TDI

Certified Incident Handler

Duration

5 Days

Start Date

8-Jun-2026

End Date

12-Jun-2026

Venue

CAIRO – EGYPT

price

1475 KD

20% discount for group above 5 attendees

Course Overview

This intensive certification program from EC-Council equips cybersecurity professionals with advanced skills to detect, respond to, and recover from security incidents. Covering the complete incident handling lifecycle, the course provides hands-on experience with real-world attack scenarios across networks, applications, and cloud environments. Participants will develop tactical response capabilities through forensic investigations, malware analysis, and live containment exercises.

Course Objectives

Upon completion, participants will be able to:
✔ Execute end-to-end incident handling processes (NIST SP 800-61)
✔ Conduct advanced network and host-based forensic investigations
✔ Analyze and contain malware infections
✔ Respond to cloud security incidents (AWS/Azure/GCP)
✔ Develop incident recovery and business continuity plans
✔ Prepare for the EC-Council ECIH certification exam

Who Should Attend

This course is essential for:
◼ SOC Analysts and Incident Responders
◼ Cybersecurity Forensic Investigators
◼ IT Security Administrators
◼ Network Defense Technicians
◼ Security Operations Center Personnel
◼ Risk and Compliance Officers

Course Content Breakdown

Day 1: Incident Handling Fundamentals

  • Incident handling lifecycle (Preparation→Identification→Containment→Eradication→Recovery→Lessons Learned)
    • Security incident classification and prioritization
    • Legal considerations and evidence handling
    • Hands-on: Creating incident response playbooks

Day 2: Network Incident Response

  • Network traffic analysis for incident detection
    • Attack vector identification (DDoS, MITM, DNS attacks)
    • Containment strategies for network breaches
    • Lab: Investigating a live network intrusion

Day 3: Malware Incident Handling

  • Malware behavior analysis (Trojans, ransomware, worms)
    • Memory and disk forensic techniques
    • Malware containment and eradication procedures
    • Practical: Analyzing real malware samples

Day 4: Cloud & Application Incident Response

  • Cloud incident response challenges (IaaS/PaaS/SaaS)
    • Web application attack investigation (OWASP Top 10)
    • API security incident handling
    • Case study: Responding to cloud data breaches

Day 5: Post-Incident Activities & Reporting

  • Evidence preservation and chain of custody
    • Root cause analysis methodologies
    • Executive and technical reporting
    • Final simulation: Full-scale incident response drill