ECIHv3 Brochure
ECIHv3 Brochure
ECIHv3 Brochure
277 days
Average time to identify and contain a data breach.
49 days
Ransomware breaches took 49 days longer than average to identify and contain.
303 Days
Average time to identify and contain a supply chain compromise.
Why Organizations
Need Incident Response?
1. Organizations Invested in buying expensive security products?
> YES
5. Did they predict the possibilities of the attack and its impact?
> No
What is Incident
Response?
Organizations needs
What is E|CIH?
EC-Council's Certified Incident Handler program equips students with the knowledge,
skills, and abilities to effectively prepare for, deal with, and eradicate threats and
threat actors in an incident.
This program provides the entire process of incident handling and response and
hands-on labs that teach the tactical procedures and techniques required to
effectively plan, record, triage, notify and contain. Students will learn the handling of
various types of incidents, risk assessment methodologies, as well as laws and
policies related to incident handling. After attending the course, students will be able
to create IH&R policies and deal with different types of security incidents such as
malware, email security, network security, web application security, cloud security,
and insider threat-related incidents.
The E|CIH (EC-Council Certified Incident Handler) also covers post incident activities
such as containment, eradication, evidence gathering and forensic analysis, leading
to prosecution or countermeasures to ensure the incident is not repeated.
The E|CIH is a method-driven course that provides a holistic approach covering vast
concepts related to organizational IH&R, from preparing/planning the incident
handling response process to recovering organizational assets from the impact of
security incidents. These concepts are essential for handling and responding to
security incidents to protect organizations from future threats or attacks.
With over 95 advanced labs, 800 tools covered, and exposure to incident handling
activities on many different operating systems, E|CIH provides a well-rounded, but
tactical approach to planning for and dealing with cyber incidents.
The E|CIH program addresses all stages involved in the IH&R process, and this
attention toward a realistic and futuristic approach makes E|CIH one of the most
comprehensive IH&R-related certifications in the market today.
E|CIH Course Modules:
What Do You
Learn from E|CIH ?
Various types of cyber security threats, attack vectors, threat actors, and
their motives, goals, and objectives of cyber security attacks
1 2 3
4 5 6
7 8 9
125 95 10+
Incident handling Labs environment Incident handling
templates, checklists, simulates a real-time playbooks and runbooks
and toolkits environment
(Covered in 22 Scenario-based Labs)
100% 100%
Compliance to compliance with
NICE 2.0 Framework CREST CCIM
01 02 03
04 05 06
07 08 09
10 11
Learn Understand
to handle and Detect & analyze
respond to various modern attack TTPs
types of security using various incident
incidents on a handling tools
real-time
organizational
network.
E|CIH Is Built to Remediate
Modern Cyber Threats
E|CIH fully maps to the National Initiative for Cybersecurity Education (NICE) in the
Protect and Defend (PR) category and Incident Response (CIR) specialty area
handling deals with investigating, analyzing, and responding to cyber incidents within
a network environment or enclave.
Exam
Details:
Exam Title:
Training Details:
Training: 3 Days
Training Options:
iLearn (Self-Study) iWeek (Live Online) Training Partner
(In Person)
This solution is an This solution is an online,
asynchronous, self-study live training course led by This solution offers
environment in a an instructor. in-person training so
video-streaming format. that you can get the
benefit of collaborating
with your peers.
15
Job Roles
Mapped to E|CIH:
1 Incident Handler
2 Incident Responder
4 CSIRT Analyst/Engineer/Manager
13 Penetration Tester
16
• Individuals from the information security profession and who want to enrich their
skills and knowledge in the field of incident handling and response.
The E|CIH is the most comprehensive program and provided tools and
methodologies applicable to any industry. Helped me a lot to develop
my job, so I can offer my organization the best practices and best ways
to identify
Pedro Pachon
Cybersecurity Chief
Falabela Bank (Columbia)
E|CIH course helps us to analyze the risk and before that also to
respond to any incident. How precautions one should take and to
protect an organization from breaches, and more on data
protection as well.
Elysha Esaivani
Problem Manager
The E|CIH helps to respond to any cyber incidents or espionage
incidents that will happen to any organization, and this really helps us
to contain as soon as possible. E|CIH course enables me to
understand from where the attack initiates and until where we can
contain or control it and get everything back online.
This course is very useful for companies because you learn how to create
a successful incident response path. Furthermore this program gives you
the right approach when facing an incident, giving you the correct and
adequate solutions. This also includes legal aspects. More than giving you
the right approach, the program also teaches you the basic techniques
in incident handling so that we can work on them.
Giovanni Miglionico
IT Security Manager
Edoardo Rosa
Cybersecurity Specialist
The E|CIH program provides a technical vision with many labs and tools
to be used in the cybersecurity field. And gives you the standards and
protocols which are essential in incident handling. E|CIH is very useful
and gave me a base on which I can proceed in my cybersecurity
career.”
Lorenzo Pomanti
System Engineer
About EC-Council
EC-Council invented the Certified Ethical Hacker. Founded in 2001 in response to 9/11, EC-Council's mission
is to provide the training and certifications apprentice and experienced cyber security professionals
need to keep corporations, government agencies, and others who employ them safe from attack.
Best known for its Certified Ethical Hacker program, EC-Council today offers 200 different training
programs, certifications, and degrees in everything from Computer Forensic Investigation and Security
Analysis to Threat Intelligence and Information Security. An ISO/IEC 17024 Accredited Organization
recognized under the US Defense Department Directive 8140/8570 and many other authoritative
cybersecurity bodies worldwide, the company has certified over 350,000 professionals across the globe.
Trusted by seven of the Fortune 10, half of the Fortune 100, and the various agencies public and private
across 140 nations, EC-Council is the gold standard in cybersecurity education and certification.
A truly global organization with a driving belief in bringing diversity, equity, and inclusion to the modern
cybersecurity workforce, EC-Council maintains 11 offices in the U.S., the UK, India, Malaysia, Singapore, and
Indonesia.
www.eccouncil.org