This course is designed to provide basic skills to deal with and respond to computer security incidents in the information system and to review various principles and techniques essential to detect and respond to current and emerging computer security threats.
How to deal with different types of accidents, risk assessment methodologies, and different laws and policies related to incident handling.
Course Overview
This course is designed to provide basic skills to deal with and respond to computer security incidents in the information system and to review various principles and techniques essential to detect and respond to current and emerging computer security threats. How to deal with different types of accidents, risk assessment methodologies, and different laws and policies related to incident handling.
Course Outlines
Module 1: Introduction to Incident Handling and Response
Module 2: Incident Handling and Response Process
Module 3: Forensic Readiness and First Response
Module 4: Handling and Responding to Malware Incidents
Module 5: Handling and Responding to Email Security Incidents
Module 6: Handling and Responding to Network Security Incidents
Module 7: Handling and Responding to Web Application Security Incidents
Module 8: Handling and Responding to Cloud Security Incidents
Module 9: Handling and Responding to Insider Threats
Course Objectives
- Understand the key issues plaguing the information security world
- Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
- Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Decode the various steps involved in planning an incident handling and response program
- Gain an understanding of the fundamentals of computer forensics and forensic readiness
- Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
- Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents
Course Prerequisites
There are no prerequisites to take the ECIH course.
Course Schedule
Course | Date | Days | Location |
ECIH | 14-Apr-23 | 3 | Cairo, Egypt + live virtual online |
ECIH | 08-Sep-24 | 3 | Cairo, Egypt + live virtual online |
- In-Person Training:
Benefits:
Personal Interaction: Participants can interact with the instructor and fellow learners, fostering a sense of community.
Immediate Feedback: Instructors can provide real-time feedback, addressing questions and concerns on the spot.
Hands-on Activities: Practical exercises and group activities can be conducted more effectively in person.
- Online Training:
Benefits:
Flexibility: Learners can access the course content at their own pace and time, accommodating diverse schedules.
Cost-Effective: Eliminates the need for travel and accommodation expenses, making it more economical.
Scalability: Can accommodate a large number of participants simultaneously, making it suitable for widespread audiences.
- Blended Learning (Combination of In-Person and Online):
Benefits:
Flexibility: Combines the advantages of both in-person and online formats, offering a balance between structure and autonomy.
Cost-Efficiency: Reduces the need for extensive in-person sessions, saving on travel and venue costs.
Adaptability: Can cater to diverse learning styles by incorporating various modes of instruction.
- Virtual Classrooms:
Benefits:
Real-Time Interaction: Allows for live Q&A sessions, discussions, and engagement with participants.
Accessibility: Participants from different locations can join without the need for physical presence.
Recording Options: Recordings can be made available for participants who may have missed the live session.
- Self-Paced Learning (eLearning Modules, Videos):
Benefits:
Individualized Learning: Participants can progress at their speed, revisiting content as needed.
Consistency: Ensures uniform delivery of content to all participants.
24/7 Accessibility: Learners can access materials whenever and wherever is convenient for them.
- Customized Courses:
Relevant Content: Tailored to specific organizational goals.
Industry Focus: Incorporates real industry challenges.
Adapted Learning: Matches varied skill levels of participants.
Focused Skills: Targets key competencies for job success.
Cultural Sensitivity: Respects diverse backgrounds within the organization.
Engaging Content: Uses relatable examples and scenarios.
Flexible Delivery: Adaptable to different learning formats.
Measurable Success: Sets clear objectives for easy evaluation.
Continuous Improvement: Uses feedback for ongoing enhancements.
Cost-Effective: Efficiently directs resources for maximum impact.