Pour les demandes entreprises : (+33) 970 466 303
Pour les demandes particuliers : (+33) 180 272 016
The GIAC Certified Incident Handler (GCIH) training focuses on incident management, computer crime investigation, hacker exploits, and tools such as Nmap, Metasploit, and Netcat. Designed for incident handlers, administrators, and security practitioners, it provides essential skills to understand, respond to, and defend against security incidents.
Module 1: Introduction to Security Incident Management
Unveiling the GIAC Incident Handler (GCIH) certification.
Grasping foundational aspects of security incident management.
Unraveling the roles and responsibilities of an incident manager.
Module 2: Investigation Methodology
Delving into incident investigation processes.
Mastering the art of evidence collection and data integrity preservation.
Analyzing the wealth of information gathered during an incident.
Module 3: Network Monitoring and Incident Detection
Leveraging network monitoring tools for heightened awareness.
Identifying the subtle Indicators of Compromise (IoC).
Proactively detecting incidents before they escalate.
Module 4: Incident Analysis on Systems
Exploring the intricacies of collecting and analyzing system logs.
Hunting for evidence on compromised systems.
Employing triage methods and conducting preliminary analyses.
Module 5: Vulnerability-Related Incident Management
Scrutinizing vulnerabilities and security flaws for informed action.
Identifying and strategically addressing vulnerabilities.
Providing recommendations for reducing overall risk.
Module 6: Network Incident Analysis
Analyzing and decoding suspicious network traffic patterns.
Tracking and responding to network attacks with precision.
Implementing effective network incident management.
Module 7: Analysis of Advanced Persistent Threat (APT) Incidents
Building an understanding of Advanced Persistent Threats (APTs).
Exploring investigative methods tailored for APTs.
Formulating and executing incident management strategies for APT incidents.
Module 8: Malware-Related Incident Analysis
Diving into the diverse landscape of malware types.
Dissecting malicious code for actionable insights.
Identifying and eradicating malware for a secure environment.
Module 9: Online Fraud Incident Analysis
Detecting fraudulent activities in the online realm.
Tracking and responding to online fraud incidents.
Implementing effective incident management protocols for fraud cases.
Module 10: Incident Management in Cloud and Virtual Environments
Grappling with the unique challenges posed by cloud and virtual environments.
Crafting incident management strategies tailored to these dynamic landscapes.
Module 11: Preparation and Real-Time Incident Response
Crafting comprehensive incident response plans.
Formulating strategies for real-time iancident response.
Ensuring seamless communication and coordination during live incidents.
Module 12: Case Studies and Incident Simulation Scenarios
Applying theoretical knowledge to real-world case studies.
Active participation in lifelike incident simulations.
In-depth analysis and constructive feedback to enhance performance.