EC-Council Certified Incident Handler ECIH v3 Zertifizierung
Institut: ETC - Enterprise Training Center GmbHBereich: Technik, EDV, Telekommunikation
Kursbeschreibung
This programm addresses all the stages involved in incident handling and the response process to enhances your skills as an incident handler and responder, increasing your employability. This approach makes E|CIH one of the most comprehensive incident handling and response related certifications on the market today. The skills taught in EC-Council´s E|CIH program are desired by cybersecurity professionals from around the world and is respected by employers.
The Purpose of E|CIH is:
- to enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way
- to ensure that organization can identify, contain, and recover from an attack
- to reinstate regular operations of the organization as early as possbile and mitigate the negative impact on the business opeerations
- to be able to draft security policies with efficacy and ensure that the quality of services is mantained at the agreeed levels
- to minimize the loss and after-effects breach of the incident
- for individuals: to enhance skills on incident handling and boost their employability
Learning Objectives of E|CIH Program:
- Understand the key issues plaguing the information security world
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incdients, cloud security incidents, and insider threat-related incidents
- Learn to combat different types fo cybersecurity threats, atttack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentsl of vunlerability management, threat assessment, risk management, and incident response automation and orchestration
- Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
- Decode the various steps involved in planning an incident handling and response program
- Gain an understanding of the fundamentals of computer forensics and forensic readiness
- Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acqusition, volatile and static evidence collection, and evidence analysis
- Understand antiforensics techniques used by attackers to find cyberscurity incident cover-ups
This programm addresses all the stages involved in incident handling and the response process to enhances your skills as an incident handler and responder, increasing your employability. This approach makes E|CIH one of the most comprehensive incident handling and response related certifications on the market today. The skills taught in EC-Council´s E|CIH program are desired by cybersecurity professionals from around the world and is respected by employers.
The Purpose of E|CIH is:
- to enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way
- to ensure that organization can identify, contain, and recover from an attack
- to reinstate regular operations of the organization as early as possbile and mitigate the negative impact on the business opeerations
- to be able to draft security policies with efficacy and ensure that the quality of services is mantained at the agreeed levels
- to minimize the loss and after-effects breach of the incident
- for individuals: to enhance skills on incident handling and boost their employability
Learning Objectives of E|CIH Program:
- Understand the key issues plaguing the information security world
- Apply the right techniques to different types of cybersecurity incidents in a systematic manner including malware incidents, email security incidents, network security incidents, web application security incdients, cloud security incidents, and insider threat-related incidents
- Learn to combat different types fo cybersecurity threats, atttack vectors, threat actors and their motives
- Learn the fundamentals of incident management including the signs and costs of an incident
- Understand the fundamentsl of vunlerability manag…
mehrweniger lesen
Beginn
23.11.2026
Ende
25.11.2026
Uhrzeit
ca 09:00 - 16:00 Uhr
Dauer
21.0 LE
Ort
ETC-Wien
| Weitere Termine | Standort | Kosten |
|---|---|---|
| 23.09.2026 - 25.09.2026 (zum Kurs) | ETC-Wien | € 2.950 exkl. 20% MwSt |
E-Mail
Kontakt
Mathias Leiner
Ort
ETC - Enterprise Training Center
Straße
Modecenterstrasse 22/Office 4
PLZ
1030
Ort
Wien
Land
Österreich
Bundesland
Wien
Tel
Fax
+431533 17 77-85
E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.
E|CIH members are ambitious security professionals who work in Fortune 500 organizations globally.
Zielgruppe
The incident handling skills taught in E|CIH are complementary to the job roles below as well as many other cybersecurity jobs:
- Penetration Testers
- Vulnerability Assessment Auditors
- Risk Assessment Administrators
- Network Administrators
- Application Security Engineers
- Cyber Forensic Investigators/Analyst and SOC Analyst
- System Administrators/EngineersSystem Administrators/Engineers
- Firewall Administrators and Network Managers/IT Managers
Kosten
€ 2.950
exkl. 20% MwSt
exkl. 20% MwSt
Kursnummer
ECIH
Diese Kurse könnten Sie auch interessieren ...
Uber Weiterbildungsvorschläge
Anwenderschulung Outlook
Python Fundamentals
Software Testing
VMware vSphere 8 – Fast Track
Ausbildung Dampfkesselwärter:in
Aspekte der Werkstofftechnik, -verarbeitung und -prüfung
Ausbildung Brandschutzwart:in
Ausbildung zertifizierte:r Fachkundige:r für Brandabschottungen TÜV®
Ausbildung zertifizierte:r Qualitätsbeauftragte:r im Gesundheitswesen TÜV®
Ausbildung zertifizierte:r Qualitätsmanager:in im Gesundheitswesen TÜV®
PT 1&2: Kombikurs Eindringprüfung - Stufe 1&2
Kabel und Leitungen
Projektierung, Errichtung und Erweiterung von Hochspannungsanlagen
Technische Dokumentation für Maschinen
Aspekte der Werkstofftechnik, -verarbeitung und -prüfung
Brandmeldeanlagen - BMA (TRVB 123 S)
Brandschutzkonzepte
Fortbildung Sicherheitsvertrauenspersonen
Fortbildung Sicherheitsfachkräfte
Brandschutzkonzepte
Microsoft Azure, Designing and Implementing DevOps Solutions
Microsoft Azure, Designing and Implementing DevOps Solutions
KI und Machine Learning, Grundlagen ChatGPT und weitere KI Tools
Kundenorientierung und Servicequalität, Kommunikation am Servicedesk
Kundenorientierung und Servicequalität, Kommunikation am Servicedesk
Windows Server, Securing
Windows Server, Securing
Microsoft 365, Security Compliance and Identity Fundamentals
Microsoft 365, Security Compliance and Identity Fundamentals
Chief Information Security Officer (CISO), Workshop zur Zertifizierung
Chief Information Security Officer (CISO), Workshop zur Zertifizierung
MS-Excel - Aufbau - Komplexe Kalkulationen professionell erstellen und übersichtlich präsentieren
ArchiCad Hochbautechniker 2 - Vertiefung
Elektrotechnische Sicherheitsvorschriften Gewerbezugang
Ausbildung im Schweißen WIG oder Autogen
Schweißkurs für Lehrlinge MAG oder E
Zertifizierungskurs für Lehrlinge MAG oder E
Basismobilisation - Spezialqualifikation nach MMHmG
LAP-Vorbereitung Konditor
DevOps und Cloud Computing im Java-Umfeld
Illustrationen, Infografiken und Logos mit Adobe Illustrator
Achtsames Fotografieren
Friseur:in - Modul 3 - Vorbereitung auf die fachlich-schriftliche Prüfung
ArchiCAD - Grundlagen
IREB® Certified Professional for Requirements Engineering - Advanced Level (CPRE-AL): Requirements Management - Online
ISAQB Certified Professional for Software Architecture - Foundation Level (CPSA-F) Online
ISTQB® Certified Tester - Advanced Level: Test Analyst (CTAL-TA) Online
ISTQB® Certified Tester - Advanced Level: Test Automation Engineering v2.0 (CTAL-TAE) Englisch - Online
Elektrotechnisch unterwiesene Person
Staplerführer:in - (gemäß § 6 Z 2 FK-V)
Staplerführer:in - (gemäß § 6 Z 2 FK-V)
Microsoft Excel Aufbau
SEO - Modul Keyword Recherche
Full Stack Web Development (Teilzeit)
AI Engineer Program
CNC-Fräsen 1 / Basis
ABB Roboter-Basisprogrammierkurs IRC5
Führen von Lauf-, Bock- und Portalkranen
Bürokaufmann/Bürokauffrau Vorbereitung auf die Lehrabschlussprüfung
Microsoft® Excel Aufbau
Microsoft® Excel Aufbau
PC-Einstieg
AutoCAD® 2D - Grundlagen
Fehlersuche in hydraulischen Anlagen
Prüfungsvorbereitung Hubstapler
Führen von Hubstaplern
Virtualisierung mit Hyper-V und anderen Plattformen
Führen von Hubstaplern
ICDL Base
ICDL Standard
EDV Kompetenz
EDV Perfektion
Excel 365 Dynamische Funktionen
Excel Statistik Basic
Word Advanced
Excel Advanced - online
Excel Advanced
Azure Administrator Associate
ePublishing mit Adobe InDesign
CompTIA Security+
Power Platform Functional Consultant Associate
C# Programmierung
Visual Basic .NET Programmierung II
C Programmierung
Administrator Expert
Grundlagen der Programmierung
Python for Data Science
Smartphone & Tablet (Apple)
Excel Pivot-Tabellen (Office 365)
SIEMENS TIA SPS-Programmierung Aufbaukurs
VMware Cloud Foundation: Solution Architecture and Design (VCFSAD)
iSAQB® Certified Professional for Software Architecture - Foundation Level (CPSA-F)
ISTQB Certified Tester - Advanced Level: Test Analyst (CTAL-TA)
IREB Certified Professional for Requirements Engineering - Advanced Level (CPRE-AL): Requirements Management
IREB Certified Professional for Requirements Engineering - Foundation Level (CPRE-FL)
ISTQB Certified Tester - Foundation Level v4.0 (CTFL)
Spring / SpringBoot Ökosystem
Spring / SpringBoot Ökosystem
Microsoft 365 Endpoint Administrator
Microsoft 365 Endpoint Administrator
Collaboration Communications Systems Engineer
Collaboration Communications Systems Engineer
Vom Fachexperten zur Führungskraft
Microsoft Power BI Data Analyst
Microsoft Power BI Data Analyst
Administering Windows Server Hybrid Core Infrastructure
Administering Windows Server Hybrid Core Infrastructure
Data Engineering on Microsoft Azure
Data Engineering on Microsoft Azure
DAX-Funktionen in Power BI
DAX-Funktionen in Power BI
Programmierung mit ASP.NET Web APIs
Programmierung mit ASP.NET Web APIs
Microsoft Azure Administrator
Microsoft Azure Administrator
AutoCAD 2D - Lehrgang
AutoCAD 2D - Lehrgang
Check Point Certified Security Expert R81.20
Check Point Certified Security Expert R81.20
Power Pivot - Leistungsstarke Datenanalysen in MS Excel
Power Pivot - Leistungsstarke Datenanalysen in MS Excel
Microsoft 365 für Anwender
Microsoft 365 für Anwender
AutoCAD - Grundlagen
AutoCAD - Grundlagen
Adobe InDesign - Basis
Adobe InDesign - Basis
MS Word - Aufbau
MS Word - Aufbau
Ausbildung zum Führen von Hubstaplern
MS Power BI - komplexe Datenvisualisierung
Konfliktgespräche erfolgreich führen
Getting Started with Terraform for Google Cloud
Administering Azure und Microsoft 365 using PowerShell and Microsoft Graph PowerShell SDK
ITS: Network Security Fundamentals
Oracle Datenbank und Snapshot Technologie mit NetApp SnapCenter
IBM App Connect Enterprise 12 Application Development III
Microsoft 365 und Office 365 für Administratoren und Service-Desk
Container Einsatz mit Docker
Migrating Virtual Machines to Red Hat OpenShift Virtualization with Ansible Automation Platform
Scrum Foundation für Scrum Master und Product Owner
Datenschutz und Sicherheit - Grundlagen für Anwender
Adobe Dreamweaver Basic
Adobe Premiere Pro - Kompaktseminar
Microsoft Excel Perfection
Microsoft Excel Perfection
Workshop - Intune Advanced (Teil 2)
CPRE-FL / IREB - Zertifizierungslehrgang CPRE Requirements Engineering Foundation Level
ITIL® (Version 5) Foundation
Design and Manage Analytics Solutions Using Power BI
smart SQL Server Business Intelligence: Abfragegestaltung mit Multidimensional Expression
VBA-Programmierung - Integrierte Lösungen mit Office
Workshop - Intune Advanced (Teil 2)
Workshop - Intune Advanced (Teil 2)
SQL Business Intelligence: Datenmodelle mit Analysis Services
ITIL® 4 Foundation
Workshop - Intune Advanced (Teil 2)
ITIL® 4 Foundation
ITIL® 4 Foundation
ITIL® 4 Foundation
Design and Manage Analytics Solutions Using Power BI
Red Hat OpenShift Administration I: Operating a Production Cluster
Advanced Automation with PowerShell
Advanced Administration and Special Features in SQL
Db2 12 for zOS Advanced Database Administration (all optional AND "Large Objects" themes included)
Microsoft Azure Administrator
Red Hat Satellite 6 Administration
Azure secure & defend
Microsoft 365 Exchange Online Messaging
Microsoft 365 Exchange Online Messaging
Managing Entra ID from A to Z (ATZ)
Advanced Automation with PowerShell
Windows Server: Active Directory und Identitäten
Microsoft Azure Administrator
ICAgile Programming
Secure cloud resources with Microsoft security technologies
ISTQB® CT Advanced Level Test Manager
Red Hat OpenShift Administration II: Configuring a Production Cluster
Develop AI apps and agents on Azure
Secure cloud resources with Microsoft security technologies
FortiOS Administrator
Certified Secure Software Lifecycle Professional
Windows Server Public Key Infrastructure Management & Security (PKI)
Intune Advanced mit Troubleshooting (Teil2 & Teil 3)
Microsoft 365 Endpoint Administrator
Implementing Secure Solutions with Virtual Private Networks
Microsoft Exchange Server 2016/2019 Core Technologies
EC-Council Certified Network Defender v3
Mastering Single Page Applications with Angular
Commvault Professional (Professional Foundations / Professional Advanced)
M365 Fundamentals and Overview
Microsoft 365 Endpoint Administrator
NetScaler ADC 14.x Advanced Features (Security and Management)
M365 Fundamentals and Overview
EC-Council Certified Ethical Hacking v13 (CEH) Ai
Network Scripting Workshop
Advanced Assembler Language Coding Workshop
Microsoft Power Platform Functional Consultant
Microsoft Power Platform Functional Consultant
Python für Data Science, Maschinelles Lernen & Visualisierung