Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
RSA® Certification Program
The RSA Proven Professional Certification Program offers technology professionals the knowledge, skills and credentials necessary to become a trusted adviser in deploying and maintaining RSA security system platforms.
The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. After attending this course, they will be able to create incident handling and response policies as well as deal with various types of computer security incidents. The IT incident management training program will enable students to be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals greater industry acceptance as the seasoned incident handler
• Incident handlers
• Risk assessors
• Pen testers
• Forensic Investigators
• System admins/engineers
• Firewall admins
• Vulnerability auditors
• IT managers and professional
3 days (ILT)
Students should have basic knowledge of general computer science and network topics.
Upon successful completion of this course, participants should be able to:
• Principles, processes and techniques for detecting and responding to security threats/breaches
• Perform as a liaison to legal and regulatory bodies
• Learn to handle incidents and conduct assessments
• Cover various incidents like malicious code, network attacks, and insider attacks