وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

ECIH Cert Prep: Certified Incident Handler v2 (212-89)

سرفصل های دوره

This course from ITProTV takes an in-depth look at the skills and knowledge you need to become a successful incident handler and response team member, with an eye on taking and passing the EC-Council's Certified Incident Handler v2 (ECIH) exam. ITProTV instructors Daniel Lowrie and Adam Gordon discuss the basic skills needed to handle and respond to security events and address various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are useful for a wide array of cybersecurity jobs and tasks, like penetration testing, vulnerability assessment, risk assessment, network administrators, cyber forensic investigators, and more.

Note: This course was created by ITProTV. We are pleased to host this training in our library.


01. Introduction
  • 001. Overview
  • 002. ECIH v2 EC-Council certification overview

  • 02. Incident Handling and Response Process
  • 003. Information security and incident management
  • 004. What is vulnerability management
  • 005. What are threat assessments
  • 006. Risk management Vocabulary
  • 007. Risk management The process
  • 008. Risk management The NIST RMF
  • 009. Incident handling best practices, standards, and frameworks
  • 010. Incident handling and legal compliance

  • 03. Forensic Readiness and First Response
  • 011. Step one Prepare for incident handling and response
  • 012. Step two Incident recording and assignment
  • 013. Step three Incident triage
  • 014. Step four Notification
  • 015. Step five Containment
  • 016. Step six Evidence gathering and forensic analysis
  • 017. Step seven Eradication
  • 018. Step eight Recovery
  • 019. Step nine Postincident activities

  • 04. Handling and Responding to Malware Incidents
  • 020. Forensics and first response
  • 021. Principles of digital evidence collection
  • 022. Data acquisition
  • 023. Volatile evidence collection
  • 024. Static evidence collection and anti-forensics

  • 05. Handling and Responding to Email Security Incidents
  • 025. Preparation for handling malware incidents
  • 026. Detection of malware incidents
  • 027. Containment of malware incidents
  • 028. Eradication of malware incidents
  • 029. Recovery after malware incidents

  • 06. Handling and Responding to Network Security Incidents
  • 030. Handling email security incidents

  • 07. Handling and Responding to Web Application Security Incidents
  • 031. Preparation handling network security incidents
  • 032. Detection and validation of network security incidents
  • 033. Handling unauthorized access incidents
  • 034. Handling inappropriate usage incidents
  • 035. Handling denial-of-service incidents
  • 036. Handling wireless network security incidents

  • 08. Handling and Responding to Cloud Security Incidents
  • 037. Preparation to handle web app security incidents
  • 038. Detecting and analyzing web app security incidents
  • 039. Containment of web app security incidents
  • 040. Eradication of web app security incidents
  • 041. Recovery from web app security incidents
  • 042. Web app security threats and attacks

  • 09. Handling and Responding to Insider Threats
  • 043. Cloud computing concepts
  • 044. Best practices against cloud security incidents

  • 10. Hands-On with ECIH Tools
  • 045. Best practices against insider threats

  • 11. Conclusion
  • 046. Security checks using buck-security in Linux
  • 047. Volatile evidence collection in Linux and Windows
  • 048. Using OSForensics to find hidden material
  • 049. Analyzing nonvolatile data using the Autopsy tool
  • 050. Malware analysis
  • 051. Collecting information by tracing emails
  • 052. Using OSSIM
  • 053. Using Wireshark and Nmap
  • 054. Using Suricata IDS
  • 055. What does a SQL injection attack look like
  • 056. What does a XSS attack look like
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 19345
    حجم: 13959 مگابایت
    مدت زمان: 1175 دقیقه
    تاریخ انتشار: 21 شهریور 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید