Certified Incident Handling Engineer (CIHE) – Perfil

Esquema Detallado del Curso

  • Introduction
    • Courseware Materials
    • Who is this class for?
    • What is the purpose of this course?
    • What information will be covered?
    • The Exam
    • Incident Handling Explained
    • Security
    • Logs
    • Alerts
    • What is an Incident?
    • Security Incident
    • Indication of Compromise
    • What is Incident Handling?
    • Difference between IH and IR
    • Common Tools
    • IPS vs WAF
    • SOC
    • Six Step Approach to Incident Handling
  • Threats, Vulnerabilities and Exploits
    • Overview
    • Vullnerabilities
    • Exploits
    • Threat
    • Incident Classification
  • Preparation
    • Overview
    • Policies & Procedures
    • The Team
    • Identify Incident Handling Team
    • Roles of the Incident Handling Team
    • IH Team Makeup
    • Team Organization
    • Incident Communication
    • Incident Reporting
    • Incident Response Training and Awareness
    • Underlining Technologies
    • Anti-virus
    • SEIM
    • User Identity
    • Ticketing Systems
    • Digital Forensics
    • eDiscovery
    • Data Backup and Recovery
    • Underlining Technologies
    • Technical Baselines
    • System Hardening
    • Summary
  • First Response
    • Overview
    • Responder Toolkit
    • Responder’s System
    • What to look for Attention Volatility
    • First things first
    • Review
    • Goal
    • Challenges
    • Categorize Incidents
    • Incident Signs
    • Basic Steps
    • Receive
    • Examples of Electronic Signs
    • Examples of Human Signs
    • Analyze
    • Analysis
    • Incident Documentation
    • Incident Prioritization
    • Incident Notification
  • Containment
    • Overview
    • Containment
    • Goals
    • Delaying Containment
    • Choosing a Containment Strategy
    • On-site Response
    • Secure the Area
    • Conduct Research
    • Procedures for Containment
    • Make Recommendations
    • Establish Intervals
    • Capture Digital Evidence
    • Change Passwords
  • Eradication
    • Overview
    • Eradication
    • Goals
    • Procedures for Eradication
    • Determine Cause
    • Procedures for Eradication
  • Recovery
    • Overview
    • Recovery
    • Goals
    • Procedure for Recovery
  • Follow-Up
    • Overview
    • Follow-up
    • Goals
    • Procedures of Follow-up