USA:+1-703-445-4802
India:+91-8143111555 / +91-8790216888
Whats app: +91-8143110555

GIAC Certified Incident Handler (GCIH)

GIAC Certified Incident Handler (GCIH)

The Certified Incident Handling Engineer course is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.
 
In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.
 
Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.

Prerequisites:
  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Basic Knowledge of Linux is essential
Course Content:

Introduction
  • Courseware Materials
  • Who is this class for?
  • What is the purpose of this course?
  • What information will be covered?
  • The Exam
 
Module I – Incident Handling Explained
  • Security Events
  • Logs
  • Alerts
  • What is an Incident?
  • Security Incident
  • Indication of Compromise
  • What is Incident Handling?
  • Difference between IH and IR
  • Common Tools
  • IPS vs WAF
  • SOC
  • Six Step Approach to Incident Handling
 
Module II – Threats, Vulnerabilities and Exploits
  • Overview
  • Vulnerabilities
  • Exploits
  • Threat
  • Incident Classification
 
Module III – Preparation
  • Overview
  • Policies & Procedures
  • The Team
  • Identify Incident Handling Team
  • Roles of the Incident Handling Team
  • IH Team Makeup
  • Team Organization
  • Incident Communication
  • Incident Reporting
  • Incident Response Training and Awareness
  • Underlining Technologies
  • Anti-virus
  • SEIM
  • User Identity
  • Ticketing Systems
  • Digital Forensics
  • eDiscovery
  • Data Backup and Recovery
  • Underlining Technologies
  • Technical Baselines
  • System Hardening
  • Summary
 
Module IV – First Response
  • Overview
  • Responder Toolkit
  • Responder’s System
  • What to look for
  • Attention
  • Volatility
  • First things first
  • Review
  • Goal
  • Challenges
  • Categorize Incidents
  • Incident Signs
  • Basic Steps
  • Receive
  • Examples of Electronic Signs
  • Examples of Human Signs
  • Analyze
  • Analysis
  • Incident Documentation
  • Incident Prioritization
  • Incident Notification
 
Module V – Containment
  • Overview
  • Containment
  • Goals
  • Delaying Containment
  • Choosing a Containment Strategy
  • On-site Response
  • Secure the Area
  • Conduct Research
  • Procedures for Containment
  • Make Recommendations
  • Establish Intervals
  • Capture Digital Evidence
  • Change Passwords
 
Module VI – Eradication
  • Overview
  • Eradication
  • Goals
  • Procedures for Eradication
  • Determine Cause
  • Procedures for Eradication
 
Module VII – Recovery
  • Overview
  • Recovery
  • Goals
  • Procedure for Recovery
 
Module VIII – Follow-Up
  • Overview
  • Follow-up
  • Goals
  • Procedures of Follow-up
 
DETAILED LAB OUTLINE
  • Introduction      
  • Lab Resources  
  • Knowing your way around VMware Player.        
 
Module One – Attacks Under the Microscope   
  • Lab objectives  
  • Wireshark          
  • Why Wireshark?              
  • Running Wireshark         
  • Starting Wireshark          
  • User interface  
  • Filters   
  • Netstat
  • Command          
  • Options               
  • Examples            
  • Netcat 
  • Cyber Attacks   
  • Understanding the hacking methodology            
  • IP Space Scanning           
  • Port Scanning   
  • Network Based Attacks
  • Web Application Based Attacks
  • Host Based Attacks
               
Module Two – Ticketing System               
  • Introduction      
  • Ticketing System Components  
  • Tickets:
  • Queues:              
  • System Functionality     
  • System login     
  • Ticket Creation 
  • Ticket Correspondence
  • Ticket Priority Escalation              
  • Ticket Assignment          
  • Request Tracker for Incident Response – RTIR   
  • Normal user role:            
  • Incident Handling Role:
  • Viewing unlinked Incident Reports:        
  • Create an Incident
  • Linking Incident Reports to an incident:
  • Starting an Investigation              
 
Module Three Lab – SysInternals Suite 
  • Introduction      
  • Getting Sysinternals.     
  • Usage Guide     
  • Process Explorer             
  • Process Monitor              
  • Autoruns            
  • PsTools
  • Disk Utilities      
  • Security Utilities
  • Network and Communication utilities.  
  • First Response Lab Scenario
               
Module Four Lab – Examine System Active Processes and Running Services       
  • Examine Startup Folders              
  • The Local Registry
  • The IOC Finder – Collect               
  • IOC Finder – Generate Report  
  • Malware Removal