Top 5 Incident Response | Incident Handling Certifications
文章推薦指數: 80 %
1) EC-Council's Certified Incident Handler (E|CIH) · 2) GIAC Certified Incident Handler (GCIH) · 3) Incident Handling & Response Professional (IHRP) · 4) Certified ... Menu Eventhoughtechnologyhasbeenahugehelpwithrespondingtoincidentsitisstillanareathattypicallyrequiresmanyemployeestodealwith. Thiswon’tchangeanytimesoonandisthereasonyoushouldconsiderthisaviableareaforcareermovement. Ontopofthatincidentresponsewillnevergetoldbecausetheattackskeepchanging. Incidentresponseorincidenthandlingisanapproachthatallowssecurityexpertstotakeappropriateactionsagainstcyber-securitybreaches.Thegeneralincidentresponsestrategycomprisesofthefollowingsixphases. Preparation Identification Containment Eradication Recovery Learning Thepreparationphasecanbeseenintwodifferentcontexts,i-epre-incident,andpost-incidentscenarios.Pre-incidentpreparationmeansthatyourorganizationhasawell-trainedincidentresponseteam,well-definedincidentresponsepolicies,andreliablesoftware/equipmenttocoupwithsecuritybreaches.Thepost-incidentpreparationmeansgettingeverythingreadytoreacttotheincident.Identificationphasedetermineswhetherornotyouhavebeenbreached.Theprocessrequiresthemonitoringofsystems/network/environmenttoseeanyanomalies(deviationfromnormalbehavior).Thecontainmentistheprocessoflimitingthelosscausedbytheincident.Theprocessmayinvolvestepslikedisconnectingdevicesfromthenetwork,deletingfiles,etc.Eradicationmeanscompletelygettingridofattackvectorsandactorsthatparticipatedinthesecuritybreach.Recoveryistheprocessofresumingallthesystemsbacktonormalaftertheyhavebeencleanedorrestoredfromknownbackups.Learningisthelastoptionalphaseofincidentresponse-cycle.Thegoodsecurityexpertslearnfromtheincidents,documenttheirfindingsandremedies,andpassontheinformationtostopsimilarincidentsfromhappeninginthefuture. Knowingincidentresponsephasesdoesnotguaranteethesecurity/safetyoforganizations.Itisthehumanfactorthatmattersthemost.Onlyanexpertincyber-securitycandevisethemostefficientincidentresponseplans,documentpolicies,andhandletheincidentsbyapplyingeffectivestrategies,tools,andworkforce.Followingisabriefoverviewofincidentresponse(incidenthandling)certificationshavinggreatreputeintheindustry.Thosewhoareinterestedinincidenthandlingjobsincyber-securityshouldconsiderthesecertificationstoincreasetheirchancesofgettinghiredbytheorganizations. 1)EC-Council’sCertifiedIncidentHandler(E|CIH) EC-CouncilevaluatestheincidenthandlingandresponsecapabilitiesofindividualsthroughE|CIHcertification.Thepurposeofthiscertificationistoensurethatthesecuritypersonnelhavetherightexpertiseinidentifying,restraining,andrecoveringfromcyber-attacks.E|CIHalsoevaluates‘draftingthesecuritypolicies’capabilitiesoftheindividuals.ThecertificationiscompliantwithmajorframeworksincludingNICE2.0andCREST. WhoShouldAvailE|CIH? Networkadministrators VulnerabilitiesAssessmentAuditors PenetrationTesters ApplicationSecurityEngineers CyberForensicAnalysts SOCAnalysts SystemAdministrators FirewallAdministrators NetworkManagers HowtoGetE|CIHCredential? CandidatesmustpassE|CIHexamtoearnthecertification. ExamFormat:MultipleChoiceQuestions TotalQuestions:100 ExamDuration:3Hours PassingMarks:70% Prerequisite:Thecandidatesmusthaveatleast1-yearexperienceofworkinginthecyber-securityindustry.Candidateswithnopriorexperiencemustattendthe3-daystrainingofferedbyEC-Councilanditsauthorizedtrainingcenters. E|CIHCourseOutline EC-CouncilcoversthefollowingmodulesinE|CIHexamandtrainingsessionofferedbyEC-Councilandauthorizedcenters. 1)IntroductiontoIncidentHandlingandResponse 2)IncidentHandlingandResponseProcess 3)ForensicReadinessandFirstResponse 4)HandlingandRespondingtoInsiderThreats 5)HandlingandRespondingtoNetworkSecurityIncidents 6)HandlingandRespondingtoWebApplicationSecurityIncidents 7)HandlingandRespondingtoMalwareIncidents 8)HandlingandRespondingtoEmailSecurityIncidents 9)HandlingandRespondingtoCloudSecurityIncidents E|CIHpage:https://www.eccouncil.org/programs/ec-council-certified-incident-handler-ecih/ 2)GIACCertifiedIncidentHandler(GCIH) GlobalInformationAssuranceCertification(GIAC)organizationoffersincidenthandlercertificationtothosewhowanttoprovetheirincidenthandlingexpertise.Thecertificationassessesthecomputer-relatedincidenthandlingexpertise,suchasdefiningstepstoperformincidenthandling,detectingnetworkactivitiesandanomalies,detectingandanalyzingnetworkandsystemvulnerabilities,andimprovingtheincidentdiscoveryprocess. WhoShouldGetGCIHCredential? NetworkSecurityEngineers PenetrationTesters NetworkAdministrators SystemAdministrators NetworkManagers HowtoGetGCIHCredential? CandidatescanbecomeGCIHcertifiedbyschedulingandtakingthefollowingGCIHexamthroughanyGIACproctoredtestcenters. ExamQuestions:100–150 ExamDuration:4Hours PassingMarks:73% ExamBody:PearsonVUE Prerequisite:None GCIHCourseOutline GCIHexamquestionsaretakenfromthefollowingtopics/areas. IncidentHandlingOverviewandPreparation IncidentHandlingIdentification UnderstandingofClientAttacks UnderstandingofCoveringNetworkTracks KnowledgeofCoveringSystemTracks KnowledgeofContainment,Eradication,andRecoveryProcesses Penetrationtesting|EthicalHackingPhases VariousNetworkAttacks DifferentTypesofMalware GCIHpage:https://www.giac.org/certification/certified-incident-handler-gcih 3)IncidentHandling&ResponseProfessional(IHRP) IHRPcertificationbyeLearnSecurityisapracticaldemonstrationofincidenthandlingandresponseexpertise. eLearnSecurityevaluatestheincidenthandlingandresponsecapabilitiesofindividualsthroughpracticalexams. WhoShouldIHRPCredential? IncidentHandlers IncidentResponders ITSecurityPersonnel RedTeamers SOCMembers ComputerSecurityIncidentResponseTeam(CSIRT) HowtoGetIHRPCredential? eLearnSecurityhasdedicatedlabsequippedwithincidentresponsetests. CandidatescanaccesstheexamlabsthroughVPN.Theexamcomprisesofpracticalincidentresponsequestions(scenarios)thatneedtobesolvedinaspecifictime.Strongnetworkingskills,protocolsknowledge,understandingofoperatingsystems,andknowledgeofsecuritydevicesareprerequisitetoregisterforIHRPcertificationandcourse.eLearnSecurityoffersanonlineself-pacedcoursedesignedtopreparecandidatesforIHRPcertification. IHRPCourseOutline IHRPtrainingcourseconsistsofthefollowingfoursectionsandfivemodules.Itisanonlineself-pacedcoursewithlifetimeaccesstothecoursematerial. Sections IncidentHandlingOverview PracticalIncidentHandling NetworkTrafficandFlowAnalysis SOC3.0Operations&Analytics Modules SIEMFundamentals&OpenSourceSolutions CreatingaBaseline&DetectingDeviations SMTP,DNS&HTTP(S)Analytics EndpointAnalytics Logging IHRPpage:https://www.elearnsecurity.com/course/incident_handling_response_professional/ 4)CertifiedComputerSecurityIncidentHandler(CSIH) SoftwareEngineeringInstitute(SEI)helpsorganizationsinidentifyingtheskillfulincidenthandlersbyevaluatingtheincidentresponseandhandlingexpertiseoftheindividuals.ThosewhopossessthedesiredcapabilitiesearnCertifiedComputerSecurityIncidentHandler(CSIH)credential. WhoShouldGetCSIHCredential? MilitaryPersonnel,civilians,andcontractors(whohandleinformationsystems) IncidentHandlers IncidentResponders SystemAdministrators NetworkAdministrators Cyber-securitypersonnel HowtoAvailCSIHCredential? InordertoavailCSIHcredential,candidatesmustsendtheapplicationtoSEI.ThosewithapprovedapplicationscanapplyforCSIHexam.CSIHexamhasthefollowingoutlines. ExamType:ProctoredExam TotalQuestions:65 Passingscore:78% CSIHCourseOutline CISIHexamcanbebrokendownintothefollowingfiveareas. 1)HowtoProtectInfrastructure 2)Incident/EventDetection 3)TriageandAnalysis 4)IncidentResponse 5)HowtoSustain CSIHpage:https://www.sei.cmu.edu/education-outreach/courses/course.cfm?courseCode=V41 5)CertifiedIncidentHandlingEngineer(CIHE) TheNationalInitiativeforCybersecurityCareersandStudies(NICCS)awardsCIHEcertificationstothosewhosuccessfullycompletethe4-daystrainingcomprisingincidentresponse/handlingcourseandlabs.NICCSisanonlinecyber-securitytrainingresourcemanagedbytheCybersecurityEducationandAwarenessBranch(CE&A)intheDepartmentofHomelandSecurity(DHS). WhoShouldGetCIHE? IncidentHandlers IncidentResponders Cyber-securityPersonnel PenetrationTesters Contractors FederalEmployees HowtoGetCIHECredential? AnybodywhosuccessfullycompletestheCIHEcourse+LabassignmentsiseligibleforCIHEcertification.CIHEisanadvancedlevelcoursethatrequires A+,Net+,Sec+,Linux+,MSOperating,andC)PTE(CertifiedPenetrationTestingEngineer)credentialaspre-requisites. CIHECourseDetails ThecoursefollowedforCIHEcredentialcomprisesofthefollowingmodules. Module1:Introduction Module2:Threats,Vulnerabilities,andExploits Module3:IdentificationofIncidentsandInitialResponse Module4:RequestTrackerforIncidentResponse(RTIR) Module5:InitialResponse Module6:IdentificationandInitialResponse Module7:Sysinternals Module8:ContainmentPhase Module9:EradicationProcess Module10:Follow-UpProcedures Module11:RecoverySteps Module12:SecurityofVirtualMachine Module13:MalwareIncidentResponse Apartfromcoursecontent,thestudentshavetospend20hoursormoreperforminglabassignments, CIHEpage:https://niccs.us-cert.gov/training/search/mile2/certified-incident-handling-engineer-cihe PreviousPostTopApplicationSecurityCertificationsforProsNextPostNessusVSOpenVASAdvantagesandDisadvantagesExplainedDidyouenjoythispost?WouldyouliketojoinourInsider'sListandbenotifiedwhenwepostsomethingorgetFREEexclusivecontent?JoinOurInsider'sList LeaveaReplyCancelreplyCommentName* Email* Website Savemyname,email,andwebsiteinthisbrowserforthenexttimeIcomment. Δ RecentPosts AndroidHackingUsingMsfvenom Howtogetasecurityclearance? DevSecOpsTutorial,ToolsandBenefits Top10CommonlyOverlookedPrivacyConcerns WhatisaCloningAttack? BecomeaMember FeaturedPosts EthicalHackingPracticeTests CEHPracticeTestEthicalHackingPracticeTest7CEHCertificationOverviewEthicalHackingPracticeTest6–FootprintingFundamentalsLevel1CEHPracticeTest5–FootprintingFundamentalsLevel0 ContactUs PrivacyPolicy Disclaimer 500WestoverDr#8208SanfordNC27330
延伸文章資訊
- 1Top SANS GIAC Certifications To Help Your Career - Business News Daily
- 2EC-Council Certified Incident Handler | ECIH v2
E|CIH is a highly interactive, comprehensive, high-standard, intensive 3-day training program tha...
- 3CERT Incident Response Process Professional Certificate
This certificate is designed to provide insight into the type and nature of work that an incident...
- 4Incident Response SANS: The 6 Steps in Depth - Cynet
- 5Threat Hunting & Digital Forensics Course | SANS FOR508
GIAC Certified Forensic Analyst (GCFA) ... Threat hunting and Incident response tactics and proce...