Certified Incident Handler (CIH)

 

About the Program

The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.

Cybersecurity Professionals interested in pursuing incident handling and response as a career require comprehensive training on the IH&R concepts as well as real-world scenarios. The ECIH program includes hands-on learning delivered through iLabs, online labs within the training program.

  • EC-Council’s Certified Incident Handler provides students with a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. The skills taught in EC-Council’s ECIH program are desired by cybersecurity professionals from around the world and is respected by employers.

    ECIH Course Benefits

    • To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.

    • To ensure that organization can identify, contain, and recover from an attack.

    • To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.

    • To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.

    • To minimize the loss and after-effects breach of the incident.

    • For individuals: To enhance skills on incident handling and boost their employability.

    • Penetration Testers

    • Vulnerability Assessment Auditors

    • Risk Assessment Administrators

    • Network Administrators

    • Application Security Engineers

    • Cyber Forensic Investigators/ Analyst and SOC Analyst

    • System Administrators/Engineers

    • Firewall Administrators and Network Managers/IT Managers

  • To be eligible to sit the ECIH Exam, the candidate must either:

    • Attend official ECIH training through any of EC-Council’s Authorized Training Centers (ATCs) or attend EC-Council’s live online training via iWeek or join our self-study program through iLearn (see https://iclass.eccouncil.org).

    OR

    • Candidates with a minimum of 1 year of work experience in the domain that would like to apply to take the exam directly without attending training are required to pay the USD100 Eligibility Application Fee. This fee is included in your training fee should you choose to attend training.

    Number of Questions: 100

    Test Duration: 3 Hours

    Test Delivery: ECC Exam Portal

    Test Format: Multiple Choice

    Passing Score: 70%


Tuition & Program Info

To learn more about ETI’s tuition and financial aid options, click here.

$2,399

This is a self-paced program. Self-paced programs create a unique learning experience that allows students to learn independently and at a pace that best suits them.

Duration: 12 Weeks

What’s included:

  • ECIH Online Self-Paced Streaming Video Course (1 year access)

  • CyberQ Labs (6 Months Access)

  • Certificate of Completion from EC-Council

  • CodeRed (12-month Subscription)

    • 4000+ Premium Videos

    • New courses and content added weekly

    • Courses contain an abundance of demo lab videos that dive deeper into important cyber concepts


  • Module 01: Introduction to Incident Handling and Response

    Module 02: Incident Handling and Response Process

    Module 03: Forensic Readiness and First Response

    Module 04: Handling and Responding to Malware Incidents

    Module 05: Handling and Responding to Email Security Incidents

    Module 06: Handling and Responding to Network Security Incidents

    Module 07: Handling and Responding to Web Application Security Incidents

    Module 08: Handling and Responding to Cloud Security Incidents

    Module 09: Handling and Responding to Insider Threats