Certified Incident Handling Engineer (CIHE) - Live Virtual Training
The Certified Incident Handling Engineer course is designed to help incident handlers, system administrators, and general security engineers understand how to plan, create, and utilize their systems in order to prevent, detect, and respond to security breaches. Every business connected to the internet is getting probed by hackers trying to gain access. The ideal situation I to prevent this from happening, but realistically every business needs to know how to detect and resolve security breaches. Certified Incident Handlers are prepared to do handle these situations effectively.
Students will learn common attack techniques, vectors, and tools used by hackers, so that they can effectively prevent, detect, and respond against them. This course is ideal for those who lead incident handling teams or are part of an incident handling team.
Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems. The 20 hours of experience in our labs is what will put you ahead of the competition and set you apart as a leader in incident handling.
Upon completion, students will:
Who Should Attend
The C)IHE course is an incident handling course that teaches students how to plan for, detect, and respond to security breaches. In order to do this effectively we require students to understand the material in our C)ISSO: Information Systems Security Officer course. If you have taken the course or have equivalent experience/knowledge, you'll be able to learn the art of incident handling in the C)IHE course.
After you complete the C)IHE we encourage you to learn about disaster recovery and business continuity through our C)DRE: Disaster Recovery Engineer Course.
Module 1: Incident Handling Explained
Module 2: Threats, Vulnerabilities, and Exploits
Module 3: Preparation
Module 4: First Response
Module 5: Containment
Module 6: Eradication
Module 7: Recovery
Module 8: Follow-Up
Lab 1: Attacks Under the Microscope
Lab 2: Ticketing System
Lab 3: SysInternals Suite
Lab 4: Examine System Active Processes and Running Services
For more information on course modules, please refer to our brochure.
*Enjoy up to 400% tax deduction or 60% cash payout under the Productivity and Innovation Credit (PIC) scheme for Staff Training.
Find out more here!
Terms and conditions apply. Please contact IRAS for assistance or clarification on PIC.
Download Course Brochure Download Registration Form Course Schedule
|Copyright © 2017 Progreso Training Pte Ltd. All Rights Reserved.|