Certified Incident Handler | ECIH
The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.
Cybersecurity Professionals interested in pursuing incident handling and response as a career require comprehensive training on the IH&R concepts as well as real-world scenarios. The ECIH program includes hands-on learning delivered through iLabs, online labs within the training program.
Course Outline
- Module 01: Introduction to Incident Handling and Response
- Module 02: Incident Handling and Response Process
- Module 03: Forensic Readiness and First Response
- Module 04: Handling and Responding to Malware Incidents
- Module 05: Handling and Responding to Email Security Incidents
- Module 06: Handling and Responding to Network Security Incidents
- Module 07: Handling and Responding to Web Application Security Incidents
- Module 08: Handling and Responding to Cloud Security Incidents
- Module 09: Handling and Responding to Insider Threats
EC-Council’s Certified Incident Handler provides students with a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling response process to recovering organizational assets after a security incident. The skills taught in EC-Council’s ECIH program are desired by cybersecurity professionals from around the world and is respected by employers.
Why ECIH?
- To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
- To ensure that organization can identify, contain, and recover from an attack.
- To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
- To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
- To minimize the loss and after-effects breach of the incident.
- For individuals: To enhance skills on incident handling and boost their employability.
Meet your Instructor:
iLabs Demo:
To be eligible to sit the ECIH Exam, the candidate must either:
- Attend official ECIH training through any of EC-Council’s Authorized Training Centers (ATCs) or attend EC-Council’s live online training via iWeek or join our self-study program through iLearn (see https://iclass.eccouncil.org).
OR
- Candidates with a minimum of 1 year of work experience in the domain that would like to apply to take the exam directly without attending training are required to pay the USD100 Eligibility Application Fee. This fee is included in your training fee should you choose to attend training.
Exam Name: ECIH 212-89
Number of Questions: 100
Test Duration: 3 Hours
Test Delivery: ECC Exam Portal
Test Format: Multiple Choice
Passing Score: 70%

ECIH maps 100 percent to the NICE framework under the category “Protect and Defend (PR)” and the specialty “Incident Response (CIR)”. NICE stands for National Initiative for Cybersecurity Education (NICE). The Incident Response (CIR) specialty area deals with investigating, analyzing, and responding to cyber incidents within the network environment or enclave. This area enables incident responders to handle crises within the pertinent domain and mitigate potential threats. CIRs evaluate the effectiveness of and improvements to existing practices in any organization, which in turn leads to maximizing the survival of life, preservation of property, and information security.

EC-Council Cyber Security Certifications and the US NAVY
Six EC-Council Certifications are recognized by the United States Navy in over 100 Cyber Security Job roles, across 18 occupations. Ranging from Commander in Executive Cyberspace Leadership to Cyber Warfare Engineer, Special Agents, Incident Handlers, to Cryptologic Warfare Engineers, Cybersecurity careers with the US NAVY are exciting, holding an EC-Council certification provides great opportunity for advancement in a US NAVY career.
The decisions of Department of the NAVY to incorporate industry recognized certifications into the Cyber IT & Cyber Security Workforce Framework ensures as our service personnel advance their careers and eventually transition to civilian life, their skills and credentials are widely recognized by the Industries they will continue to work in as Veterans.
Certifications recognized, accepted, and often funded by the US NAVY include:
Funding opportunities for career advancement are available for Active Duty NAVY personnel through the NAVY COOL program.
US NAVY approves EC-Council Certifications across 18 Occupations and over 100 Job roles
*All information represented here can be found on the NAVY COOL site. To find what EC-Council Certifications map to your eligible Job role, select “Full Credential Search” then under Credential Agency, select or search for “International Council of E-Commerce Consultants”.
To get more information or still have questions:

EC-Council Cyber Security Certifications and the US ARMY
Five EC-Council Certifications are recognized by the United States ARMY across 15 occupations. Ranging from Cyber Operations Technician to Target Digital Network Analyst. Our certifications are in use as baseline credentials across ARMY Cyber throughout intelligence as well as deployed infantry. EC-Council is proud to work with various groups in the ARMY to support the Mission of ARMY Cyber.
Certifications recognized, accepted, and often funded by the US ARMY include:
Funding opportunities for career advancement are available for Active Duty ARMY personnel through the ARMY COOL program.
US ARMY approves EC-Council Certifications across 15 Occupations
- Cryptologic Cyberspace Intelligence Collector – Analyst
- CYBER Operations Technician
- Information Protection Technician
- Military Intelligence (MI) Systems Maintainer/Integrator
- Senior Network Operations Technician
- Cryptologic Cyberspace Intelligence Collector – Analyst
- CYBER Operations Technician
- Information Protection Technician
- Military Intelligence (MI) Systems Maintainer/Integrator
- Senior Network Operations Technician
- Counterintelligence Agent
- Cyber Operations Specialist
- Infantryman
- Information Technology Specialist
- Nodal Network Systems Operator-Maintainer
To get more information or still have questions:

EC-Council Cyber Security Certifications and the Marine Corps
Five EC-Council Certifications are recognized by the United States Marine Corps in 79 Cyber Security Job roles, across 17 occupations. Ranging from Cyber Security Technician, to Signals Intelligence and Electronic Warfare Operator, to Cyber Security Chief.
Certifications recognized, accepted, and often funded by the US Marine Corps include:
Funding opportunities for career advancement are available for Active Duty MARINE CORPS personnel through the Marine COOL program.
US Marine Corps approves EC-Council Certifications across 15 Occupations
To get more information or still have questions:

EC-Council Cyber Security Certifications and the US Air Force
Four EC-Council Certifications are recognized by the United States Air Force in 150 Cyber Security Job roles, across 8 occupations. Occupations are recognized in fields like; Cyber Transport Systems, Intelligence, and Cyber Warfare Operations.
Certifications recognized, accepted, and often funded by the US AIR FORCE include:
Funding opportunities for career advancement are available for Active Duty AIR FORCE personnel through the AIR FORCE COOL program.
To get more information or still have questions:
Who’s it For?
The incident handling skills taught in ECIH are complementary to the job roles below as well as many other cybersecurity jobs:
- Penetration Testers
- Vulnerability Assessment Auditors
- Risk Assessment Administrators
- Network Administrators
- Application Security Engineers
- Cyber Forensic Investigators/ Analyst and SOC Analyst
- System Administrators/Engineers
- Firewall Administrators and Network Managers/IT Managers
ECIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.
ECIH members are ambitious security professionals who work in Fortune 500 organizations globally.
Add the Mobile Security Tool Kit to Your Training
For the past several years we have offered our training on a mobile device so that you can take your training with you and eliminate the need to stream the videos. This device is the next generation mobile device. This is a fully loaded pen test tool kit comes equipped with a custom Linux Hacking OS and, wait for it… we can load your course (or 2) onto the device. In the sage words of Ray Bradbury, “Something Wicked This Way Comes.”
Buy Self-Paced Training:
Or choose a training option:
