Hotline: 1800 PROGRESO (1800 776 4737)


Certified Incident Handling Engineer (CIHE) - Live Virtual Training
 
The Certified Incident Handling Engineer course is designed to help incident handlers, system administrators, and general security engineers understand how to plan, create, and utilize their systems in order to prevent, detect, and respond to security breaches. Every business connected to the internet is getting probed by hackers trying to gain access. The ideal situation I to prevent this from happening, but realistically every business needs to know how to detect and resolve security breaches. Certified Incident Handlers are prepared to do handle these situations effectively.
 
Students will learn common attack techniques, vectors, and tools used by hackers, so that they can effectively prevent, detect, and respond against them. This course is ideal for those who lead incident handling teams or are part of an incident handling team.
 
Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems. The 20 hours of experience in our labs is what will put you ahead of the competition and set you apart as a leader in incident handling.
 
 
Objectives
 
Upon completion, students will:
  • Have knowledge to detect security threats, risk, and weaknesses.
  • Have knowledge to plan for prevention, detection, and responses to security breaches.
  • Have knowledge to accurately report on their findings from examinations.
  • Be ready to sit for the C)IHE Certification Exam
 
Course Pre-Requisites
  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Basic Knowledge of Linux is essential
 
 
Who Should Attend
The C)IHE course is an incident handling course that teaches students how to plan for, detect, and respond to security breaches. In order to do this effectively we require students to understand the material in our C)ISSO: Information Systems Security Officer course. If you have taken the course or have equivalent experience/knowledge, you'll be able to learn the art of incident handling in the C)IHE course.
 
After you complete the C)IHE we encourage you to learn about disaster recovery and business continuity through our C)DRE: Disaster Recovery Engineer Course.
 
 
Course Outline
 
Module 1: Incident Handling Explained
Module 2: Threats, Vulnerabilities, and Exploits
Module 3: Preparation
Module 4: First Response
Module 5: Containment
Module 6: Eradication
Module 7: Recovery
Module 8: Follow-Up
 
Lab 1: Attacks Under the Microscope
Lab 2: Ticketing System           
Lab 3: SysInternals Suite
Lab 4: Examine System Active Processes and Running Services           
 
For more information on course modules, please refer to our brochure.
 
 
Funding
  • Productivity and Innovation Credit (PIC) scheme
*Enjoy up to 400% tax deduction or 60% cash payout under the Productivity and Innovation Credit (PIC) scheme for Staff Training.
Find out more here!
 
Terms and conditions apply. Please contact IRAS for assistance or clarification on PIC.
 
 
 

 

Download Course Brochure Download Registration Form Course Schedule
Related Courses
Information Systems Security Officer (CISSO)
The C)ISSO is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on...
Penetration Testing Engineer (CPTE)
The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning,...
Certified Penetration Testing Consultant (CPTC) - Live Virtual Training
The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against...
Certified Disaster Recovery Engineer (CDRE) - Live Virtual Training
The Certified Disaster Recovery Engineer certification course will prepare individuals to help their business handle the unexpected, while...
Certified Digital Forensics Examiner (CDFE) - Live Virtual Training
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in...
Certified Network Forensics Examiner (CNFE) - Live Virtual Training
The Certified Network Forensics Examiner will take your digital forensic skill set to the next level by navigating through over twenty modules of...
Certified Secure Web Application Engineer (CSWAE) - Live Virtual Training
The Certified Secure Web Application Engineer course is designed to equip students with the knowledge and tools needed to identify and defend...
Certified Wireless Security Engineer (CWSE)
The Certified Wireless Security Engineer is prepared to identify those risk that wireless networks present for a business and to create and...
Certified Security Sentinel (CSS)
The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure...
Certified Vulnerability Assessor (CVA)
The Certified Vulnerability Assessor training help students understand the importance of vulnerability assessments.
Certified Security Leadership Officer (CSLO) - Live Virtual Training
The Certified Security Leadership Officer course is designed to give management an essential understanding of current security issues, best...
Certified Professional Ethical Hacker (CPEH) - Live Virtual Training
The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications.
Certified Virtual Machine Engineer (CVME 5.5)
The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an...
Certified Information Security Management Systems - Lead Auditor (CISMS-LA) - Live Virtual Training
The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of...
Certified Information Security Management Systems Lead Implementer (CISMS-LI) - Live Virtual Training
The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through...
Fundamentals of Cybersecurity Incident Handling
Basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work.
Secure Coding Bootcamp
Combination of lecture, security testing and code review. You will learn the most common threats against applications and how to design and code...
Protect Yourself and Your Organization From Cyber Threats (Workshop)
In this series of technology security workshops, we aim to provide critical information and best practices on how to detect  & response to the...
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
9
824
96