Sale!

Certified Incident Handler (ECIH) v2 19+ Hours Course & PDF Guides

Original price was: $45.00.Current price is: $15.00.

Price: 15.00 USD | Size: 13.6 GB | Duration : 19 + Hours  | 56 Course Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND: Expert TRAINING | ENGLISH | Bonus : ECIH v2 PDF Guides | INSTANT DOWNLOAD

Description

Price: 15.00 USD | Size: 13.6 GB | Duration : 19 + Hours  | 56 Course Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND: Expert TRAINING | ENGLISH | Bonus : ECIH v2 PDF Guides | INSTANT DOWNLOAD

 

Certified Incident Handler (ECIH) v2 19+ Hours Course & PDF Guides

01. Introduction

001. Overview

002. ECIH v2 EC-Council certification overview

02. Incident Handling and Response Process

003. Information security and incident management

004. What is vulnerability management

005. What are threat assessments

006. Risk management Vocabulary

007. Risk management The process

008. Risk management The NIST RMF

009. Incident handling best practices, standards, and frameworks

010. Incident handling and legal compliance

03. Forensic Readiness and First Response

011. Step one Prepare for incident handling and response

012. Step two Incident recording and assignment

013. Step three Incident triage

014. Step four Notification

015. Step five Containment

016. Step six Evidence gathering and forensic analysis

017. Step seven Eradication

018. Step eight Recovery

019. Step nine Postincident activities

04. Handling and Responding to Malware Incidents

020. Forensics and first response

021. Principles of digital evidence collection

022. Data acquisition

023. Volatile evidence collection

024. Static evidence collection and anti-forensics

05. Handling and Responding to Email Security Incidents

025. Preparation for handling malware incidents

026. Detection of malware incidents

027. Containment of malware incidents

028. Eradication of malware incidents

029. Recovery after malware incidents

06. Handling and Responding to Network Security Incidents

030. Handling email security incidents

07. Handling and Responding to Web Application Security Incidents

031. Preparation handling network security incidents

032. Detection and validation of network security incidents

033. Handling unauthorized access incidents

034. Handling inappropriate usage incidents

035. Handling denial-of-service incidents

036. Handling wireless network security incidents

08. Handling and Responding to Cloud Security Incidents

037. Preparation to handle web app security incidents

038. Detecting and analyzing web app security incidents

039. Containment of web app security incidents

040. Eradication of web app security incidents

041. Recovery from web app security incidents

042. Web app security threats and attacks

09. Handling and Responding to Insider Threats

043. Cloud computing concepts

044. Best practices against cloud security incidents

10. Hands-On with ECIH Tools

045. Best practices against insider threats

11. Conclusion

046. Security checks using buck-security in Linux

047. Volatile evidence collection in Linux and Windows

048. Using OSForensics to find hidden material

049. Analyzing nonvolatile data using the Autopsy tool

050. Malware analysis

051. Collecting information by tracing emails

052. Using OSSIM

053. Using Wireshark and Nmap

054. Using Suricata IDS

055. What does a SQL injection attack look like

056. What does a XSS attack look like

Exercise Files

ecihv2-10-10-1-what-does-a-SQL-Injection-attack-look-like

ecihv2-10-11-1-what-does-a-XSS-attack-look-like

ecihv2-10-1-1-conducting-security-checks-using-buck-security-on-Linux

ecihv2-10-2-1-volatile-evidence-collection-Linux-and-Windows

ecihv2-10-3-1-using-OSForensics-to-find-hidden-material

ecihv2-10-4-1-analyzing-non-volatile-data-using-Autopsy

ecihv2-10-5-1-malware-analysis

ecihv2-10-6-1-collecting-information-by-tracing-emails

ecihv2-10-7-1-using-OSSIM

ecihv2-10-8-1-using-wireshark-and-nmap

ecihv2-10-9-1-using-Suricata-IDS

ecihv2-1-1-1-information-security-and-incident-management

ecihv2-1-2-1-what-is-vulnerability-management

ecihv2-1-3-1-what-are-threat-assessments

ecihv2-1-4-1-risk-management-vocabulary

ecihv2-1-5-1-risk-management-the-process

ecihv2-1-6-1-risk-management-the-NIST-RMF

ecihv2-1-7-1-incident-handling-best-practices-standards-and-frameworks

ecihv2-1-8-1-incident-handling-and-legal-compliance

ecihv2-2-1-1-step-1-preparation-for-incident-handling-and-response

ecihv2-2-2-1-step-2-incident-recording-and-assignment

ecihv2-2-3-1-step-3-incident-triage

ecihv2-2-4-1-step-4-notification

ecihv2-2-5-1-step-5-containment

ecihv2-2-6-1-step-6-evidence-gathering-and-forensic-analysis

ecihv2-2-7-1-step-7-eradication

ecihv2-2-8-1-step-8-recovery

ecihv2-2-9-1-step-9-post-incident-activities

ecihv2-3-1-1-forensics-and-first-response

ecihv2-3-2-1-principles-of-digital-evidence-collection

ecihv2-3-3-1-data-acquisition

ecihv2-3-4-1-volatile-evidence-collection

ecihv2-3-5-1-static-evidence-collection-and-anti-forensics

ecihv2-4-1-1-preparation-for-handling-malware-incidents

ecihv2-4-2-1-detection-of-malware-incidents

ecihv2-4-3-1-containment-of-malware-incidents

ecihv2-4-4-1-eradication-of-malware-incidents

ecihv2-4-5-1-recovery-after-malware-incidents

ecihv2-5-1-1-handling-email-security-incidents

ecihv2-6-1-1-preparation-for-handling-network-security-incidents

ecihv2-6-2-1-detection-and-validation-of-network-security-incidents

ecihv2-6-3-1-handling-unauthorized-access-incidents

ecihv2-6-4-1-handling-inappropriate-usage-incidents

ecihv2-6-5-1-handling-denial-of-service-incidents

ecihv2-6-6-1-handling-wireless-network-security-incidents

ecihv2-7-1-1-preparation-to-handle-web-application-security-incidents

ecihv2-7-2-1-detecting-and-analyzing-web-application-security-incidents

ecihv2-7-3-1-containment-of-web-application-security-incidents

ecihv2-7-4-1-eradication-of-web-application-security-incidents

ecihv2-7-5-1-recovery-from-web-application-security-incidents

ecihv2-7-6-1-web-application-security-threats-and-attacks

ecihv2-8-1-1-cloud-computing-concepts

ecihv2-8-2-1-best-practices-against-cloud-security-incidents

ecihv2-9-1-1-best-practices-against-insider-threats

0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Add to cart