ACPM It Tanácsadó Kft.
This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.
It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.
E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.
• Penetration Testers
• Vulnerability Assessment Auditors
• Risk Assessment Administrators
• Network Administrators
• Application Security Engineers
• Cyber Forensic Investigators/ Analyst and SOC Analyst
• System Administrators/Engineers
• Firewall Administrators and Network Managers/IT Managers
3 days (9am – 5pm)
24 hours total class time
The E|CIH exam can be attempted after the completion of the official E|CIH course taught either by any EC-Council Authorized Training Center (ATC) or by EC-Council directly. Candidates that successfully pass the exam will receive the E|CIH certificate and membership privileges. Members are required to adhere to the policies of EC-Council’s Continuing Education Policy.
ECIH has been designed and developed in collaboration with cybersecurity and incident handling/responsive experts across the globe. It is a comprehensive specialist level program, with C|EH and C|ND being the “Core” certifications, that teaches how organizations can effectively handle post breach consequences by reducing the impact of the incident, both financial and reputational.
ECIH is a method-driven program which gives a holistic approach covering vast concepts concerning organizational incident handling and response from preparing/planning the incident handline response process to recovering organizational assets from the impact of security indicents. These concepts are highly essential for handling and responding the security incidents to secure the organization from future threats or attacks.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.