Ideal Candidates for Certified Incident Handler (ECIH) Class
IT professionals involved with information system security, computer forensics, and incident response
Certified Incident Handler (ECIH) Prerequisites
Certified Ethical Hacker
What You'll Get in Certified Incident Handler (ECIH)
What You'll Learn in Certified Incident Handler (ECIH)
The computer forensic investigation process and the various legal issues involvedEvidence searching, seizing and acquisition methodologies in a legal and forensically sound mannerTypes of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime categoryRoles of the first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime sceneSetting up a computer forensics lab and the tools involved in itVarious file systems and how to boot a diskGathering volatile and non-volatile information from WindowsData acquisition and duplication rulesValidation methods and tools requiredRecovering deleted files and deleted partitions in Windows, Mac OS X, and LinuxForensic investigation using AccessData FTK and EnCaseSteganography and its techniquesSteganalysis and image file forensicsPassword cracking concepts, tools, and types of password attacksInvestigating password protected filesTypes of log capturing, log management, time synchronization, and log capturing toolsInvestigating logs, network traffic, wireless attacks, and web attacksTracking emails and investigate email crimesMobile forensics and mobile forensics software and hardware toolsWriting investigative reports
Certified Incident Handler (ECIH) Certification
EC-Council Certified Incident Handler
Certified Incident Handler (ECIH) Outline
1. Computer Forensics in Today's World
2. Computer Forensics Investigation Process
3. Searching and Seizing Computers
4. Digital Evidence
5. First Responder Procedures
6. Computer Forensics Lab
7. Understanding Hard Disks and File Systems
8. Windows Forensics
9. Data Acquisition and Duplication
10. Recovering Deleted Files and Deleted Partitions
11. Forensics Investigation Using AccessData FTK
12. Forensics Investigation Using EnCase
13. Steganography and Image File Forensics
14. Application Password Crackers
15. Log Capturing and Event Correlation
16. Network Forensics, Investigating Logs and Investigating Network Traffic
17. Investigating Wireless Attacks
18. Investigating Web Attacks
19. Tracking Emails and Investigating Email Crimes
20. Mobile Forensics
21. Investigative Reports
22. Becoming an Expert Witness
Testimonials
A. Erlich
RITSC, N6CI just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.