Courses

    Pages & Posts

      • IT Training
        • Amazon Cloud (AWS)
        • Analytics and Big Data
        • Cisco
        • Citrix
        • Cloud Computing
        • CompTIA Certification
        • Cybersecurity
        • Deep Learning and AI
        • Development Tools
        • DevOps
        • F5
        • FlexPod
        • IBM
        • IT Security
        • Java
        • Juniper Networks
        • Linux
        • Microsoft
        • Mobile Computing
        • NetApp
        • Oracle
        • Salesforce
        • VMware
        • Web Development, HTML, and JavaScript
        • WebSphere
      • Business Training
        • Business Analysis
        • Enterprise Architecture
        • HIPAA Certification & Training
        • IT Governance
        • ITIL® Certification
        • Project Management
        • Salesforce
        • Scrum & Agile
        • Seminars
      • Services
        • APM Practice
        • Authorized Cisco Training
        • BPM Practice
        • Cloudera Training
        • Distance Learning
        • ITIL® Certification
        • Linux Certification Training
        • Media Security Solutions
        • Microsoft 365
        • Microsoft Official Courses On Demand
        • NetApp Training
        • Salesforce Training
        • Training Facilities
        • Visual Studio TFS Training
        • Enterprise Training Solutions
        • Room Rentals
        • State & Local Government
      • Student Resources
        • Ohio Workforce Training Voucher Program
        • Student Guide / Daily Schedule
        • College Credits / Tuition Reimbursement
        • Career Programs (WIA)
        • Student Policies
        • Testing & Certifications
        • Promotions
        • Local Hotels
        • Local Restaurants
      • Certified Incident Handling Engineer C)IHE

      Course Details

      Download PDF
      CIHE
      5 Days
      $3,500.00
      Request a Course Date

      Certified Incident Handling Engineer C)IHE

      Share this course

      Tweet Share

      The Certified Incident Handling Engineer vendor-neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.


      In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.


      Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.


      BENEFITS OF CIHE COURSE


      Graduates of the mile2 Certified Incident Handling Engineer training obtain real world security knowledge that enables them to recognize vulnerabilities, exploit system weaknesses and help safeguard against threats. This course covers the same objectives as the SANS® Security 504 training and prepares students for the GCIH® and CIHE certifications


      Upon completion of the Certified Incident Handling Engineer course, students will be able to confidently undertake the CIHE certification examination (recommended). Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever-changing security world. This course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world.

      • Course Outline
      • Audience

      Course Outline

      Introduction

      • Courseware Materials
      • Who is this class for?
      • What is the purpose of this course?
      • What information will be covered?
      • The Exam

      Module I - Incident Handling Explained

      • Security Events
      • Logs
      • Alerts
      • What is an Incident?
      • Security Incident
      • Indication of Compromise
      • What is Incident Handling?
      • Difference between IH and IR
      • Common Tools
      • IPS vs WAF
      • SOC
      • Six Step Approach to Incident Handling

      Module II - Threats, Vulnerabilities and Exploits

      • Overview
      • Vulnerabilities
      • Exploits
      • Threat
      • Incident Classification

      Module III – Preparation 

      • Overview
      • Policies & Procedures
      • The Team
      • Identify Incident Handling Team
      • Roles of the Incident Handling Team
      • IH Team Makeup
      • Team Organization
      • Incident Communication 
      • Incident Reporting
      • Incident Response Training and Awareness
      • Underlining Technologies
      • Anti-virus
      • SEIM
      • User Identity
      • Ticketing Systems
      • Digital Forensics
      • eDiscovery
      • Data Backup and Recovery
      • Underlining Technologies
      • Technical Baselines
      • System Hardening
      • Summary 

      Module IV - First Response 

      • Overview
      • Responder Toolkit
      • Responder’s System
      • What to look for
      • Attention
      • Volatility
      • First things first
      • Review
      • Goal
      • Challenges
      • Categorize Incidents
      • Incident Signs
      • Basic Steps 
      • Receive
      • Examples of Electronic Signs
      • Examples of Human Signs
      • Analyze
      • Analysis
      • Incident Documentation
      • Incident Prioritization
      • Incident Notification

      Module V – Containment

      • Overview 
      • Containment
      • Goals 
      • Delaying Containment
      • Choosing a Containment Strategy
      • On-site Response
      • Secure the Area
      • Conduct Research
      • Procedures for Containment
      • Make Recommendations
      • Establish Intervals
      • Capture Digital Evidence
      • Change Passwords

      Module VI – Eradication

      • Overview 
      • Eradication
      • Goals
      • Procedures for Eradication 
      • Determine Cause
      • Procedures for Eradication 

      Module VII – Recovery

      • Overview 
      • Recovery 
      • Goals
      • Procedure for Recovery 

      Module VIII - Follow-Up 

      • Overview 
      • Follow-up 
      • Goals
      • Procedures of Follow-up

      DETAILED LAB OUTLINE

      Introduction

      Lab Resources

      Knowing your way around VMware Player.

      Module One - Attacks Under the Microscope

      • Lab objectives
      • Wireshark
      • Why Wireshark?
      • Running Wireshark
      • Starting Wireshark
      • User interface
      • Filters
      • Netstat
      • Command
      • Options
      • Examples
      • Netcat
      • Cyber Attacks
      • Understanding the hacking methodology
      • IP Space Scanning
      • Port Scanning
      • Network Based Attacks
      • Web Application Based Attacks
      • Host Based Attacks 

      Module Two - Ticketing System

      • Introduction
      • Ticketing System Components
      • Tickets:
      • Queues:
      • System Functionality
      • System login
      • Ticket Creation
      • Ticket Correspondence
      • Ticket Priority Escalation
      • Ticket Assignment
      • Request Tracker for Incident Response – RTIR
      • Normal user role:
      • Incident Handling Role:
      • Viewing unlinked Incident Reports:
      • Create an Incident
      • Linking Incident Reports to an incident:
      • Starting an Investigation

      Module Three Lab - SysInternals Suite

      • Introduction
      • Getting Sysinternals.
      • Usage Guide
      • Process Explorer
      • Process Monitor
      • Autoruns
      • PsTools
      • Disk Utilities
      • Security Utilities
      • Network and Communication utilities.
      • First Response Lab Scenario 

      Module Four Lab - Examine System Active Processes and Running Services

      • Examine Startup Folders
      • The Local Registry
      • The IOC Finder – Collect
      • IOC Finder – Generate Report
      • Malware Removal 

      Final Scenario - 4 hours

      ADVANCED LABS

      Advanced Module 1 – Computer Security Incident Response Team

      Advanced Module 2 – Log File Analysis: Analyzing a Shell History File

      Advanced Module 2 – Log File Analysis: Searching attacks in your Apache logs

      Advanced Module 3 -  Rootkits and Botnets: How to Crash your Roommate’s Windows 7 PC

      Advanced Module 3 – Rootkits and Botnets: Exploit MS Word to Embed a Listener

      Appendix Labs 

      Advanced Module 3 – Rootkits and Botnets: Stuxnet Trojan

      Advanced Module 3 – Rootkits  and Botnets: Zeus Trojan

      Advanced Module 4 – Artifact Analysis: Processing and Storing Artifacts

      Audience

      Prerequisites: 

      • A minimum of 12 months experience in networking technologies
      • Sound knowledge of TCP/IP
      • Knowledge of Microsoft packages
      • Basic Knowledge of Linux is essential

      Related Courses

      College Credit, CEUs, PDUs and CDUs
      When you take courses with the Babbage Simmel, be sure you get the credit you deserve. Curriculum offered by Babbage Simmel can earn you college credit, CEUs, PDUs or CDUs.

      College Credit
      Select curriculum offered by Babbage Simmel is part of the accredited University of Findlay's undergraduate course catalogs. For questions please E-Mail: info@babsim.com or call 614-481-4345.

      Continuing Education Units (CEUs)
      Continuing Education Units (CEUs) are nationally recognized standard units of measurement earned for satisfactory completion of qualified programs of continuing education. If you need more information about CEUs, please E-Mail: info@babsim.com or call 614-481-4345.

      Professional Development Units (PDUs)
      Professional Development Units (PDUs) can be issued by PMI® for formal learning activities related to project management. Project Management Professionals (PMPs®) are required to earn a minimum of 60 PDUs every 3 years to maintain certification. For more information about this program go to the PMI® web site or call 1-855 746 4849.

      Continuing Development Units (CDUs)
      CDUs may be earned by attending professional development (e.g. courses, seminars) offered by organizations endorsed by IIBA® and designated as an EEP vendor. As an IIBA Endorsed Education Provider (EEP) Babbage Simmel's IIBA® endorsed courses qualify for CDU credit. For more information about CDUs go the IIBA® web site or call 1-647-426-3735.

      Our babsimLIVE distance learning brings the classroom learning experience to you by seating you virtually into a real-life instructor-led classroom taught by award winning world-class instructors with other IT professionals like yourself. From the comfort of your home, workplace, or at the Babbage Simmel Columbus Campus, you acquire the training you need, when you want it, in the environment that is most comfortable for you to be successful.

      About Us Contact Us Blog Find A Course

      © Copyright 2018 • Babbage Simmel. All Rights Reserved. Columbus Web Design by Jetpack | Privacy Policy