Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Incident Handler (ECIH) v2
Introduction to Incident Handling and Response
Information Security and Incident Management (23:57)
Overview (4:49)
What is Vulnerability Management (24:55)
What are Threat Assessments (19:22)
Risk Management - Vocabulary (17:33)
Risk Management - The Process (27:35)
Risk Management - The NIST RMF (22:26)
Incident Handling best practices, std., frameworks (21:22)
Incident Handling and Legal Compliance (22:13)
Incident Handling and Response Process
Step 1 - Prepare for Incident Handling, Response (23:31)
Step 2 - Incident Recording and Assignment (16:48)
Step 3 - Incident Triage (20:55)
Step 4 - Notification (22:53)
Step 5 - Containment (11:49)
Step 6 - Evidence Gathering and Forensic Analysis (25:49)
Step 7 - Eradication (11:49)
Step 8 - Recovery (19:25)
Step 9 - Post-Incident Activities (14:29)
Forensic Readiness and First Response
Principles of Digital Evidence Collection (26:18)
Forensics and first response (20:11)
Data Acquisition (24:06)
Volatile Evidence Collection (22:30)
Static Evidence Collection and Anti-Forensics (27:10)
Handling and Responding to Malware Incidents
Preparation for Handling Malware Incidents (25:13)
Detection of Malware Incidents (23:34)
Containment of Malware Incidents (21:46)
Eradication of Malware Incidents (20:05)
Recovery after Malware Incidents (15:10)
Handling and Responding to Email Security Incidents
Handling Email Security Incidents (23:10)
Handling and Responding to Network Security Incidents
Detection, Validation Network Security Incidents (21:03)
Preparation Handling Network Security Incidents (18:46)
Handling Unauthorized Access Incidents (24:13)
Handling Inappropriate Usage Incidents (20:26)
Handling Denial-of-Service Incidents (22:49)
Handling Wireless Network Security Incidents (22:14)
Handling and Responding to Web Application Security Incidents
Preparation to Handle Web App Security Incidents (23:49)
Detecting, Analyzing Web App Security Incidents (25:05)
Containment of Web Application Security Incidents (11:22)
Eradication of Web Application Security Incidents (25:25)
Recovery from Web Application Security Incidents (14:52)
Web Application Security Threats and Attacks (24:20)
Handling and Responding to Cloud Security Incidents
Best Practices Against Cloud Security Incidents (22:27)
Cloud Computing Concepts (22:39)
Handling and Responding to Insider Threats
Best Practices Against Insider Threats (23:09)
Hands-On with E|CIH Tools
Security checks using buck-security on Linux (8:28)
Volatile evidence collection - Linux, Windows (25:00)
Using OSForensics to find hidden material (25:20)
Analyzing non-volatile data using Autopsy (22:53)
Malware analysis (23:13)
Collecting information by tracing emails (14:36)
Using OSSIM (25:58)
Using Wireshark and NMAP (27:10)
Using Suricata IDS (26:23)
What does a SQL Injection Attack look like (22:02)
What does a XSS Attack look like (21:30)
Download Course Files Here
What is Vulnerability Management
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock