CERT-Certified Computer Security Incident Handler (CSIH)
Rated 3.5/5 based on 11 customer reviews

CERT-Certified Computer Security Incident Handler (CSIH)

Available: Out of Stock
$0.00

Request Info
The Certified Computer Security Incident Handler (CSIH) certification path covers the essential information you need to know in order to properly detect, contain and mitigate security incidents. You’ll learn the ins and outs of incident response, as well as the tools of the trade used by incident responders on a daily basis.

CSIH practice exam

Custom practice exam | 30 questions

Prepare for your CSIH exam and test your domain knowledge.

Network Traffic Analysis Cyber Range

Cyber range | 12 labs

Gain practical experience and build your real-world network traffic analysis skills through 12 hands-on labs in the Network Traffic Analysis Cyber Range.

Building Incident Response Team

Course | 31 minutes

Review the most important aspects of incident response team members, such as technical skills, personal skills and critical knowledge.

Reverse Engineering Concepts

Course | 33 minutes

Get to grips with the details of reverse-engineering concepts in this three-video course. Includes demonstration and tool lists.

Cell Phone Forensics

Course | 28 minutes

Refresh your knowledge of cell phone forensics with this course covering Andriod and iPhone forensics challenges and best practices.

Windows Swap File

Course | 27 minutes

Get familiar with the Windows swap file, a great place for evidence to hide. Includes tools and demonstration video.

Memory Forensics

Course | 1 hour 19 minutes

Two videos take you through the fundamentals of memory forensics, including tools, techniques for dumping memory and an in-depth demonstration.

Dealing with Passwords and Encryption

Course | 33 minutes

Deal with passwords and encryption with the help of this course covering password-cracking, public and private keys, Kerberos and more.

Disk Forensics

Course | 55 minutes

Dive into disk forensics with this course covering bit images, restoring disk images, slack, steganography and more.

Role of the Computer Forensic Examiner

Course | 40 minutes

Get to grips with the role of the computer forensics examiner, including duties and potential legal concerns.

Cyber Attacks Overview

Course | 1 hour 14 minutes

Review the fundamentals of cyberattacks with two videos on risks, attack types and the anatomy of an attack.

Incident Response Process

Course | 1 hour 1 minute

Six videos take you through the details of the incident response process, including important tools, policies, strategies and legal concerns.

Introduction to Incident Response

Course | 56 minutes

Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts.

Stages of Incident Response

Course | 1 hour

Review the stages of incident response in two separate models, covering the details and concerns for each phase.

Email Analysis

Course | 21 minutes

Explore forensic email analysis with this course covering the structure, function and details of email.

Web Traffic Analysis

Course | 13 minutes

Dig into Web traffic analysis with this course covering write protection, Web forensics and cookies.

Wireless Analysis

Course | 38 minutes

Take a moment to refresh your knowledge of wireless analysis. Includes vocabulary, examples and diagrams.

Protocol Analysis

Course | 19 minutes

Get to grips with protocol analysis through this course on TCP/IP concepts, routing, vocabulary and functions.

Log Analysis

Course | 39 minutes

Log analysis counts for a lot in an investigation. Learn to maximize your analysis process with this course covering log management, auditing, steps, concerns and more.

Network Security Technologies

Course | 30 minutes

Two videos reintroduce you to network security technologies, including tool families, uses and examples.

Network Forensics Concepts

Course | 50 minutes

Develop your knowledge of network forensics concepts, tools and techniques as you progress through this five-video course.

Networking Fundamentals

Course | 31 minutes

Build a foundational knowledge of networking in this overview course covering key networking concepts and practices.

The Certified Computer Security Incident Handler (CSIH) certification path covers the essential information you need to know in order to properly detect, contain and mitigate security incidents. You’ll learn the ins and outs of incident response, as well as the tools of the trade used by incident responders on a daily basis.

CSIH practice exam

Custom practice exam | 30 questions

Prepare for your CSIH exam and test your domain knowledge.

Network Traffic Analysis Cyber Range

Cyber range | 12 labs

Gain practical experience and build your real-world network traffic analysis skills through 12 hands-on labs in the Network Traffic Analysis Cyber Range.

Building Incident Response Team

Course | 31 minutes

Review the most important aspects of incident response team members, such as technical skills, personal skills and critical knowledge.

Reverse Engineering Concepts

Course | 33 minutes

Get to grips with the details of reverse-engineering concepts in this three-video course. Includes demonstration and tool lists.

Cell Phone Forensics

Course | 28 minutes

Refresh your knowledge of cell phone forensics with this course covering Andriod and iPhone forensics challenges and best practices.

Windows Swap File

Course | 27 minutes

Get familiar with the Windows swap file, a great place for evidence to hide. Includes tools and demonstration video.

Memory Forensics

Course | 1 hour 19 minutes

Two videos take you through the fundamentals of memory forensics, including tools, techniques for dumping memory and an in-depth demonstration.

Dealing with Passwords and Encryption

Course | 33 minutes

Deal with passwords and encryption with the help of this course covering password-cracking, public and private keys, Kerberos and more.

Disk Forensics

Course | 55 minutes

Dive into disk forensics with this course covering bit images, restoring disk images, slack, steganography and more.

Role of the Computer Forensic Examiner

Course | 40 minutes

Get to grips with the role of the computer forensics examiner, including duties and potential legal concerns.

Cyber Attacks Overview

Course | 1 hour 14 minutes

Review the fundamentals of cyberattacks with two videos on risks, attack types and the anatomy of an attack.

Incident Response Process

Course | 1 hour 1 minute

Six videos take you through the details of the incident response process, including important tools, policies, strategies and legal concerns.

Introduction to Incident Response

Course | 56 minutes

Get on overview of incident response, including how to respond to security incidents and common incident response definitions and concepts.

Stages of Incident Response

Course | 1 hour

Review the stages of incident response in two separate models, covering the details and concerns for each phase.

Email Analysis

Course | 21 minutes

Explore forensic email analysis with this course covering the structure, function and details of email.

Web Traffic Analysis

Course | 13 minutes

Dig into Web traffic analysis with this course covering write protection, Web forensics and cookies.

Wireless Analysis

Course | 38 minutes

Take a moment to refresh your knowledge of wireless analysis. Includes vocabulary, examples and diagrams.

Protocol Analysis

Course | 19 minutes

Get to grips with protocol analysis through this course on TCP/IP concepts, routing, vocabulary and functions.

Log Analysis

Course | 39 minutes

Log analysis counts for a lot in an investigation. Learn to maximize your analysis process with this course covering log management, auditing, steps, concerns and more.

Network Security Technologies

Course | 30 minutes

Two videos reintroduce you to network security technologies, including tool families, uses and examples.

Network Forensics Concepts

Course | 50 minutes

Develop your knowledge of network forensics concepts, tools and techniques as you progress through this five-video course.

Networking Fundamentals

Course | 31 minutes

Build a foundational knowledge of networking in this overview course covering key networking concepts and practices.