CIHE: Certified Incident Handling Engineer Training in Grand Prairie

Enroll in or hire us to teach our CIHE: Certified Incident Handling Engineer class in Grand Prairie, Texas by calling us @303.377.6176. Like all HSG classes, CIHE: Certified Incident Handling Engineer may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, CIHE: Certified Incident Handling Engineer may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
In this in depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.
Course Length: 5 Days
Course Tuition: $3290 (US)

Prerequisites

A minimum of 12 months experience in networking technologies Sound knowledge of TCP/IP Knowledge of Microsoft packages Basic Knowledge of Linux is essential 

Course Outline

 

Introduction

  • Courseware Materials
  • Who is this class for?
  • What is the purpose of this course?
  • What information will be covered?
  • The Exam 

Module I – Incident Handling Explained

  • Security Events
  • Logs
  • Alerts
  • What is an Incident?
  • Security Incident
  • Indication of Compromise
  • What is Incident Handling?
  • Difference between IH and IR
  • Common Tools
  • IPS vs WAF
  • SOC
  • Six Step Approach to Incident Handling 

Module II – Threats, Vulnerabilities and Exploits

  • Overview
  • Vulnerabilities
  • Exploits
  • Threat
  • Incident Classification 

Module III – Preparation

  • Overview
  • Policies & Procedures
  • The Team
  • Identify Incident Handling Team
  • Roles of the Incident Handling Team
  • IH Team Makeup
  • Team Organization
  • Incident Communication
  • Incident Reporting
  • Incident Response Training and Awareness
  • Underlining Technologies
  • Anti-virus
  • SEIM
  • User Identity
  • Ticketing Systems
  • Digital Forensics
  • eDiscovery
  • Data Backup and Recovery
  • Underlining Technologies
  • Technical Baselines
  • System Hardening
  • Summary
  • Module IV – First Response
  • Overview
  • Responder Toolkit
  • Responder’s System
  • What to look for
  • Attention
  • Volatility
  • First things first
  • Review
  • Goal
  • Challenges
  • Categorize Incidents
  • Incident Signs
  • Basic Steps
  • Receive
  • Examples of Electronic Signs
  • Examples of Human Signs
  • Analyze
  • Analysis
  • Incident Documentation
  • Incident Prioritization
  • Incident Notification 

Module V – Containment

  • Overview
  • Containment
  • Goals
  • Delaying Containment
  • Choosing a Containment Strategy
  • On-site Response
  • Secure the Area
  • Conduct Research
  • Procedures for Containment
  • Make Recommendations
  • Establish Intervals
  • Capture Digital Evidence
  • Change Passwords 

Module VI – Eradication

  • Overview
  • Eradication
  • Goals
  • Procedures for Eradication
  • Determine Cause
  • Procedures for Eradication 

Module VII – Recovery

  • Overview
  • Recovery
  • Goals
  • Procedure for Recovery 

Module VIII – Follow-Up

  • Overview
  • Follow-up
  • Goals
  • Procedures of Follow-up

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.