-of-web-application-security-incidents
ecihv2-7-5-1-recovery-from-web-application-security-incidents
ecihv2-7-6-1-web-application-security-threats-and-attacks
ecihv2-8-1-1-cloud-computing-concepts
ecihv2-8-2-1-best-practices-against-cloud-security-incidents
ecihv2-9-1-1-best-practices-against-insider-threats
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.