EC-Council Certified Incident Handler (ECIH) - Slechts 2 dagen

Zeven redenen waarom jij voor jouw ECIH cursus voor Firebrand kiest:

Bekijk deze video en zie waarom je met Firebrand geld en tijd bespaart

  1. Jij zal in slechts 2 dagen ECIH getrained zijn. Doordat onze cursussen residentieel zijn kunnen wij langere lesdagen aanbieden en zal je tijdens je verblijf volledig gefocust zijn op jouw cursus
  2. Onze ECIH cursus is all-inclusive. Cursusmaterialen, accommodatie en maaltijden zijn inbegrepen.
  3. Slaag de eerste keer voor ECIH of train gratis opnieuw. Vraag naar de voorwaarden van onze certificeringsgarantie bij onze Education Consultants.
  4. Je zal meer over ECIH leren. Waar opleidingen elders doorgaans van 9:00 tot 17:00 duren, kan je bij Firebrand Training rekenen op 12 uur training per dag!

  5. Je zal ECIH sneller beheersen. Doordat onze cursussen residentieel zijn word je in korte tijd ondergedompeld in de theorie. Hierdoor zal je volledig gefocust zijn op de cursus en zal je sneller de theorie en praktijk beheersen.
  6. Je zal voor ECIH studeren bij de beste training provider. Firebrand heeft het Q-For kwaliteitlabel, waarmee onze standaarden en professionaliteit op het gebied van training erkend worden. We hebben inmiddels 63.469 professionals getraind en gecertificeerd!
  7. Je gaat meer doen dan alleen de cursusstof van ECIH bestuderen. We maken gebruik van laboratoria, case-studies en oefentests, om ervoor te zorgen dat jij jouw nieuwe kennis direct in jouw werkomgeving kan toepassen.

Denk jij klaar te zijn voor deze opleiding? Doe een GRATIS oefentest om je kennis te testen!

Wanneer wilt u deelnemen aan een versnelde opleiding?

Start datum

Eind datum

Status

Nu boeken

Beëindigde cursus

 

Open

Nu boeken

Wereldwijd heeft Firebrand in haar 10-jarig bestaan al 63.469 studenten opgeleid! We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.48% ons te beoordelen als ‘boven verwachting’

"The training was very comprehensive and covered a wide range of CEH topics. The instructor was very knowledgeable and able to relate the material in a way which was understandable. Overall great course!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (1/2/2016 t/m 5/2/2016)

"The amount of knowledge the trainer brought to us in one week was simply amazing. At times I did not get where his energy kept coming from. I dont think you can ask for much more. Well done! I learned a lot, and I learned a new way of thinking!!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Cursus geeft een zeer goed overzicht van wat er mogelijk is op het gebied van Hacking."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"De instructeur had veel praktische ervaring dat zeker een meerwaarde geeft aan de cursus. Ga zo verder!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Goede intensieve cursus met veel bruikbaar naslagwerk, gegeven door een zeer ervaren lesgever! Goede faciliteiten."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"Deze dagen heb ik geleerd dat er veel mogelijkheden zijn om te hacken. De bewustwording alleen al helpt ons al om beter te beschermen."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (25/1/2016 t/m 29/1/2016)

"The trainer gave me an excellent hand-on approach of teaching me the fundamental concepts of Ethical Hacking. He supplied me with wonderful tools, explanations and real life scenarios. He was making sure you'd understand the concepts he was teaching. The teacher prepared me in the best conceivable way he could, while I did whatever I could. I felt confident taking the CEH test. Having a full on knowledge about the concepts of hacking."
Jan Harm Broekman, Sint Antonius Ziekenhuis. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Het is een zeer goede training. Er is volledige toegang tot het klaslokaal. De cursus is wel zwaar, maar het is zeker te doen. Ook kun je het examen uitstellen zonder probleem. Doordat de cursus op zo'n korte tijd gegeven wordt verlies je heel weinig tijd."
B.C., All Buro Solutions. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Dit is de ideale manier om in een korte tijd skills op te bouwen"
Rudy Truyens. - EC-Council ECSA Certificering (5 Dagen) (26/10/2015 t/m 30/10/2015)

"Take a Firebrand course, you wont regret it!"
Anoniem - EC-Council ECSA Certificering (5 Dagen) (1/9/2014 t/m 5/9/2014)

" Een week bikkelen in hoog tempo met een docent die passie heeft voor het vak zorgen er voor dat je snel inzichten krijgt wat er nu wel en niet veilig is. De technieken die je je eigen maakt tijdens deze training zijn direct in de praktijk toepasbaar en zorgen er voor dat je maatregelen kunt gaan nemen. Een perfecte cursuslokatie gecombineerd met een groep enthousiaste mensen zorgen voor heldere en levendige discussies waardoor je nog meer wilt weten over hoe je de beveiliging kunt testen en tegenmaatregelen kunt nemen. Een kleine waarschuiwing is wel op zijn plek, na het volgen van de CEH zie je alles door andere ogen en met tijden vetrouw je niets of niemand meer!"
Wim Daans, RD Services. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Prima cursus, snel en erg goed!"
Raymond vanderAa. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Great teacher, perfect location. Learned a lot with high speed, it is really a challange. You will need to be well prepared and gain experience before attending."
Marco Tilburg, Query ITechnologies. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Effectief snel leren, met de nodige humor."
Raymond van der Aa. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Je bent 5 dagen lang alleen bezig met CEH. Geen afleiding door ander zaken."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"De instructeur weet je 5 dagen te boeien door de manier waarop hij de complete CEH materie behandeld. Geen powerpoint slides maar een verhaal met praktijkvoorbeelden en nuttige tips. Wanneer je later de materie bestudeert, blijkt dat de instructeur het heeft behandeld."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Zeer kundige docenten, mensen die uit het veld komen en weten waar ze over spreken. "
Anoniem, ministerie van Binnenlandse zaken - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"In slechts 5 dagen krijg je alle relevante kennis aangedragen die je nodig hebt voor je certificering. 5 dagen bikkelen heeft zeker resultaat."
Gerwin Aalderink, Rabobank. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Fast-paced super focused training is what you really need to quickly gain new skills, or improve on your current skills. Obviously, the quality of the teacher is also imperative and I found the instructor to be an exceptional eacher who manages to cover a lot of material whilst at the same time spicing it up with humor and real-life stories out of his vast professional experience. This really helps to make it stick. I also must mention the fact that the venue is excellent, with very friendly staff and excellent food, even if you have a food allergy or intolerance"
Anoniem, ORBATEC - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Intensieve training van ervaren docent. Veel kennisoverdracht in korte periode. "
Jan Ysebaert, all-project BVBA. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"Very nice training and had a very nice week, thank you Firebrand!!"
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The course is very insightful,but at the same time very fun. Although you need some knowledge before hand, to help you along your journey to be certified ethical hacker."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The logistics, service, accommodation, course material; everything is well organised and complete. Really nice place (in Guldenberg), nice quiet surroundings; Firebrand has chosen a good location for their course. The course itself was fast paced and attention grabbing and gripping (CEH). Entertaining Instructor."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"The CEH course provided an excellent insight and the course delivery ensured the more in depth topics were presented in a easy to understand way."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (13/5/2013 t/m 17/5/2013)

"Zeer leerzaam, veel inhoud en handson. Een leraar die vanuit de praktijk en ervaring spreekt. Wel hele lange dagen."
PB, Gemeente Maastricht. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Een cursus met veel praktijk. De docent weet de materie goed over te brengen en geeft voorbeelden uit de praktijk. "
Marco Hermans, Gemeente Maastricht. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Geweldig, praktijk gerichte opleiding met een zeer ervaren docent. Zeker aan te bevelen voor de techneuten tussen ons."
Anoniem - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"Zeer gedreven instructeur met gedegen ervaring uit de praktijk. "
Bert-Jan van der Burg, Van Houtum BV. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (6/2/2012 t/m 10/2/2012)

"The instructor was very knowledgable, and I would participate another course with him as the instructor. I am likely to attend the follow up course in the UK in April 2016. "
R.S., CACI . - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"The teacher is a really good guy, he has a really good way of teaching the course. He explains it with examples etc. The overall impression of the lecture is really good. It also opened my eyes in security and I'm planning to do the next ec-council and hope this same instructor will do the course, he did a really good job. "
B.C., All Buro Solutions. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/12/2015 t/m 18/12/2015)

"Extreme focus, very experienced trainer, great exam preparation, sure to pass"
Anoniem - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (30/11/2015 t/m 4/12/2015)

"I really enjoy the Firebrand training format. The trainer was passionate and knowledgeable about the material he was teaching."
Arjen Post. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"The CEHv8 Firebrand Training was very, very good. Five days non-stop training by an excellent teacher with loads of experience."
Robert Jan van der Burght, Kadaster. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/7/2013 t/m 12/7/2013)

"If you want to test your IT and TI skills for becoming a security specialist this is the way to start. Be prepared to get on a technical challenging rollercoaster and get inspired with new ideas."
Ronald van Dorp, KPN. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (15/10/2012 t/m 19/10/2012)

"The CEHv7 training was lot of fun! Nice hacking and lost of study materials I like it this way!!"
Maurice Janmaat, Ordina. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (15/10/2012 t/m 19/10/2012)

"Fine, quick and accurate instructor with very up to date knowledge. Training facilities are fine: small room, good food, nice surroundings."
N.B. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (8/10/2012 t/m 12/10/2012)

"Excellent instructor, excellent facilities, fantastic experience. Highly recommended to anybody considering training. The best learning experience by far."
J.L, cybsec. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/4/2017 t/m 18/4/2017)

"Starting as a very newbie to much of the material, I come out so much more able and knowledgeable in this arena. The practical exercises coupled with great presentation of the material and the clear deep expertise of the instructor meant the course flew by but delivered great learning"
Timothy Canning, GTE Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/4/2017 t/m 18/4/2017)

"Firebrand is exactly what is says on the tin. It's hard work and intense but by far the best way of working. "
Chris Owen, BeyondTrust. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (14/4/2017 t/m 18/4/2017)

"Wonderful trainer, really focusing on the individual. It is a tough week but the insight you get and things you learn go way beyond any other courses I have attended."
C.G, GCASSOCIATES GmbH. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (27/3/2017 t/m 31/3/2017)

"This is the second time I have taken a Firebrand course and have enjoyed my time at Wyboston again. The instructor is extremely knowledgeable and the content of the course was very engaging."
Tom Sweet, Software Escrow Solutions. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (27/3/2017 t/m 31/3/2017)

"Firebrand is an excellent choice for IT specialists in the UK. Very professional and highly recommended, the number 1 choice for my company. Having experienced the training first hand I will not hesitate to recommend this company, the courses, and the staff, with the excellent facilities provided to my employees and any anybody considering taking certified training in the UK"
John Lynch, CybSec Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (27/3/2017 t/m 31/3/2017)

"Hard work, long hours, but interesting and fun! Great instructor!"
Mark Elvidge, Uplinkman Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"Wonderfull training.The trainer provided so much technical informations and Lab exercices. The course was really hands-on. "
Gbessi Vincent TOH, T-Inet Consulting. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"Bootcamp style, intensive training. Very experienced trainer - extremely knowledgable. Good material, nice location and amenities."
N.H. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"The material was appropriate, the delivery excellent. Loved the practices and the exercises. "
I.Y, Go Live UK Ltd. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (20/2/2017 t/m 24/2/2017)

"Amazing stay Very friendly staff Well presented course Always helpful & very informative Would come again :)"
Richard Howard, Microcomms. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (12/12/2016 t/m 16/12/2016)

"The instructor's knowledge and experience was very clear. The demonstrations and labs were very well constructed. The training facility was excellent."
T.W. - EC-Council Certified Ethical Hacker (CEH v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

"I wouldn't get trained anywhere else."
R.B. - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

"The tutor has formidable knowledge. The environment was superb. I really enjoyed the course and content "
A.K. - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 Dagen) (28/11/2016 t/m 2/12/2016)

On this two day EC-Council Certified Incident Handler (ECIH) course, you’ll gain skills to handle and respond to a range of information security incidents.

Through accelerated learning you'll get 50% more training time than traditional 9-5pm courses. Meaning you'll spend more time learning and applying principles and techniques to detecting and respond to current and emerging computer security threats.

During the ECIH certification course you’ll learn to tackle a wide range of incident types that threaten your organisation including:

  • Network security incidents
  • Malicious code incidents
  • Insider attacks

As well as handling the incidents directly, you’ll develop the skills to prepare for and recover from incidents. This will include:

  • Risk assessment
  • Providing incident reports
  • Incident recovery plans
  • Incident recovery testing
  • Security policies

The ECIH course is perfect if you're an incident handler, risk assessment administrator, pen tester, cyber forensic investigator, venerability assessment auditor, system administrator, system engineer, firewall administrator or network manager. It will also benefit you if you're interested in incident handling and response.

8x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to eight years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

1 - Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

2 - Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

3 - Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

4 - CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

5 - Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

6 - Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

7 - Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

8 - Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

9 - Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 - Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 - Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Weet je niet zeker of je voldoet aan de vereisten?

Firebrand levert in een afleidingsvrije omgeving waardoor je je volledig kan focussen op de te bestuderen materie. We bespreken graag jouw technische achtergrond, ervaring en kwalificaties om vast te stellen of deze versnelde cursus voor jou geschikt is.

Belangstelling? Zie onze prijzen of bel ons op 024-8457770