Ecih V.2
Ecih V.2
and Respond to
Security Incidents
Organizations do not
To identify a To contain and recover
have an Incident
malicious attack from an attack
Response plan
very high.
Average cost savings with trained Average cost savings with an Incident
security employees Response team
It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively
handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational
perspective.
Following a rigorous development, which included a careful Job Task Analysis (JTA) related to incident handling
and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based,
intensive 3-day training program and certification that provides a structured approach to learning real-world
incident handling and response requirements.
Organizations are under constant attack and with the knowledge and skills found in the E|CIH program, professionals
can now not only detect incidents, but also quickly manage and respond holistically to these incidents.
Professionals interested in pursuing incident handling and response as a career require comprehensive training that
not only imparts concepts but also allows them to experience real scenarios. The E|CIH program includes hands-
on learning delivered through labs within the training program. True employability after earning a certification can
only be achieved when the core of the curricula maps to and is compliant with government and industry-published
incident and response frameworks.
E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational
incident handling and response from preparing and planning the incident handling response process to recovering
organizational assets after a security incident. These concepts are essential for handling and responding to security
incidents to protect organizations from future threats or attacks.
This program addresses all the stages involved in incident handling and the response process to enhance your
skills as an incident handler and responder, increasing your employability. This approach makes E|CIH one of the
most comprehensive incident handling and response related certifications on the market today.
The skills taught in EC-Council’s E|CIH program are desired by cybersecurity professionals from around the world
and is respected by employers.
“ Organizations are looking for professional incident handlers and response personnel who can prepare
security policies and plans to tackle incidents with efficacy in time-constrained scenarios in order to reduce
the impact of incidents. – Jay Bavisi, President of EC-Council Group
”
E|CIH IS ONE OF THE BEST
INCIDENT HANDLING
PROGRAMS
4
E|CIH Target Audience
There is no organization that is truly safe from a cyberattack. An Incident Manager with the proper incident
handling skills can help reduce the impact of a breach.
The incident handling skills taught in E|CIH are complementary to the job roles below as well as many
other cybersecurity jobs:
Vulnerability
Penetration Risk Assessment Network
Assessment
Testers Administrators Administrators
Auditors
Firewall
Cyber Forensic
Application System Administrators
Investigators/
Security Administrators/ and Network
Analyst and SOC
Engineers Engineers Managers/IT
Analyst
Managers
E|CIH members are ambitious security professionals who work in Fortune 500 organizations globally.
The E|CIH exam can be attempted after the completion of the official E|CIH course taught either by any EC-
Council Authorized Training Center (ATC) or by EC-Council directly. Candidates that successfully pass the
exam will receive the E|CIH certificate and membership privileges. Members are required to adhere to the
policies of EC-Council’s Continuing Education Policy.
Exam Details
Duration 3 hours
Eligibility Criteria
Candidates with a minimum of 1 year of work experience in the domain that would
like to apply to take the exam directly without attending training are required to
pay the USD100 Eligibility Application Fee. This fee is included in your training fee
should you choose to attend training.
E|CIH Is Built to Remediate Modern Cyber Threats
1. 100% compliant with NICE Special Publication 800-181 Cybersecurity Workforce Framework
E|CIH maps 100 percent to the NICE framework under the category “Protect and Defend (PR)” and the
specialty “Incident Response (CIR)”.
NICE stands for National Initiative for Cybersecurity Education (NICE). The Incident Response (CIR)
specialty area deals with investigating, analyzing, and responding to cyber incidents within the network
environment or enclave. This area enables incident responders to handle crises within the pertinent
domain and mitigate potential threats. CIRs evaluate the effectiveness of and improvements to existing
practices in any organization, which in turn leads to maximizing the survival of life, preservation of
property, and information security.
E|CIH maps 100 percent to the CREST Certified Incident Manager (CCIM) framework. It is focused on
maintaining an appropriate standard for incident response that determines the path of investigation
based on considerable real-world incident handling experience and the pertinent information available.
E|CIH maps to CREST Certified level examinations which are designed to set the benchmark for senior
incident handlers. By gaining the E|CIH certification, individuals are globally recognized as certified
incident handlers.
E|CIH was developed by subject matter experts and practitioners in the incident handling and response
domain by performing a rigorous, industry-wide job task analysis. The program was designed after
performing an intensive analysis of all possible combinations of task, knowledge, skill, and ability (TKSA)
from relevant job postings of various multinational companies across the globe. This comprehensive
mapping and analysis synchronize the E|CIH program to that of the industry-wide incident handler
job requirement criteria, opening the gate of opportunities to E|CIH certification holders into various
multinational organizations.
4. Focuses on a structured approach to perform the incident handling and response process
The E|CIH program focuses on a structured approach for performing the incident handling and response
(IH&R) process. The IH&R process includes stages like incident handling and response preparation,
incident validation and prioritization, incident escalation and notification, forensic evidence gathering
and analysis, incident containment, systems recovery, and incident eradication. This systematic incident
handling and response process creates awareness among incident responders in knowing how to
respond to various types of security incidents.
5. Focus on developing skills in handling different types of cybersecurity incidents
This program demonstrates the complete IH&R process in a systematic way for various types of
cybersecurity incidents including malware incidents, email security incidents, network security
incidents, web application security incidents, cloud security incidents, and insider threat-related
incidents. Covering the end-to-end IH&R process for all these types of security incidents makes the
E|CIH an outstanding program for aspiring and current incident handlers.
Every organization must be well prepared to respond to any security incident. It is crucial for an incident
handler to respond quickly, effectively, and efficiently to handle, contain, and mitigate the incident.
This first response requires a strict and precise set of rules that an incident responder must follow to
deal with the incident appropriately. If there is any lack of forensic readiness or first response process,
the incident can cause disastrous damage to the organization. The E|CIH program focuses on how
an organization should prepare to tackle any sort of cyber incidents along with the steps that a first
responder should perform in recording or dealing with the incident.
7. Hands-on program
E|CIH comes integrated with labs so that students can practice the skills they learn. In fact, more than 40
percent of class time is dedicated to practical learning through EC-Council labs. The theory to practice
ratio for the E|CIH program is 60:40, providing students with a hands-on experience using the latest
incident handling and response tools, techniques, methodologies, and frameworks across different
operating platforms that are required by incident handlers to effectively handle and respond to various
organizational threats and incidents.
The E|CIH lab environment consists of the latest and patched operating systems including Windows 10,
Windows Server 2016, Ubuntu Linux, and OSSIM for performing labs. The lab environment simulates a
real-time situation for incident handlers, giving students skills they can apply immediately to protect
their respective organizations.
Incident handling professionals are bound to operate under certain well-defined rules and regulations.
The E|CIH program covers various cybersecurity and IH&R standards, laws, and policies, enabling
incident handling professionals to align their incident handling process in accordance with industry
standards.
10. Huge inventory of incident handling templates, checklists, and cheat sheets
The program accompanies more than a hundred incident handling templates, checklists, and cheat
sheets for effective incident response planning, which helps in dealing with an incident effectively.
This vast collection of documentation material enables an incident handler to implement required
incident related documentation in their organization. The templates also help incident handlers to draft
comprehensive reports based on the target audience and incidents.
Course Outline
9
Learning Objectives of the E|CIH Program
• Learn to combat di fferent types of cybersecurity threats, attack vectors, threat actors and their motives
• Learn the fundamentals of incident management including the signs and costs of an incident
• Understand the fundamentals of vulnerability management, threat assessment, risk management, and
incident response automation and orchestration
• Master all incident handling and response best practices, standards, cybersecurity frameworks, laws,
acts, and regulations
• Decode the various steps involved in planning an incident handling and response program
• Comprehend the importance of the first response procedure including evidence collection, packaging,
transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
• Apply the right techniques to different types of cybersecurity incidents in a systematic manner including
malware incidents, email security incidents, network security incidents, web application security
incidents, cloud security incidents, and insider threat-related incidents
9
•
• Learn to combat di
•
acts, and regulations