Get ready within 3 months to pass your GIAC Certified Incident Handler (GCIH) certification exam. This course is specially developed and delivered by our GCIH Certified industry practitioners to help you pass the GCIH exam in the minimum possible time and on your first try. Our world-class online learning comprises of live support with guaranteed response time, targeted lectures and notes written by industry professionals, practice questions and quizzes, and a dedicated course forum and study group to make the most of community and social learning opportunity. Join 100’s of other professionals who have done it before you and stay confident that you are covered by our 100% Pass Guarantee or your money back.
GIAC’s Certiaciliied Incident Handler (GCIH®) certification is an industry recognized vendor neutral credential. The certification is proof of a person’s competence across a spectrum of skills including Security incidents by understanding common attack techniques, vectors and tools as well as defending against and/or responding to such attacks when they occur. The GCIH certification focuses on detecting, responding, and resolving computer security incidents.
Incident handlers manage security incidents by understanding common attack techniques, vectors and tools as well as defending against and/or responding to such attacks when they occur. The GCIH certification focuses on detecting, responding, and resolving computer security incidents and covers the following security techniques:
- The steps of the incident handling process
- Detecting malicious applications and network activityfff
- Common attack techniques that compromise hosts
- Detecting and analyzing system and network vulnerabilities
- Continuous process improvement by discovering the root causes of incidents
GIAC Certified Incident Handler Certification Program by Eristotle is taught by experienced security experts and industry practitioners who have years of experience in handling real life security incidents and situations. Even though the course is exhaustive in nature and covers a broad range of topics, such as backdoors, Trojan Horses attacks, networking, systems for covering tracks, format strings attacks, denial of service bugs, various levels of incident handling, IP address spoofing, exploitation of systems through Netcats, and so on, it is designed to be simple for easy and fast understanding of the candidates.
Eristotle awards you a Course Completion Certificate once you successfully satisfy the required criteria. The certificate is a record of your achievement, which you can also use towards any course study requirements.
|01-GCIH Certification Introduction||01:00:00|
|02-Incident Handling: Identification||01:00:00|
|03-Incident Handling: Overview and Preparation||00:30:00|
|04-Buffer Overflows and Format String Attacks||01:00:00|
|05-Covering Tracks: Networks||00:30:00|
|06-Covering Tracks: Systems||23:00:00|
|07-Denial of Service Attacks||02:00:00|
|08-Exploiting Clients on the LAN||00:30:00|
|09-Incident Handling: Containment||02:00:00|
|10-Incident Handling: Recovery and Lessons Learned||02:00:00|
|14-Scanning: Host Discovery||01:00:00|
|15-Scanning: Network and Application Vulnerability scanning and tools||02:00:00|
|16-Scanning: Network Devices||02:00:00|
|17-Scanning: Service Discovery||02:00:00|
|18-Session Hijacking and Cache Poisoning||02:00:00|
|19-Techniques for Maintaining Access||01:30:00|
|20-Virtual Machine Attacks||01:00:00|
|21-Web Applications Attack||02:00:00|
|22-Worms, Bots & Bot-Nets||02:00:00|
No Reviews found for this course.