Certified Incident Handler Training Course
The Certified Incident Handler programme equips participants with a structured methodology for effectively and efficiently managing and responding to cybersecurity incidents.
Delivered via instructor-led live training (available online or on-site), this course targets intermediate IT security professionals seeking to build the tactical skills and knowledge required to plan, classify, contain, and manage security incidents.
Upon completion, participants will be able to:
- Grasp the incident response lifecycle and its various phases.
- Execute procedures for incident detection, classification, and notification.
- Implement containment, eradication, and recovery strategies effectively.
- Create post-incident reports and plans for continuous improvement.
Course Format
- Interactive lectures and discussions.
- Practical application of incident handling procedures within simulated scenarios.
- Guided exercises focusing on detection, containment, and response workflows.
Course Customization Options
- For customized training aligned with your organization’s specific incident response procedures or tools, please contact us to make arrangements.
Course Outline
Introduction to Incident Handling
- Understanding cybersecurity incidents
- Goals and benefits of incident handling
- Incident response standards and frameworks (NIST, ISO, etc.)
Incident Response Process
- Preparation and planning
- Detection and analysis
- Classification and prioritization
Containment Strategies
- Short-term vs long-term containment
- Network segmentation and isolation techniques
- Coordination with stakeholders and notification protocols
Eradication and Recovery
- Identifying root causes
- System restoration and patching
- Monitoring post-recovery
Documentation and Reporting
- Incident documentation best practices
- Generating actionable post-mortem reports
- Lessons learned and metrics for improvement
Incident Response Tools and Technologies
- SIEM systems and log analysis tools
- Endpoint detection and response (EDR)
- Automation and orchestration in IR
Tabletop Exercises and Simulations
- Interactive incident scenarios
- Team coordination drills
- Evaluating response effectiveness
Summary and Next Steps
Requirements
- Basic understanding of IT security concepts
- Familiarity with network protocols and system administration
- Awareness of cybersecurity threats and vulnerabilities
Audience
- IT security analysts
- Incident response team members
- Cybersecurity operations professionals
Open Training Courses require 5+ participants.
Certified Incident Handler Training Course - Booking
Certified Incident Handler Training Course - Enquiry
Certified Incident Handler - Consultancy Enquiry
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.
Otilia Pasareti - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Upcoming Courses
Related Courses
AI-Powered Cybersecurity: Threat Detection & Response
21 HoursThis instructor-led, live training in Malaysia (online or onsite) targets entry-level cybersecurity professionals keen on leveraging AI to enhance their threat detection and response capabilities.
Upon completing this training, participants will be able to:
- Grasp AI applications within cybersecurity.
- Deploy AI algorithms for threat detection.
- Automate incident response using AI tools.
- Integrate AI into existing cybersecurity infrastructure.
AI-Powered Cybersecurity: Advanced Threat Detection & Response
28 HoursThis instructor-led live training in Malaysia (online or onsite) is designed for cybersecurity professionals at the intermediate to advanced stages of their careers who wish to elevate their skills in AI-driven threat detection and incident response.
By the end of this training, participants will be able to:
- Implement advanced AI algorithms for real-time threat detection.
- Customise AI models to address specific cybersecurity challenges.
- Develop automation workflows for threat response.
- Secure AI-driven security tools against adversarial attacks.
Blue Team Fundamentals: Security Operations and Analysis
21 HoursThis instructor-led, live training in Malaysia (online or onsite) targets intermediate-level IT security professionals looking to enhance their skills in security monitoring, analysis, and response.
By the end of this training, participants will be able to:
- Understand the role of a Blue Team in cybersecurity operations.
- Use SIEM tools for security monitoring and log analysis.
- Detect, analyze, and respond to security incidents.
- Perform network traffic analysis and threat intelligence gathering.
- Apply best practices in security operations center (SOC) workflows.
Bug Bounty Hunting
21 HoursBug Bounty Hunting involves discovering security weaknesses in software, websites, or systems and reporting them responsibly to receive rewards or recognition.
This instructor-led live training, available online or onsite, is designed for beginner-level security researchers, developers, and IT professionals eager to master the fundamentals of ethical bug hunting and effectively participate in bug bounty programs.
Upon completion of this training, participants will be able to:
- Grasp the core concepts of vulnerability discovery and bug bounty programs.
- Leverage essential tools such as Burp Suite and browser developer tools to test applications.
- Recognize common web security flaws, including XSS, SQLi, and CSRF.
- Submit clear, actionable vulnerability reports to bug bounty platforms.
Course Format
- Interactive lectures and discussions.
- Hands-on practice with bug bounty tools in simulated testing environments.
- Guided exercises focused on discovering, exploiting, and reporting vulnerabilities.
Customization Options
- To arrange customized training tailored to your organization's specific applications or testing requirements, please contact us.
Bug Bounty: Advanced Techniques and Automation
21 HoursBug Bounty: Advanced Techniques and Automation provides an in-depth exploration of high-impact vulnerabilities, automation frameworks, reconnaissance techniques, and the tooling strategies employed by top-tier bug bounty hunters.
This instructor-led, live training (available online or onsite) targets intermediate to advanced security researchers, penetration testers, and bug bounty hunters who aim to streamline their workflows, scale their reconnaissance efforts, and uncover complex vulnerabilities across multiple targets.
Upon completion of this training, participants will be able to:
- Automate reconnaissance and scanning processes for multiple targets.
- Utilise cutting-edge tools and scripts essential for bounty automation.
- Identify complex, logic-based vulnerabilities that extend beyond standard scanning capabilities.
- Construct custom workflows for subdomain enumeration, fuzzing, and reporting.
Course Format
- Interactive lectures and discussions.
- Hands-on application of advanced tools and scripting for automation.
- Guided labs focusing on real-world bounty workflows and advanced attack chains.
Customization Options
- To arrange a customized training session tailored to your specific bounty targets, automation requirements, or internal security challenges, please contact us.
Cyber Defence (SOC) Analyst Foundation
7 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for beginner to intermediate security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis.
By the end of this training, participants will be able to:
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
CHFI - Certified Digital Forensics Examiner
35 HoursThe vendor-neutral Certified Digital Forensics Examiner certification is designed to equip Cyber Crime and Fraud Investigators with specialized skills in electronic discovery and advanced investigation techniques. This course is invaluable for anyone dealing with digital evidence during an investigation.
The Certified Digital Forensics Examiner training focuses on the methodology for conducting computer forensic examinations. Students will master forensically sound investigative methods, including scene evaluation, collecting and documenting relevant information, interviewing key personnel, maintaining chain-of-custody, and drafting findings reports.
The Certified Digital Forensics Examiner course is beneficial for organizations, individuals, government offices, and law enforcement agencies seeking to pursue litigation, establish proof of guilt, or implement corrective actions based on digital evidence.
Mastering Continuous Threat Exposure Management (CTEM)
28 HoursThis instructor-led live training in Malaysia (online or onsite) targets intermediate-level cybersecurity professionals keen on implementing CTEM within their organisations.
By the end of this course, participants will be able to:
- Understand the principles and stages of CTEM.
- Identify and prioritise risks using CTEM methodologies.
- Integrate CTEM practices into existing security protocols.
- Utilise tools and technologies for continuous threat management.
- Develop strategies to continually validate and enhance security measures.
Cyber Emergency Response Team (CERT)
7 HoursThis course explores the management of an incident response team. It outlines how first responders operate, highlighting that incident response is a vital function for organisations given the frequency and complexity of contemporary cyber attacks.
As the final line of defence, effective incident response—detecting and handling incidents efficiently—relies on robust management processes. Managing an incident response team further demands specialised skills and knowledge.
Cyber Threat Intelligence
35 HoursThis instructor-led, live training in Malaysia (online or onsite) targets advanced-level cyber security professionals who wish to understand Cyber Threat Intelligence and learn skills to effectively manage and mitigate cyber threats.
By the end of this training, participants will be able to:
- Understand the fundamentals of Cyber Threat Intelligence (CTI).
- Analyze the current cyber threat landscape.
- Collect and process intelligence data.
- Perform advanced threat analysis.
- Leverage Threat Intelligence Platforms (TIPs) and automate threat intelligence processes.
Fundamentals of Corporate Cyber Warfare
14 HoursThis instructor-led live training in Malaysia (online or onsite) examines various dimensions of enterprise security, including AI and database security. It also covers the essential tools, processes, and strategic mindset needed to counteract cyber threats.
DeepSeek for Cybersecurity and Threat Detection
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to leverage DeepSeek for advanced threat detection and automation.
By the end of this training, participants will be able to:
- Utilize DeepSeek AI for real-time threat detection and analysis.
- Implement AI-driven anomaly detection techniques.
- Automate security monitoring and response using DeepSeek.
- Integrate DeepSeek into existing cybersecurity frameworks.
Digital Investigations - Advanced
21 HoursIn this course, you will master the principles and techniques of digital forensics investigation, along with the wide range of computer forensics tools available. You will gain insight into core forensic procedures to ensure evidence is admissible in court, as well as the associated legal and ethical considerations.
You will learn how to conduct forensic investigations on Unix/Linux and Windows systems using various file systems, covering advanced topics such as wireless, network, web, database, and mobile crime investigations.
Ethical Hacker
35 HoursThis programme immerses students in an interactive environment, demonstrating how to scan, test, hack, and secure their own systems. The lab-intensive setting provides in-depth knowledge and practical experience with essential modern security technologies. Students start by understanding perimeter defenses, then proceed to scan and attack their own networks—without harming any real infrastructure. They learn how intruders escalate privileges and what measures can be taken to secure a system. The curriculum also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. Upon completing this intensive 5-day class, students will have hands-on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The course is ideal for professionals working in roles such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
MasterClass Certified Ethical Hacker Program
28 HoursThe Certified Ethical Hacker (CEH) certification is a globally recognised credential in the field of cybersecurity.
This comprehensive programme combines instructional theory with practical application to prepare students for both the CEH certification exam and the CEH Practical Exam. Those who successfully pass both assessments are awarded the CEH Master credential alongside their standard CEH certification.
Participants have the option to enhance their learning package by including either the Certified Penetration Testing Professional (CPENT) course or the Computer Hacking Forensic Investigator (CHFI) course.
Training for either the CPENT or CHFI courses is delivered to each student through EC-Council’s online, self-paced, streaming video platform.
CPENT (Pen-testing):
This module teaches students how to apply the concepts and tools acquired in the CEH programme to a pen-testing methodology within a live cyber range environment.
CHFI (Computer Forensics):
This module instructs students on a methodological approach to computer forensics, covering search and seizure procedures, chain of custody management, data acquisition, preservation, analysis, and the reporting of digital evidence.
Course Description
The CEH programme provides a deep understanding of the phases involved in ethical hacking, various attack vectors, and preventative countermeasures. It educates participants on how attackers think and operate maliciously, enabling them to better establish security infrastructure and defend against potential future threats. By understanding system weaknesses and vulnerabilities, organisations can strengthen their security controls to minimise the risk of incidents.
CEH is designed to integrate a hands-on environment and systematic processes across every domain and methodology of ethical hacking. This approach gives students the opportunity to demonstrate the knowledge and skills required to achieve the CEH credential. Participants will be exposed to a unique perspective on the responsibilities and measures necessary for maintaining security.
Who Should Attend
- Law enforcement personnel
- System administrators
- Security officers
- Defence and military personnel
- Legal professionals
- Bankers
- Security professionals
About the Certified Ethical Hacker Master
To earn the CEH Master certification, candidates must pass the CEH Practical exam. This exam is designed to allow students to demonstrate their ability to execute the principles taught in the CEH course. The practical assessment requires candidates to demonstrate the application of ethical hacking techniques, including threat vector identification, network scanning, operating system detection, vulnerability analysis, system hacking, and more.
The CEH Practical exam does not rely on simulations. Instead, candidates challenge a live cyber range designed to mimic a corporate network using live virtual machines, networks, and applications.
Successfully completing the challenges in the CEH Practical Exam is the next step after attaining the Certified Ethical Hacker (CEH) certification. Passing both the CEH exam and the CEH Practical Exam earns you the additional distinction of the CEH Master certification.
About the Certified Ethical Hacker Practical
To verify your proficiency in ethical hacking, your abilities are tested through real-world challenges in a realistic environment. Using labs and tools, you will complete specific ethical hacking tasks within a set time limit, mirroring the pressures faced in actual professional scenarios.
The EC-Council CEH (Practical) exam consists of a complex network that replicates a large organisation’s real-life infrastructure, including various network systems such as a DMZ. You must apply your ethical hacking skills to discover and exploit vulnerabilities in real-time while auditing the systems.
About CPENT
EC-Council’s Certified Penetration Tester (CPENT) programme focuses entirely on pen-testing. It teaches you to operate in an enterprise network environment that requires attacking, exploiting, evading, and defending. If you have primarily worked in flat networks, CPENT’s live practice range will help elevate your skills. You will learn to pen-test IoT and OT systems, write custom exploits, build your own tools, conduct advanced binary exploitation, double pivot to access hidden networks, and customise scripts and exploits to reach the innermost segments of a network.
About CHFI
The Computer Hacking Forensic Investigator (CHFI) course delivers the discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive programme covering major forensic investigation scenarios, enabling students to acquire hands-on experience with various forensic investigation techniques and standard forensic tools required to successfully conduct computer forensic investigations.