EC-Council training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live EC-Council training can be carried out locally on customer premises in Morocco or in NobleProg corporate training centers in Morocco.
The ECIH Program is 100% Compliant with the NICE 2.0 Framework AND CREST Framework.
After completing this course you should be able to:
Understand the key issues plaguing the information security world
Combat the different types of cybersecurity threats, attack vectors, threat actors and their motives, goals, and objectives of cybersecurity attacks
Explain the fundamentals of incident management (information security incidents, signs and costs of an incident, incident handling and response and their advantages, etc.)
Explain the fundamentals of vulnerability management, threat assessment, risk management, incident response automation and orchestration
Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
Decode the various steps involved in planning incident handling and response program (Planning, Recording and Assignment, Triage, Notification, Containment, Evidence Gathering and Forensic Analysis, Eradication, Recovery, and Post-Incident Activities)
Have an understanding of the fundamentals of computer forensics and forensic readiness
Comprehend the importance of first response and first response procedure (Evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis)
Find out anti-forensics techniques used by attackers to uncover cybersecurity incident cover-ups
Apply the right techniques to different types of cybersecurity incidents in a systematic manner (malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents)
This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone who is interested in incident handling and response.
Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.
The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.
Any cyber security professional who needs to understand how to gather large amounts of relevant threat information from a multitude of intelligence sources which can then be analyzed to provide threat intelligence that accurately predicts the potential threats that an organization may encounter. These individuals may be fulfilling roles such as: Ethical Hackers, Threat Intelligence Analysts, Threat Hunters, SOC Professionals, Digital Forensic and Malware Analysts, Incident Response,