Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863
Prepare for the Certified Incident Handling Engineer exam and learn how to plan, create, and utilize your systems in order to prevent, detect, and respond to security breaches. In this course you will learn the common attack techniques, vectors, and tools used by hackers, so you can effectively prevent, detect, and respond against them. This course is ideal for those who lead incident handling teams or are part of an incident handling team. Certified Incident Handling Engineer NSA, CNSS, NICCS, FBI is:
Every business connected to the internet is getting probed by hackers trying to gain access. The ideal situation is to prevent this from happening, but realistically every business needs to know how to detect and resolve security breaches. Certified Incident Handlers are prepared to do handle these situations effectively.
In this course you will be fully engaged with numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems. The 20 hours of experience in our labs is what will put you ahead of the competition and set you apart as a leader in incident handling.
Upon Completion
You will:
With 13 modules and 14 Labs, the C)IHE will prepare you to handle the toughest incidents of security breaches because you will have knowledge and experience under your belt.
Exam Information
The Certified Incident Handling exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account. The exam will take approximately 2 hours and consist of 100 multiple choice questions.
A minimum grade of 70% is required for certification.
About our Mile2 Courses:
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
Introduction
Chapter 1: Incident Handling Explained
Chapter 2: Incident Response Policy, Plan, and Procedure Creation
Chapter 3: Incident Response Team Structure
Chapter 4: Incident Response Team Services
Chapter 5: Incident Response Recommendations
Chapter 6: Preparation
Chapter 7: Detection and Analysis
Chapter 8: Containment, Eradication, and Recovery
Chapter 9: GRR Rapid Response
Chapter 10: Request Tracker for Incident Response
Chapter 11: Post-Incident Activity
Chapter 12: Incident Handling Checklist
Chapter 13: Incident Handling Recommendation
Chapter 14: Coordination and Information Sharing
Detailed Lab Outline:
Lab Introduction – Recording IPs and Logging In
Lab 1 – Identifying Incident Triggers
Lab 2 – Drafting Incident Response Procedures
Lab 3 – Identifying and Planning for your dependencies
Lab 4 – Testing your plan and using a feedback loop to future proof your response
Lab 5 – Drafting General Security Policies
Lab 6 – Practicing Different Attack Vectors
Lab 7 – Deploy GRR Client and Gather Evidence
Lab 8 – Creating Request Tracker Workflow
Lab 9 – Lessons Learned and Documentation
Lab 10 – Creating an Incident Handling Checklist
Lab 11 – Drafting Incident Response Recommendations for Improvements
Lab 12 – Sharing Agreements and Reporting Requirements
12 months network technologies
Sound knowledge of networking and TCP/IP
Linux knowledge is essential.