Certified Incident Handler (CIH)
About the Program
The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.
Cybersecurity Professionals interested in pursuing incident handling and response as a career require comprehensive training on the IH&R concepts as well as real-world scenarios. The ECIH program includes hands-on learning delivered through iLabs, online labs within the training program.
-
EC-Council’s Certified Incident Handler provides students with a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. The skills taught in EC-Council’s ECIH program are desired by cybersecurity professionals from around the world and is respected by employers.
ECIH Course Benefits
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.
-
Penetration Testers
Vulnerability Assessment Auditors
Risk Assessment Administrators
Network Administrators
Application Security Engineers
Cyber Forensic Investigators/ Analyst and SOC Analyst
System Administrators/Engineers
Firewall Administrators and Network Managers/IT Managers
-
To be eligible to sit the ECIH Exam, the candidate must either:
Attend official ECIH training through any of EC-Council’s Authorized Training Centers (ATCs) or attend EC-Council’s live online training via iWeek or join our self-study program through iLearn (see https://iclass.eccouncil.org).
OR
Candidates with a minimum of 1 year of work experience in the domain that would like to apply to take the exam directly without attending training are required to pay the USD100 Eligibility Application Fee. This fee is included in your training fee should you choose to attend training.
Number of Questions: 100
Test Duration: 3 Hours
Test Delivery: ECC Exam Portal
Test Format: Multiple Choice
Passing Score: 70%
Tuition & Program Info
To learn more about ETI’s tuition and financial aid options, click here.
$2,399
This is a self-paced program. Self-paced programs create a unique learning experience that allows students to learn independently and at a pace that best suits them.
Duration: 12 Weeks
What’s included:
ECIH Online Self-Paced Streaming Video Course (1 year access)
CyberQ Labs (6 Months Access)
Certificate of Completion from EC-Council
CodeRed (12-month Subscription)
4000+ Premium Videos
New courses and content added weekly
Courses contain an abundance of demo lab videos that dive deeper into important cyber concepts
-
Module 01: Introduction to Incident Handling and Response
Module 02: Incident Handling and Response Process
Module 03: Forensic Readiness and First Response
Module 04: Handling and Responding to Malware Incidents
Module 05: Handling and Responding to Email Security Incidents
Module 06: Handling and Responding to Network Security Incidents
Module 07: Handling and Responding to Web Application Security Incidents
Module 08: Handling and Responding to Cloud Security Incidents
Module 09: Handling and Responding to Insider Threats