Certified Incident Handler ECHI – EC Council
Short course
Inhouse
Description
-
Type
Short course
-
Level
Intermediate
-
Methodology
Inhouse
-
Duration
2 Days
-
Start date
Different dates available
This Certified Incident Handler course is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents. The comprehensive training program will make students proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.
Facilities
Location
Start date
Start date
About this course
Upon completion of this course, you will be able to:Individuals certified at this level will be able to understand:* Techniques for detecting and responding to current and emerging computer security threats* How to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling* How to handle and respond to information security incidents and how to cope with various computer security incidents
* Incident handlers* Risk assessment administrators* Penetration testers* Cyber forensic investigators* Vulnerability assessment auditors* System administrators* System engineers* Firewall administrators* Network managers* IT managers* IT professionals and anyone who is interested in incident handling and response
No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.
In addition, the students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident reporting methods, and incident recovery techniques in detail. When a student leaves this intensive 2 day class they will have hands on understanding and experience in Incident Handling.
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Computer Security
- Network
- Protocol
- Network security
- Algorithms
- Network Training
- Python
- IOS
- IoT
- Embedded programming
Teachers and trainers (1)
Bright Solutions
Trainer
Course programme
#text-block-10 { margin-bottom:0px; text-align:left; }
Module 01: Introduction and History of Cryptography
* What is Cryptography?
* History
* Mono-Alphabet Substitution
* Caesar Cipher
* Atbash Cipher
* ROT 13
* Scytale
* Single Substitution Weaknesses
* Multi-Alphabet Substitution
* Cipher Disk
* Vigenère Cipher
* Vigenère Cipher: Example
* Breaking the Vigenère Cipher
* Playfair
* The ADFGVX cipher
* The Enigma Machine
* CrypTool
Module 02: Symmetric Cryptography & Hashes
* Symmetric Cryptography
* Information Theory
* Information Theory Cryptography Concepts
* Kerckhoffs’s Principle
* Substitution
* Transposition
* Substitution and Transposition
* Binary M
* ath
* Binary AND
* Binary OR
* Binary XOR
* Block Cipher vs. Stream Cipher
* Symmetric Block Cipher Algorithms
* Basic Facts of the Feistel Function
* The Feistel Function
* A Simple View of a Single Round
* Unbalanced Feistel Cipher
* DES
* 3DES
* DESx
* Whitening
* AES
* AES General Overview
* AES Specifics
* Blowfish
* Serpent
* Twofish
* Skipjack
* IDEA
* Symmetric Algorithm Methods
* Electronic Codebook (ECB)
* Cipher-Block Chaining (CBC)
* Propagating Cipher-Block Chaining (PCBC)
* Cipher Feedback (CFB)
* Output Feedback (OFB)
* Counter (CTR)
* Initialization Vector (IV)
* Symmetric Stream Ciphers
* Example of Symmetric Stream Ciphers: RC4
* Example of Symmetric Stream Ciphers: FISH
* Example of Symmetric Stream Ciphers: PIKE
* Hash
* Hash – Salt
* MD5
* The MD5 Algorithm
* MD6
* Secure Hash Algorithm (SHA)
* Fork 256
* RIPEMD – 160
* GOST
* Tiger
* CryptoBench
Module 03: Number Theory and Asymmetric Cryptography
* Asymmetric Encryption
* Basic Number Facts
* Prime Numbers
* Co-Prime
* Eulers Totient
* Modulus Operator
* Fibonacci Numbers
* Birthday Problem
* Birthday Theorem
* Birthday Attack
* Random Number Generators
* Classification of Random Number Generators
* Naor-Reingold and Mersenne Twister Pseudorandom Function
* Linear Congruential Generator
* Lehmer Random Number Generator
* Lagged Fibonacci Generator
* Diffie-Hellman
* Rivest Shamir Adleman (RSA)
* RSA – How it Works
* RSA Example
* Menezes–Qu–Vanstone
* Digital Signature Algorithm
* Signing with DSA
* Elliptic Curve
* Elliptic Curve Variations
* Elgamal
* CrypTool
#text-block-11 { margin-bottom:0px; text-align:left; }
Module 04: Applications of Cryptography
* Digital Signatures
* What is a Digital Certificate?
* Digital Certificates
* X.509
* X.509 Certificates
* X.509 Certificate Content
* X.509 Certificate File Extensions
* Certificate Authority (CA)
* Registration Authority (RA)
* Public Key Infrastructure (PKI)
* Digital Certificate Terminology
* Server-based Certificate Validation Protocol
* Digital Certificate Management
* Trust Models
* Certificates and Web Servers
* Microsoft Certificate Services
* Windows Certificates: certmgr.msc
* Authentication
* Password Authentication Protocol (PAP)
* Shiva Password Authentication Protocol (S-PAP)
* Challenge-Handshake Authentication Protocol (CHAP)
* Kerberos
* Components of Kerberos System
* Pretty Good Privacy (PGP)
* PGP Certificates
* Wifi Encryption
* Wired Equivalent Privacy (WEP)
* WPA – Wi-Fi Protected Access
* WPA2
* SSL
* TLS
* Virtual Private Network (VPN)
* Point-to-Point Tunneling Protocol (PPTP)
* PPTP VPN
* Layer 2 Tunneling Protocol VPN
* Internet Protocol Security VPN
* SSL/VPN
* Encrypting Files
* Backing up the EFS key
* Restoring the EFS Key
* Bitlocker
* Bitlocker: Screenshot
* Disk Encryption Software: Truecrypt
* Steganography
* Steganography Terms
* Historical Steganography
* Steganography Details
* Other Forms of Steganography
* Steganography Implementations
* Demonstration
* Steganalysis
* Steganalysis – Raw Quick Pair
* Steganalysis – Chi-Square Analysis
* Steganalysis – Audio Steganalysis
* Steganography Detection Tools
* National Security Agency and Cryptography
* NSA Suite A Encryption Algorithms
* NSA Suite B Encryption Algorithms
* National Security Agency: Type 1 Algorithms
* National Security Agency: Type 2 Algorithms
* National Security Agency: Type 3 Algorithms
* National Security Agency: Type 4 Algorithms
* Unbreakable Encryption
Module 05: Applications of Cryptography
* Breaking Ciphers
* Cryptanalysis
* Frequency Analysis
* Kasiski
* Cracking Modern Cryptography
* Cracking Modern Cryptography: Chosen Plaintext Attack
* Linear Cryptanalysis
* Differential Cryptanalysis
* Integral Cryptanalysis
* Cryptanalysis Resources
* Cryptanalysis Success
* Rainbow Tables
* Password Cracking
* Tools
Certified Incident Handler ECHI – EC Council