ECIH Course Certification Training

ECIH Course Certification Training

ECIH Course Certification Training

The EC-Council Certified Incident Handler (ECIH) program has been developed to provide the necessary skills and knowledge to address the computer security incidents in an information set up. The certification program encompasses varied fundamentals and methodologies for identifying and reacting to existing as well as potential computer security threats. The ECIH program endeavours to teach students to tackle different incident forms, risk assessment procedures and different legislations and policies pertaining to incident handling.

eAvighna Online Private Ltd, an internationally recognized, IT Training & Certification Company located in the Gurgaon – Delhi/NCR region offers a comprehensive training program that would empower students to efficiently tackle and address diverse security issues pertaining to security, malicious code as well as insider attack perils. The course curriculum also covers other aspects related to incident response teams, incident reporting ways, and incident recovery methods in a comprehensive manner.

Who Should Attend?

The course is designed to benefit professionals such as incident handlers, cyber forensics investigators, penetration testers, system engineers, risk assessment administrators and firewall administrators. Other professionals in the IT field such as network managers and IT managers also form audience for this program. In fact this course training can be undertaken by anyone who aspires to learn incident handling and response.

ECIH Course Certification Training Benefits

The ECIH program offers the following benefits:

-Prepares students for ECIH exam 212-89.

-Students would be armed with all the requisite skills to build incident handling and response guidelines as well as tackle varied forms of computer security incidents.

-Provides real time skills to students in comprehending and gaining know how in Incident Handling.

ECIH Course Certification Training Outline

  • Introduction to Incident Response and Handling

  • Risk Assessment

  • Incident Response and Handling Steps


  • Handling Incidents related to Network Security & Malicious Code

  • Handling Insider Threats

  • Forensic Analysis and Incident Response

  • Incident Reporting & Recovery

  • Security Policies and Laws