top of page

EC-Council Certified Incident Handler (E|CIH)

Course Price

Request a Quote

Course length

3 days (24 hours)

EC-Council Certified Incident Handler (E|CIH)



E|CIH is built to remediate modern cyber threats.

Essential Assets Group is an EC-Council Accredited Training Center (ATC) and Examination Testing Center (ETC) approved to deliver EC-Council E|CIH.

About the Course

The E|CIH program addresses all the stages involved in incident handling and the response process to enhances your skills as an incident handler and responder. E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals such as Penetration Testers, Vulnerability Assessment Auditors, Risk Assessment Administrators, Network Administrators, Application Security Engineers, Cyber Forensic Investigators/ Analyst and SOC Analyst, System Administrators/Engineers, Firewall Administrators, and Network Managers/IT Managers.

It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective. Learn about all the stages in incident handling:
- Planning
- Recording & Assignment
- Triage
- Notification
- Containment
- Evidence Gathering & Forensic Analysis
- Eradication
- Recovery
- Post-Incident Activities

The program prepares candidates for the ECIH Exam (212-89). It is recommended that candidates have at least one year of experience in the cybersecurity domain.

Topics Covered

    Introduction to Incident Handling and Response
    Incident Handling and Response Process
    Forensic Readiness and First Response
    Handling and Responding to Malware Incidents
    Handling and Responding to Email Security Incidents
    Handling and Responding to Network Security Incidents
    Handling and Responding to Web Application Security Incidents
    Handling and Responding to Cloud Security Incidents
    Handling and Responding to Insider Threats

Course Brochure

bottom of page