EC-Council Certified Incident Handler (ECIH) - Slechts 2 dagen

Zeven redenen waarom jij voor jouw ECIH cursus voor Firebrand kiest:

Bekijk deze video en zie waarom je met Firebrand geld en tijd bespaart

  1. Jij zal in slechts 2 dagen ECIH getrained zijn. Doordat onze cursussen residentieel zijn kunnen wij langere lesdagen aanbieden en zal je tijdens je verblijf volledig gefocust zijn op jouw cursus
  2. Onze ECIH cursus is all-inclusive. Cursusmaterialen, accommodatie en maaltijden zijn inbegrepen.
  3. Slaag de eerste keer voor ECIH of train gratis opnieuw. Vraag naar de voorwaarden van onze certificeringsgarantie bij onze Education Consultants.
  4. Je zal meer over ECIH leren. Waar opleidingen elders doorgaans van 9:00 tot 17:00 duren, kan je bij Firebrand Training rekenen op 12 uur training per dag!

  5. Je zal ECIH sneller beheersen. Doordat onze cursussen residentieel zijn word je in korte tijd ondergedompeld in de theorie. Hierdoor zal je volledig gefocust zijn op de cursus en zal je sneller de theorie en praktijk beheersen.
  6. Je zal voor ECIH studeren bij de beste training provider. Firebrand heeft het Q-For kwaliteitlabel, waarmee onze standaarden en professionaliteit op het gebied van training erkend worden. We hebben inmiddels 65.217 professionals getraind en gecertificeerd!
  7. Je gaat meer doen dan alleen de cursusstof van ECIH bestuderen. We maken gebruik van laboratoria, case-studies en oefentests, om ervoor te zorgen dat jij jouw nieuwe kennis direct in jouw werkomgeving kan toepassen.

Denk jij klaar te zijn voor deze opleiding? Doe een GRATIS oefentest om je kennis te testen!

Wanneer wilt u deelnemen aan een versnelde opleiding?

Start datum

Eind datum

Status

Nu boeken

Beëindigde cursus

 

Open

Nu boeken

Wereldwijd heeft Firebrand in haar 10-jarig bestaan al 65.217 studenten opgeleid! We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.56% ons te beoordelen als ‘boven verwachting’

"I found Firebrand training and I'm glad I did! The Ethical Hacking Course was a pleasure to attend! Great Course! Great teacher with deep understanding of the course material/information. Nice speed of going through the course, not too fast, not too slow, just right!! Great to be at one location with other students to "live" through the course, talk about it during coffee breaks, lunch and diner times or at the evening at the bar. And lastly at the end of the week the certification!"
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (2/10/2017 t/m 6/10/2017)

"Excellent teacher, very good course environment and very good administrative support from Firebrand Nederland."
Christian Suarez, ETRAH. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (31/7/2017 t/m 4/8/2017)

"The training was very comprehensive and covered a wide range of CEH topics. The instructor was very knowledgeable and able to relate the material in a way which was understandable. Overall great course!"
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (1/2/2016 t/m 5/2/2016)

"The amount of knowledge the trainer brought to us in one week was simply amazing. At times I did not get where his energy kept coming from. I dont think you can ask for much more. Well done! I learned a lot, and I learned a new way of thinking!!"
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Cursus geeft een zeer goed overzicht van wat er mogelijk is op het gebied van Hacking."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"De instructeur had veel praktische ervaring dat zeker een meerwaarde geeft aan de cursus. Ga zo verder!"
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Goede intensieve cursus met veel bruikbaar naslagwerk, gegeven door een zeer ervaren lesgever! Goede faciliteiten."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Deze dagen heb ik geleerd dat er veel mogelijkheden zijn om te hacken. De bewustwording alleen al helpt ons al om beter te beschermen."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"The trainer gave me an excellent hand-on approach of teaching me the fundamental concepts of Ethical Hacking. He supplied me with wonderful tools, explanations and real life scenarios. He was making sure you'd understand the concepts he was teaching. The teacher prepared me in the best conceivable way he could, while I did whatever I could. I felt confident taking the CEH test. Having a full on knowledge about the concepts of hacking."
Jan Harm Broekman, Sint Antonius Ziekenhuis. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Het is een zeer goede training. Er is volledige toegang tot het klaslokaal. De cursus is wel zwaar, maar het is zeker te doen. Ook kun je het examen uitstellen zonder probleem. Doordat de cursus op zo'n korte tijd gegeven wordt verlies je heel weinig tijd."
B.C., All Buro Solutions. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Dit is de ideale manier om in een korte tijd skills op te bouwen"
Rudy Truyens. - EC-Council ECSA Certificering (5 Dagen) (26/10/2015 t/m 30/10/2015)

"Take a Firebrand course, you wont regret it!"
Anoniem - EC-Council ECSA Certificering (5 Dagen) (1/9/2014 t/m 5/9/2014)

" Een week bikkelen in hoog tempo met een docent die passie heeft voor het vak zorgen er voor dat je snel inzichten krijgt wat er nu wel en niet veilig is. De technieken die je je eigen maakt tijdens deze training zijn direct in de praktijk toepasbaar en zorgen er voor dat je maatregelen kunt gaan nemen. Een perfecte cursuslokatie gecombineerd met een groep enthousiaste mensen zorgen voor heldere en levendige discussies waardoor je nog meer wilt weten over hoe je de beveiliging kunt testen en tegenmaatregelen kunt nemen. Een kleine waarschuiwing is wel op zijn plek, na het volgen van de CEH zie je alles door andere ogen en met tijden vetrouw je niets of niemand meer!"
Wim Daans, RD Services. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Prima cursus, snel en erg goed!"
Raymond vanderAa. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Great teacher, perfect location. Learned a lot with high speed, it is really a challange. You will need to be well prepared and gain experience before attending."
Marco Tilburg, Query ITechnologies. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Effectief snel leren, met de nodige humor."
Raymond van der Aa. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Je bent 5 dagen lang alleen bezig met CEH. Geen afleiding door ander zaken."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"De instructeur weet je 5 dagen te boeien door de manier waarop hij de complete CEH materie behandeld. Geen powerpoint slides maar een verhaal met praktijkvoorbeelden en nuttige tips. Wanneer je later de materie bestudeert, blijkt dat de instructeur het heeft behandeld."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Zeer kundige docenten, mensen die uit het veld komen en weten waar ze over spreken. "
Anoniem, ministerie van Binnenlandse zaken - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"In slechts 5 dagen krijg je alle relevante kennis aangedragen die je nodig hebt voor je certificering. 5 dagen bikkelen heeft zeker resultaat."
Gerwin Aalderink, Rabobank. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Fast-paced super focused training is what you really need to quickly gain new skills, or improve on your current skills. Obviously, the quality of the teacher is also imperative and I found the instructor to be an exceptional eacher who manages to cover a lot of material whilst at the same time spicing it up with humor and real-life stories out of his vast professional experience. This really helps to make it stick. I also must mention the fact that the venue is excellent, with very friendly staff and excellent food, even if you have a food allergy or intolerance"
Anoniem, ORBATEC - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Intensieve training van ervaren docent. Veel kennisoverdracht in korte periode. "
Jan Ysebaert, all-project BVBA. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"Very nice training and had a very nice week, thank you Firebrand!!"
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The course is very insightful,but at the same time very fun. Although you need some knowledge before hand, to help you along your journey to be certified ethical hacker."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The logistics, service, accommodation, course material; everything is well organised and complete. Really nice place (in Guldenberg), nice quiet surroundings; Firebrand has chosen a good location for their course. The course itself was fast paced and attention grabbing and gripping (CEH). Entertaining Instructor."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"The CEH course provided an excellent insight and the course delivery ensured the more in depth topics were presented in a easy to understand way."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (13/5/2013 t/m 17/5/2013)

"Zeer leerzaam, veel inhoud en handson. Een leraar die vanuit de praktijk en ervaring spreekt. Wel hele lange dagen."
PB, Gemeente Maastricht. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Een cursus met veel praktijk. De docent weet de materie goed over te brengen en geeft voorbeelden uit de praktijk. "
Marco Hermans, Gemeente Maastricht. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Geweldig, praktijk gerichte opleiding met een zeer ervaren docent. Zeker aan te bevelen voor de techneuten tussen ons."
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Zeer gedreven instructeur met gedegen ervaring uit de praktijk. "
Bert-Jan van der Burg, Van Houtum BV. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"I attended the CEH course at De Ruwenberg Hotel. Since it was the first time I attended a course in order to be certified in something related to my professional field, I did not know what to expect. Luckily for me, I didn't turn out to be a twelve-hours-a-day boring and endless course. Thanks to the instructor, the lessons went smoothly and were very entertaining, but without forgetting the main purpose of the course: pass the exam! For this, he proved that he knew what he was talking about, focusing on what was important and always providing practical situations. De Ruwenberg is the perfect hotel to organize these kind of events. Kind staff, quality facilities and surrounded by nature. Firebrand has its own house at the hotel, also with quality facilities, computer rooms with all the software that you might need already installed, snacks and beberages so that you dont have to worry about anything, just learn! In the end I passed the exam and I can say I am CEH certified ! Thank you Firebrand ! "
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (2/10/2017 t/m 6/10/2017)

"16 hours a day of packed and intense learning but still a big smile at the end and still asking for more."
Stephane Giuliani, Amadeus Data Processin. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (2/10/2017 t/m 6/10/2017)

"The instructor was very knowledgable, and I would participate another course with him as the instructor. I am likely to attend the follow up course in the UK in April 2016. "
R.S., CACI . - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"The teacher is a really good guy, he has a really good way of teaching the course. He explains it with examples etc. The overall impression of the lecture is really good. It also opened my eyes in security and I'm planning to do the next ec-council and hope this same instructor will do the course, he did a really good job. "
B.C., All Buro Solutions. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Extreme focus, very experienced trainer, great exam preparation, sure to pass"
Anoniem - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (30/11/2015 t/m 4/12/2015)

"I really enjoy the Firebrand training format. The trainer was passionate and knowledgeable about the material he was teaching."
Arjen Post. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"The CEHv8 Firebrand Training was very, very good. Five days non-stop training by an excellent teacher with loads of experience."
Robert Jan van der Burght, Kadaster. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"If you want to test your IT and TI skills for becoming a security specialist this is the way to start. Be prepared to get on a technical challenging rollercoaster and get inspired with new ideas."
Ronald van Dorp, KPN. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (15/10/2012 t/m 19/10/2012)

"The CEHv7 training was lot of fun! Nice hacking and lost of study materials I like it this way!!"
Maurice Janmaat, Ordina. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (15/10/2012 t/m 19/10/2012)

"Fine, quick and accurate instructor with very up to date knowledge. Training facilities are fine: small room, good food, nice surroundings."
N.B. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (8/10/2012 t/m 12/10/2012)

"Real world training with plenty of practical examples and not entirely focused on teaching to pass exams."
Kristofer Donaghy. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/11/2017 t/m 10/11/2017)

"Very happy with the training and trainer."
Jamie Ridings, Bartec Paper & Packaging LTD. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (6/11/2017 t/m 10/11/2017)

"Greatly organised, well taught, great content and the instructor was really engaging. "
Phil Watson, Lloyds. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (23/10/2017 t/m 27/10/2017)

"Really enjoyable and useful course - an eye-opener to the threats present in today's digital world."
Chris Connor, Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

"Fast-paced but satisfying and informational course. The instructor was knowledgeable and provided so much information regarding the tools of the trade as well as real-time experiences."
John Beck, USAF. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

"Loved the course. learnt so much."
Mark Kneen, Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

"The instructor was very knowledgeable and a great guy to present CEH, I learned a lot this week and proud to see that I have passed the examination. "
Anoniem - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

"I've left it too long to return to Firebrand! Whilst in nearly 9 years the place has changed quite a bit, the quality of the training has not changed even slightly in a negative way. My experience has been as brilliant as it was in 2009!!"
Mark Cameron. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

"The training enter is very accommodating and excellent instructor."
A.K.K.. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

"Great experience. I will recommend Firebrand and their instructors any day and any time. "
B.D.. - EC-Council Certified Ethical Hacker (CEH) (5 Dagen) (25/9/2017 t/m 29/9/2017)

On this two day EC-Council Certified Incident Handler (ECIH) course, you’ll gain skills to handle and respond to a range of information security incidents.

Through accelerated learning you'll get 50% more training time than traditional 9-5pm courses. Meaning you'll spend more time learning and applying principles and techniques to detecting and respond to current and emerging computer security threats.

During the ECIH certification course you’ll learn to tackle a wide range of incident types that threaten your organisation including:

  • Network security incidents
  • Malicious code incidents
  • Insider attacks

As well as handling the incidents directly, you’ll develop the skills to prepare for and recover from incidents. This will include:

  • Risk assessment
  • Providing incident reports
  • Incident recovery plans
  • Incident recovery testing
  • Security policies

The ECIH course is perfect if you're an incident handler, risk assessment administrator, pen tester, cyber forensic investigator, venerability assessment auditor, system administrator, system engineer, firewall administrator or network manager. It will also benefit you if you're interested in incident handling and response.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

1 - Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

2 - Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

3 - Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

4 - CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

5 - Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

6 - Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

7 - Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

8 - Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

9 - Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 - Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 - Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Weet je niet zeker of je voldoet aan de vereisten?

Firebrand levert in een afleidingsvrije omgeving waardoor je je volledig kan focussen op de te bestuderen materie. We bespreken graag jouw technische achtergrond, ervaring en kwalificaties om vast te stellen of deze versnelde cursus voor jou geschikt is.

Belangstelling? Zie onze prijzen of bel ons op 024-8457770