The Certified Incident Handling Engineer vendor-neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks. In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more. Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.
The Certified Incident Handling Engineer vendor-neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks. In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more. Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.
Prerequisite(s):
A minimum of 12 months’ experience in networking technologies, sound knowledge of networking, sound knowledge of TCP/IP, knowledge of Microsoft packages, basic Knowledge of Linux is essential
Audience:
Outline:
Lesson 1: Incident Handling Explained
Lesson 2: Threats, Vulnerabilities, and Exploits
Lesson 3: Preparation
Lesson 4: First Response
Lesson 5: Containment
Lesson 6: Eradication
Lesson 7: Recovery
Lesson 8: Follow-Up
Lesson 9: Advanced Computer Security Incident Response Team
Lesson 10: Advanced – Log File Analysis
Lesson 11: Advanced – Malware, Rootkits and Botnets
Lesson 12: Advanced – Artifact Analysis
Additional information
Length
5 days
Guaranteed to run
No
Contact Us (425) 460-2200
Thank you for using
Themify Popup
This is a sample pop up. A Themify theme or Builder Plugin (free) is recommended to design the pop up layouts.
CIHE – Certified Incident Handling Engineer
Dates are listed in Pacific Time Zone
$3,500.00
The Certified Incident Handling Engineer vendor-neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks. In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more. Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.
Description
Overview:
The Certified Incident Handling Engineer vendor-neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks. In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more. Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.
Prerequisite(s):
A minimum of 12 months’ experience in networking technologies, sound knowledge of networking, sound knowledge of TCP/IP, knowledge of Microsoft packages, basic Knowledge of Linux is essential
Audience:
Outline:
Lesson 1: Incident Handling Explained
Lesson 2: Threats, Vulnerabilities, and Exploits
Lesson 3: Preparation
Lesson 4: First Response
Lesson 5: Containment
Lesson 6: Eradication
Lesson 7: Recovery
Lesson 8: Follow-Up
Lesson 9: Advanced Computer Security Incident Response Team
Lesson 10: Advanced – Log File Analysis
Lesson 11: Advanced – Malware, Rootkits and Botnets
Lesson 12: Advanced – Artifact Analysis
Additional information
5 days
No