EC-Council Certified Incident Handler ECIH v3 Zertifizierung
Institut: ETC - Enterprise Training Center GmbHBereich: Technik, EDV, Telekommunikation
Kursbeschreibung
This programm addresses all the stages involved in incident handling and the response process to enhances your skills as an incident handler and responder, increasing your employability. This approach makes E|CIH one of the most comprehensive incident handling and response related certifications on the market today. The skills taught in EC-Council´s E|CIH program are desired by cybersecurity professionals from around the world and is respected by employers.
The Purpose of E|CIH is:
- to enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way
- to ensure that organization can identify, contain, and recover from an attack
- to reinstate regular operations of the organization as early as possbile and mitigate the negative impact on the business opeerations
- to be able to draft security policies with efficacy and ensure that the quality of services is mantained at the agreeed levels
- to minimize the loss and after-effects breach of the incident
- for individuals: to enhance skills on incident handling and boost their employability
Learning Objectives of E|CIH Program:
- Understand the key issues plaguing the information security world
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incdients, cloud security incidents, and insider threat-related incidents
- Learn to combat different types fo cybersecurity threats, atttack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentsl of vunlerability management, threat assessment, risk management, and incident response automation and orchestration
- Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Decode the various steps involved in planning an incident handling and response program
- Gain an understanding of the fundamentals of computer forensics and forensic readiness
- Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acqusition, volatile and static evidence collection, and evidence analysis
- Understand antiforensics techniques used by attackers to find cyberscurity incident cover-ups
This programm addresses all the stages involved in incident handling and the response process to enhances your skills as an incident handler and responder, increasing your employability. This approach makes E|CIH one of the most comprehensive incident handling and response related certifications on the market today. The skills taught in EC-Council´s E|CIH program are desired by cybersecurity professionals from around the world and is respected by employers.
The Purpose of E|CIH is:
- to enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way
- to ensure that organization can identify, contain, and recover from an attack
- to reinstate regular operations of the organization as early as possbile and mitigate the negative impact on the business opeerations
- to be able to draft security policies with efficacy and ensure that the quality of services is mantained at the agreeed levels
- to minimize the loss and after-effects breach of the incident
- for individuals: to enhance skills on incident handling and boost their employability
Learning Objectives of E|CIH Program:
- Understand the key issues plaguing the information security world
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incdients, cloud security incidents, and insider threat-related incidents
- Learn to combat different types fo cybersecurity threats, atttack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentsl of vunlerability man…
mehrweniger lesen
Beginn
23.11.2026
Ende
25.11.2026
Uhrzeit
ca 09:00 - 16:00 Uhr
Dauer
21.0 LE
Ort
ETC-Wien
| Weitere Termine | Standort | Kosten |
|---|---|---|
| 07.04.2026 - 09.04.2026 (zum Kurs) | ETC-Wien | € 2.950 exkl. 20% MwSt |
| 26.05.2026 - 28.05.2026 (zum Kurs) | ETC-Wien | € 2.950 exkl. 20% MwSt |
| 27.05.2026 - 29.05.2026 (zum Kurs) | ETC-Wien | € 2.950 exkl. 20% MwSt |
| 23.09.2026 - 25.09.2026 (zum Kurs) | ETC-Wien | € 2.950 exkl. 20% MwSt |
E-Mail
Kontakt
Mathias Leiner
Ort
ETC - Enterprise Training Center
Straße
Modecenterstrasse 22/Office 4
PLZ
1030
Ort
Wien
Land
Österreich
Bundesland
Wien
Tel
Fax
+431533 17 77-85
E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.
E|CIH members are ambitious security professionals who work in Fortune 500 organizations globally.
Zielgruppe
The incident handling skills taught in E|CIH are complementary to the job roles below as well as many other cybersecurity jobs:
- Penetration Testers
- Vulnerability Assessment Auditors
- Risk Assessment Administrators
- Network Administrators
- Application Security Engineers
- Cyber Forensic Investigators/Analyst and SOC Analyst
- System Administrators/EngineersSystem Administrators/Engineers
- Firewall Administrators and Network Managers/IT Managers
Kosten
€ 2.950
exkl. 20% MwSt
exkl. 20% MwSt
Kursnummer
ECIH
Diese Kurse könnten Sie auch interessieren ...
Uber Weiterbildungsvorschläge
Anwenderschulung PC-ABC / Windows
Anwenderschulung Maschinschreiben Vertiefung
All-In-Paket EDV im Büroalltag Basis
Excel Kurs: VBA Makro - Eigene Makro Routinen erstellen (M-2-25)
Brandschutz auf Baustellen - Grundlagen
Beweissicherung am Bau
Ausbildung Brandschutzwart:in
Ausbildung zertifizierte:r DSMS-Manager:in & -Auditor:in nach ISO 27701 TÜV®
Ausbildung zertifizierte:r DSMS-Manager:in & -Auditor:in nach ISO 27701 TÜV®
PT 1&2: Kombikurs Eindringprüfung - Stufe 1&2
IFS Logistics 3.0
Die Photovoltaik-Vorschriftenlandschaft
Die Druckgeräterichtlinie 2014/68/EU
Die Druckgeräterichtlinie 2014/68/EU
Excel Kurs: Advanced - Fortgeschrittenes Wissen (F-3-26)
LINUX, Administration
LINUX, Administration
Wireshark, Analyse von Netzwerken
Wireshark, Analyse von Netzwerken
Microsoft Fabric, Analytics Engineer
Microsoft Fabric, Analytics Engineer
Microsoft 365, Cybersecurity Architect
Microsoft 365, Cybersecurity Architect
Windows Server, Group Policies Workshop
Windows Server, Group Policies Workshop
Windows 11 Client, Modern Desktop Managing
Windows 11 Client, Modern Desktop Managing
PHP, Serverseitige Web-Programmierung
PHP, Serverseitige Web-Programmierung
Microsoft 365, Service Desk & Troubleshooting Workshop
Microsoft 365, Service Desk & Troubleshooting Workshop
SQL Server, SQL Tuning Workshop
SQL Server, SQL Tuning Workshop
Word, Vertiefung: Formulare, Vorlagen und Seriendruck
Word, Vertiefung: Formulare, Vorlagen und Seriendruck
Programmieren in JavaScript - Basics
Software Developer - JavaScript
ICDL Base
ArchiCAD Hochbautechniker 1 - Grundlagen
Elektrotechnische Sicherheitsvorschriften für fächerübergreifende Tätigkeiten
Intensivvorbereitung LAP Elektrotechnik für Wiederholer
Überprüfung elektrischer Anlagen, E-Check für Lehrlinge
Ausbildung zum Führen von Baggern und Baumaschinen
Ausbildung zum Führen von Lauf-, Bock- und Portalkranen
Ausbildung zum Führen von Fahrzeug- und Ladekranen über 300 kNm
Ausbildung zum Führen von Fahrzeug- und Ladekranen bis 300 kNm
Manuelle Lymphdrainage Basiskurs nach Dr. Vodder
SQL-Basis - Abfragen und Ändern von Daten
Webentwicklung - Programmiertalk
Einstieg in die Fotografie
Autodesk Inventor Grundlagen
Autodesk Inventor - Grundlagen
Elektronik III - Digitaltechnik
Cloud Computing Fundamentals
Microsoft Outlook Basics
(Check Point) IPSEC VPN Troubleshooting Workshop
Microsoft Word Basics
IBM Spectrum Protect 8.1.7 for Virtual Environment Workshop - Theory and Exercises
PostgreSQL für Oracle DBAs
IBM Db2 LUW Family Fundamentals
UNIX/Linux I - Fundamentals
Microsoft Office 365 - Grundlagen für das webbasierte Arbeiten
Office 365 mit Microsoft Office 2016/2019 Desktop für Anwender
Certified Scrum Master (CSM) - Scrum Alliance Zertifizierung
Meet Copilot
Power BI Basics
Workshop â Intune Troubleshooting (Teil 3)
Projektmanagement Einführung
UML1 : Objektorientierter Softwareentwurf mit UML - Grundlagen
Icinga2 Netzwerk Monitoring
Logstash, Elasticsearch und Kibana
Tabular Data Modeling with DAX für Microsoft Power BI und Excel
HPE Ezmeral Data Fabric Cluster Administration
Introducing z/OS UNIX System Services
ISTQB® Certified Tester Foundation Level
Microsoft Azure Security Technologies
Microsoft Power Platform - optimise & automate
Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications
Microsoft Exchange Server â Hybrid Messaging mit Exchange Online
Linux 1 - Grundlagen
Microsoft Azure Security Technologies
Managing Entra ID from A to Z (ATZ)
Configure and Operate Microsoft Azure Virtual Desktop
Linux 3 - Advanced Administration
VMware vSAN: Install, Configure, Manage [V8]
Configure and Operate Microsoft Azure Virtual Desktop
Concepts and Facilities for HPE NonStop Systems
Certified Data Science Practitioner⢠(CDSP)
Developing Solutions for Microsoft Azure
Designing and Implementing Microsoft DevOps Solutions
SQL Server: Administration
Implementing and Operating Cisco Enterprise Network Core Technologies
Netzwerk-Grundlagen und TCP/IP Networking
EC-Council Certified Network Defender v3
Certified Security Specialist
Red Hat High Availability Clustering with Exam
Red Hat High Availability Clustering
Microsoft Windows Automation with Red Hat Ansible
VMware vSphere: Install, Configure, Manage [V8]
UNIX/Linux I+II - Bundle (GK6400+GK6701)
Entwicklung von XAML-basierten Windows Desktop Applikationen mit WPF und WinUI
Designing and Implementing Microsoft DevOps Solutions
Copilot Week
Developing Solutions for Microsoft Azure
Declarative Development for Platform App Builders in Lightning Experience
Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
Red Hat OpenShift Developer II: Building and Deploying Cloud-native Applications with Exam
RHCSA Rapid Track course with RHCSA Kiosk/remote exam
RHCSA Rapid Track Course
Cisco Data Center Nexus Dashboard Essentials
Multicluster Management with Red Hat Advanced Cluster Management for Kubernetes
Mastering Single Page Applications with Angular
Implementing Cisco Multicast
JavaScript-Kurs - Online Lernen
MS-Teams - Ein starkes Tool für die Online-Kommunikation
Prozessmanagement - Workshop zur Ergebnissicherung
Microsoft® Excel Einführung
Netzwerktechnik - Grundlagen
Intensivkurs: Künstliche Intelligenz in der Wirtschaft
AutoCAD® 2D - Aufbau
BricsCAD® BIM - Building Information Modeling Seminar
Kunststoffrohrleger:in - Ausbildung und Erstprüfung für GAS und WASSER
Führen von Hubstaplern
Führen von Hubstaplern
Führen von Hubstaplern
Excel Kurs: VBA Makro - Eigene Makro Routinen erstellen (M-2-26)
IREB Certified Professional for Requirements Engineering Foundation Level (CPRE-FL engl.) Online
ISTQB® Certified Tester - Advanced Level: Test Manager (English, CTAL-TM) Online
ISTQB Certified Tester - Foundation Level v4.0 (CTFL) Online
Wiederkehrende Prüfung und Prüfung nach Instandsetzung elektrischer Geräte
Ausbildung zur Sicherheitsvertrauensperson (SVP)
Ausbildung zur Sicherheitsvertrauensperson (SVP)
Lauf-, Bock- und Portalkrane über 300 kN - (gemäß § 6 Z 1 lit. b FK-V)
Sprinkleranlage - gem. TRVB 117 O 18
Drehen und Pneumatik für Metallbau- und Blechtechniker:innen (H3)
ICDL-Standard
Geprüfte:r Objektleiter:in gem. ÖNORM D 2040 - Modul 1 (fachlich) und Modul 2 (organisatorisch)
UX Design Sprint Camp -
Führen von Dreh- und Auslegerkranen
Drehen Einführung
ICDL Base
ICDL Standard
EDV Kompetenz
KI verantwortungsvoll nutzen: Praxisleitfaden für Ethik, Recht und Nachhaltigkeit
KI verantwortungsvoll nutzen: Praxisleitfaden für Ethik, Recht und Nachhaltigkeit
Cinema 4D - Licht und Rendering
Adobe Figma - Grundlagen
Design and deliver powerful customer experiences with Dynamics 365 Customer Insights
iSAQB® Certified Professional for Software Architecture - Foundation Level (CPSA-F)
SPCOR - Implementing and Operating Cisco Service Provider Network Core Technologies
SPCOR - Implementing and Operating Cisco Service Provider Network Core Technologies
ISTQB Certified Tester - Advanced Level: Test Manager (English, CTAL-TM)
IREB Certified Professional for Requirements Engineering - Foundation Level (CPRE-FL)
IREB Certified Professional for Requirements Engineering - Foundation Level (English, CPRE FL)
ISTQB Certified Tester - Foundation Level v4.0 (CTFL)
Collaboration Communications Systems Engineer
Collaboration Communications Systems Engineer
AWS Cloud Practitioner Essentials
Microsoft Power BI Data Analyst
Microsoft Power BI Data Analyst
Designing Microsoft Azure Infrastructure Solutions
Designing Microsoft Azure Infrastructure Solutions
ENCOR - Implementing and Operating Cisco Enterprise Network Core Technologies
ENCOR - Implementing and Operating Cisco Enterprise Network Core Technologies
Datenbankentwicklung mit MS Access - Lehrgang
Datenbankentwicklung mit MS Access - Lehrgang
PHP Programmierer - Lehrgang
PHP Programmierer - Lehrgang
DAX-Funktionen in Power BI
DAX-Funktionen in Power BI
JavaScript Programmierer - Lehrgang
JavaScript Programmierer - Lehrgang
Programmierung - Grundlagen
Programmierung - Grundlagen
ITIL® 4 Managing Professional - Lehrgang
ITIL® 4 Managing Professional - Lehrgang
MS Office - Lehrgang
MS Office - Lehrgang
Confluence (Cloud) für Anwender
Confluence (Cloud) für Anwender
ITIL® 4 Specialist: Create, Deliver and Support (CDS)
ITIL® 4 Specialist: Create, Deliver and Support (CDS)
MS Excel - Pivot-Tabellen und Power Pivot (Bundle)
MS Excel - Pivot-Tabellen und Power Pivot (Bundle)
AutoCAD - 3D-Konstruktion
AutoCAD - 3D-Konstruktion
CorelDRAW - Basis
CorelDRAW - Basis
MS Excel - Automatisierung mit Makros
MS Excel - Automatisierung mit Makros
PRINCE2® Foundation und Practitioner (Bundle)
PRINCE2® Foundation und Practitioner (Bundle)
MS Access - Basis
MS Access - Basis
PRINCE2® Foundation und Zertifizierung
PRINCE2® Foundation und Zertifizierung
Adobe Photoshop - Basis
Adobe Photoshop - Basis
VMware vSphere: Install, Configure, Manage [V8]
VMware vSphere: Install, Configure, Manage [V8]