Companies Home Search Profile

ECIH Cert Prep: Certified Incident Handler v2 (212-89)

Focused View

19:34:02

85 View
  • 001. Overview.mp4
    04:48
  • 002. ECIH v2 EC-Council certification overview.mp4
    07:13
  • 003. Information security and incident management.mp4
    23:57
  • 004. What is vulnerability management.mp4
    24:55
  • 005. What are threat assessments.mp4
    19:22
  • 006. Risk management Vocabulary.mp4
    17:33
  • 007. Risk management The process.mp4
    27:35
  • 008. Risk management The NIST RMF.mp4
    22:26
  • 009. Incident handling best practices, standards, and frameworks.mp4
    21:22
  • 010. Incident handling and legal compliance.mp4
    21:30
  • 011. Step one Prepare for incident handling and response.mp4
    23:31
  • 012. Step two Incident recording and assignment.mp4
    16:48
  • 013. Step three Incident triage.mp4
    20:55
  • 014. Step four Notification.mp4
    22:52
  • 015. Step five Containment.mp4
    14:49
  • 016. Step six Evidence gathering and forensic analysis.mp4
    25:16
  • 017. Step seven Eradication.mp4
    11:49
  • 018. Step eight Recovery.mp4
    19:25
  • 019. Step nine Postincident activities.mp4
    14:29
  • 020. Forensics and first response.mp4
    20:11
  • 021. Principles of digital evidence collection.mp4
    26:18
  • 022. Data acquisition.mp4
    24:06
  • 023. Volatile evidence collection.mp4
    22:30
  • 024. Static evidence collection and anti-forensics.mp4
    27:10
  • 025. Preparation for handling malware incidents.mp4
    25:13
  • 026. Detection of malware incidents.mp4
    23:34
  • 027. Containment of malware incidents.mp4
    21:46
  • 028. Eradication of malware incidents.mp4
    20:05
  • 029. Recovery after malware incidents.mp4
    15:10
  • 030. Handling email security incidents.mp4
    22:39
  • 031. Preparation handling network security incidents.mp4
    18:46
  • 032. Detection and validation of network security incidents.mp4
    21:03
  • 033. Handling unauthorized access incidents.mp4
    24:13
  • 034. Handling inappropriate usage incidents.mp4
    20:26
  • 035. Handling denial-of-service incidents.mp4
    22:49
  • 036. Handling wireless network security incidents.mp4
    22:14
  • 037. Preparation to handle web app security incidents.mp4
    23:49
  • 038. Detecting and analyzing web app security incidents.mp4
    25:05
  • 039. Containment of web app security incidents.mp4
    11:22
  • 040. Eradication of web app security incidents.mp4
    25:25
  • 041. Recovery from web app security incidents.mp4
    14:52
  • 042. Web app security threats and attacks.mp4
    24:20
  • 043. Cloud computing concepts.mp4
    22:39
  • 044. Best practices against cloud security incidents.mp4
    22:27
  • 045. Best practices against insider threats.mp4
    23:01
  • 046. Security checks using buck-security in Linux.mp4
    08:28
  • 047. Volatile evidence collection in Linux and Windows.mp4
    24:59
  • 048. Using OSForensics to find hidden material.mp4
    25:20
  • 049. Analyzing nonvolatile data using the Autopsy tool.mp4
    22:53
  • 050. Malware analysis.mp4
    23:13
  • 051. Collecting information by tracing emails.mp4
    14:19
  • 052. Using OSSIM.mp4
    25:58
  • 053. Using Wireshark and Nmap.mp4
    27:10
  • 054. Using Suricata IDS.mp4
    26:23
  • 055. What does a SQL injection attack look like.mp4
    22:01
  • 056. What does a XSS attack look like.mp4
    21:30
  • Description


    This course from ITProTV takes an in-depth look at the skills and knowledge you need to become a successful incident handler and response team member, with an eye on taking and passing the EC-Council's Certified Incident Handler v2 (ECIH) exam. ITProTV instructors Daniel Lowrie and Adam Gordon discuss the basic skills needed to handle and respond to security events and address various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The incident handling skills taught in E|CIH are useful for a wide array of cybersecurity jobs and tasks, like penetration testing, vulnerability assessment, risk assessment, network administrators, cyber forensic investigators, and more.

    Note: This course was created by ITProTV. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 56
    • duration 19:34:02
    • Release Date 2023/01/04