Temika

EC-Council Certified Incident Handler (ECIH)

Pelatihan resmi EC-Council ini membekali Anda dengan framework, tools, dan strategi untuk menghadapi serangan siber modern.

Ikuti Training EC-Council Certified Incident Handler (ECIH)​

ECIH adalah program resmi dari EC-Council yang dirancang untuk melatih profesional dalam mengidentifikasi, menangani, dan merespons insiden keamanan siber. Peserta akan belajar best practice global dalam Incident Response (IR), mulai dari deteksi dini, penanganan malware, manajemen ransomware, hingga recovery pasca insiden.

Simak Keuntungan Ikut Pelatihan di Temika Cyber

Hands-on Threat Intelligence Lab

Simulasi insiden nyata: malware outbreak, phishing attack, ransomware infiltration.

Materi Resmi EC-Council

Kurikulum terbaru sesuai standar EC-Council, fokus pada fase IR: preparation, detection, containment, eradication, recovery, dan lessons learned.

Exclusive Alumni Community

Gabung dengan komunitas alumni Temika Cyber untuk diskusi, update materi, sharing pengalaman, dan peluang karier.

Exam Preparation & Certification Path

Panduan lengkap, soal latihan, dan strategi menghadapi ujian ECIH hingga sertifikasi resmi.

Career-Ready Skills & Networking

Kuasai skill krusial: threat containment, forensic investigation, communication in crisis, hingga compliance reporting.

Real-World Tools & Frameworks

Gunakan tools IR populer seperti SIEM, forensic tools, dan framework seperti NIST, ISO, dan SANS.

Kenapa Harus Menguasai ECIH?

Continuous Monitoring and Incident Response

πŸš€ Permintaan Profesional IR Tinggi

Perusahaan global semakin membutuhkan incident handler untuk melindungi data dan operasi bisnis.
Data Analysis & Collection

πŸ’° Prospek Karier Menjanjikan

Peran Incident Handler & Response Specialist jadi salah satu posisi bergaji tinggi di keamanan siber global.

Initiate incident response protocols

⚑ Ancaman Semakin Kompleks

Mulai dari ransomware, insider threats, hingga serangan APT. Dengan ECIH, Anda siap menghadapi ancaman proaktif.

Tujuan Pelatihan

Setelah menyelesaikan kursus ini dengan sukses, peserta akan mampu:

  • Memahami konsep dan proses incident response sesuai standar EC-Council dan framework internasional (NIST, SANS, ISO).
  • Mendeteksi dan menganalisis insiden siber termasuk malware, phishing, ransomware, dan serangan jaringan.
  • Menangani insiden dengan metode proaktif, mulai dari containment, eradication, hingga recovery.
  • Menyusun laporan & dokumentasi insiden secara profesional untuk kepatuhan, audit, dan evaluasi internal.
  • Menggunakan tools dan framework IR modern untuk praktik lapangan, threat hunting, dan forensic investigation.
  • Mengembangkan keterampilan karier sebagai Incident Handler atau SOC Analyst dengan kemampuan analisis, komunikasi, dan koordinasi tim

Silabus

  • 09:00 – 09:30: Welcome & Course Introduction
    • Introductions and setting expectations.
    • Overview of ECIH program and exam process.
  • 09:30 – 10:45: Module 01 – Fundamentals of Incident Handling
    • Key concepts of incident response & handling.
    • Incident types and lifecycle.
    • Incident handling framework: NIST, SANS.
  • 10:45 – 11:00: Morning Break
  • 11:00 – 12:30: Module 02 – Preparation & Planning
    • Establishing policies and procedures.
    • Roles & responsibilities of the incident response team.
    • Developing incident response plans.
    • Hands-on Lab: Creating an incident response plan for a sample organization.
  • 12:30 – 13:30: Lunch Break
  • 13:30 – 15:00: Module 03 – Detection & Analysis
    • Identifying indicators of compromise (IOCs).
    • Monitoring network and system logs.
    • Hands-on Lab: Using SIEM tools for log analysis and detection.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 04 – Incident Reporting & Documentation
    • Documenting incidents for compliance and auditing.
    • Communication protocols during incidents.
    • Hands-on Lab: Drafting an incident report and escalation workflow.
  • 16:45 – 17:00: Day 1 Wrap-up, Q&A
  • 09:00 – 10:30: Module 05 – Malware Analysis & Containment
    • Types of malware and infection vectors.
    • Malware lifecycle and behavior analysis.
    • Hands-on Lab: Isolating and analyzing a malware sample in a sandbox environment.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 06 – Phishing & Social Engineering
    • Understanding phishing techniques and social engineering attacks.
    • Hands-on Lab: Simulating phishing attack detection and response.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 07 – Email Security Controls
    • Email filtering and authentication methods (SPF, DKIM, DMARC).
    • Mitigation strategies and best practices.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 08 – Case Study: Malware & Phishing Incident Response
    • Applying learned techniques to a realistic scenario.
  • 16:45 – 17:00: Day 2 Wrap-up, Q&A
  • 09:00 – 10:30: Module 09 – Network Attacks & Intrusion Detection
    • Common network attacks (DDoS, port scans, MITM).
    • Hands-on Lab: Detecting network attacks using IDS/IPS tools.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 10 – Web Application Attacks
    • Understanding SQL injection, XSS, CSRF.
    • Hands-on Lab: Simulating and mitigating web application attacks.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 11 – Log Analysis & Forensic Techniques
    • Collecting evidence from servers and applications.
    • Hands-on Lab: Conducting forensic analysis on compromised web server.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 12 – Incident Containment & Eradication
    • Strategies to contain attacks and remove threats.
    • Hands-on Lab: Containing an ongoing network intrusion.
  • 16:45 – 17:00: Day 3 Wrap-up, Q&A
  • 09:00 – 10:30: Module 13 – Ransomware Handling & Mitigation
    • Ransomware types, attack vectors, and recovery methods.
    • Hands-on Lab: Containment and recovery simulation.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 14 – Cloud Security Incidents
    • Incident response for IaaS, PaaS, SaaS environments.
    • Hands-on Lab: Investigating cloud security breaches.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 15 – Mobile & IoT Security Incidents
    • Handling attacks on mobile devices and IoT networks.
    • Hands-on Lab: Simulating mobile malware incident response.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 16 – Case Study: Multi-Vector Incident Handling
    • Integrating malware, network, cloud, and mobile incident response.
  • 16:45 – 17:00: Day 4 Wrap-up, Q&A
  • 09:00 – 10:30: Module 17 – Recovery & Business Continuity
    • Developing recovery strategies and business continuity plans.
    • Hands-on Lab: Drafting disaster recovery plan for simulated incident.
  • 10:30 – 10:45: Morning Break
  • 10:45 – 12:15: Module 18 – Lessons Learned & Post-Incident Review
    • Conducting post-mortem analysis.
    • Identifying gaps and improving IR processes.
  • 12:15 – 13:15: Lunch Break
  • 13:15 – 15:00: Module 19 – Incident Handling Best Practices & Compliance
    • Regulatory requirements, standards (ISO 27001, GDPR).
    • Reporting to management and external parties.
  • 15:00 – 15:15: Afternoon Break
  • 15:15 – 16:45: Module 20 – Exam Preparation & Simulation
    • Review key concepts, practice questions, exam tips.
    • Hands-on Lab: Mock scenario-based assessment.
  • 16:45 – 17:00: Course Wrap-up, Q&A, Certification Guidance

Meet Your Expert

Trainer 1

Ethical Hacker

Trainer 2

Ethical Hacker

Galeri Pelatihan

Apa Kata Mereka Tentang Pelatihan Ini

Sertifikasi Profesional Kami

Dapatkan Harga Spesial Selama Promo

Early Bird I

Rp17jt Rp15jt/Peserta
  • Intensive Training (5 Days)
  • Official EC-Council Exam Voucher
  • Official Training Material (e-Courseware)
  • Official iLabs Access
  • Certificate of Attendance

FAQ

ECIH (EC-Council Certified Incident Handler) adalah program pelatihan resmi dari EC-Council yang mengajarkan peserta cara menangani insiden keamanan siber secara profesional, termasuk deteksi, analisis, mitigasi, dan pemulihan dari serangan siber.
Training ini berlangsung 5 hari intensif, dengan teori, hands-on lab, dan studi kasus nyata.
Ya, setelah lulus ujian resmi EC-Council, peserta memperoleh sertifikat internasional ECIH.
Ada! Peserta belajar melalui simulasi insiden nyata di lab virtual yang aman.
Training ini berdurasi 5 hari intensif, dengan kombinasi teori, praktik lab, dan studi kasus.
Peserta akan menggunakan tools populer seperti SIEM, forensic tools, dan framework standar seperti NIST, ISO, dan SANS.
Peserta memperoleh skill siap kerja untuk menangani insiden siber, membangun portofolio profesional, dan meningkatkan peluang karier di cybersecurity.

Mereka Telah Mempercayakannya Kepada Kami