Certified Incident Handler ECHI – EC Council

Short course

Inhouse

£ 1001-2000

Description

  • Type

    Short course

  • Level

    Intermediate

  • Methodology

    Inhouse

  • Duration

    2 Days

  • Start date

    Different dates available

This Certified Incident Handler course is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

Facilities

Location

Start date

Inhouse

Start date

Different dates availableEnrolment now open

About this course

Upon completion of this course, you will be able to:Individuals certified at this level will be able to understand:* Techniques for detecting and responding to current and emerging computer security threats* How to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling* How to handle and respond to information security incidents and how to cope with various computer security incidents

* Incident handlers* Risk assessment administrators* Penetration testers* Cyber forensic investigators* Vulnerability assessment auditors* System administrators* System engineers* Firewall administrators* Network managers* IT managers* IT professionals and anyone who is interested in incident handling and response

No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail. When a student leaves this intensive 2 day class they will have hands on understanding and experience in Incident Handling.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2018

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Computer Security
  • Network
  • Protocol
  • Network security
  • Algorithms
  • Network Training
  • Python
  • IOS
  • IoT
  • Embedded programming

Teachers and trainers (1)

Bright  Solutions

Bright Solutions

Trainer

Course programme


#text-block-10 { margin-bottom:0px; text-align:left; }

Module 01: Introduction and History of Cryptography

* What is Cryptography?
* History
* Mono-Alphabet Substitution
* Caesar Cipher
* Atbash Cipher
* ROT 13
* Scytale
* Single Substitution Weaknesses
* Multi-Alphabet Substitution
* Cipher Disk
* Vigenère Cipher
* Vigenère Cipher: Example
* Breaking the Vigenère Cipher
* Playfair
* The ADFGVX cipher
* The Enigma Machine
* CrypTool

Module 02: Symmetric Cryptography & Hashes

* Symmetric Cryptography
* Information Theory
* Information Theory Cryptography Concepts
* Kerckhoffs’s Principle
* Substitution
* Transposition
* Substitution and Transposition
* Binary M
* ath
* Binary AND
* Binary OR
* Binary XOR
* Block Cipher vs. Stream Cipher
* Symmetric Block Cipher Algorithms
* Basic Facts of the Feistel Function
* The Feistel Function
* A Simple View of a Single Round
* Unbalanced Feistel Cipher
* DES
* 3DES
* DESx
* Whitening
* AES
* AES General Overview
* AES Specifics
* Blowfish
* Serpent
* Twofish
* Skipjack
* IDEA
* Symmetric Algorithm Methods
* Electronic Codebook (ECB)
* Cipher-Block Chaining (CBC)
* Propagating Cipher-Block Chaining (PCBC)
* Cipher Feedback (CFB)
* Output Feedback (OFB)
* Counter (CTR)
* Initialization Vector (IV)
* Symmetric Stream Ciphers
* Example of Symmetric Stream Ciphers: RC4
* Example of Symmetric Stream Ciphers: FISH
* Example of Symmetric Stream Ciphers: PIKE
* Hash
* Hash – Salt
* MD5
* The MD5 Algorithm
* MD6
* Secure Hash Algorithm (SHA)
* Fork 256
* RIPEMD – 160
* GOST
* Tiger
* CryptoBench

Module 03: Number Theory and Asymmetric Cryptography

* Asymmetric Encryption
* Basic Number Facts
* Prime Numbers
* Co-Prime
* Eulers Totient
* Modulus Operator
* Fibonacci Numbers
* Birthday Problem
* Birthday Theorem
* Birthday Attack
* Random Number Generators
* Classification of Random Number Generators
* Naor-Reingold and Mersenne Twister Pseudorandom Function
* Linear Congruential Generator
* Lehmer Random Number Generator
* Lagged Fibonacci Generator
* Diffie-Hellman
* Rivest Shamir Adleman (RSA)
* RSA – How it Works
* RSA Example
* Menezes–Qu–Vanstone
* Digital Signature Algorithm
* Signing with DSA
* Elliptic Curve
* Elliptic Curve Variations
* Elgamal
* CrypTool

#text-block-11 { margin-bottom:0px; text-align:left; }

Module 04: Applications of Cryptography

* Digital Signatures
* What is a Digital Certificate?
* Digital Certificates
* X.509
* X.509 Certificates
* X.509 Certificate Content
* X.509 Certificate File Extensions
* Certificate Authority (CA)
* Registration Authority (RA)
* Public Key Infrastructure (PKI)
* Digital Certificate Terminology
* Server-based Certificate Validation Protocol
* Digital Certificate Management
* Trust Models
* Certificates and Web Servers
* Microsoft Certificate Services
* Windows Certificates: certmgr.msc
* Authentication
* Password Authentication Protocol (PAP)
* Shiva Password Authentication Protocol (S-PAP)
* Challenge-Handshake Authentication Protocol (CHAP)
* Kerberos
* Components of Kerberos System
* Pretty Good Privacy (PGP)
* PGP Certificates
* Wifi Encryption
* Wired Equivalent Privacy (WEP)
* WPA – Wi-Fi Protected Access
* WPA2
* SSL
* TLS
* Virtual Private Network (VPN)
* Point-to-Point Tunneling Protocol (PPTP)
* PPTP VPN
* Layer 2 Tunneling Protocol VPN
* Internet Protocol Security VPN
* SSL/VPN
* Encrypting Files
* Backing up the EFS key
* Restoring the EFS Key
* Bitlocker
* Bitlocker: Screenshot
* Disk Encryption Software: Truecrypt
* Steganography
* Steganography Terms
* Historical Steganography
* Steganography Details
* Other Forms of Steganography
* Steganography Implementations
* Demonstration
* Steganalysis
* Steganalysis – Raw Quick Pair
* Steganalysis – Chi-Square Analysis
* Steganalysis – Audio Steganalysis
* Steganography Detection Tools
* National Security Agency and Cryptography
* NSA Suite A Encryption Algorithms
* NSA Suite B Encryption Algorithms
* National Security Agency: Type 1 Algorithms
* National Security Agency: Type 2 Algorithms
* National Security Agency: Type 3 Algorithms
* National Security Agency: Type 4 Algorithms
* Unbreakable Encryption

Module 05: Applications of Cryptography

* Breaking Ciphers
* Cryptanalysis
* Frequency Analysis
* Kasiski
* Cracking Modern Cryptography
* Cracking Modern Cryptography: Chosen Plaintext Attack
* Linear Cryptanalysis
* Differential Cryptanalysis
* Integral Cryptanalysis
* Cryptanalysis Resources
* Cryptanalysis Success
* Rainbow Tables
* Password Cracking
* Tools

Certified Incident Handler ECHI – EC Council

£ 1001-2000