{"id":6799,"date":"2024-08-07T16:40:48","date_gmt":"2024-08-07T15:40:48","guid":{"rendered":"https:\/\/cristechservices.com\/?page_id=6799"},"modified":"2024-08-08T18:51:02","modified_gmt":"2024-08-08T17:51:02","slug":"certified-incident-handler","status":"publish","type":"page","link":"https:\/\/cristechservices.com\/index.php\/formation\/certified-incident-handler\/","title":{"rendered":"Certified Incident Handler"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6799\" class=\"elementor elementor-6799\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88f7afa e-flex e-con-boxed e-con e-parent\" data-id=\"88f7afa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5614f0b e-con-full e-flex e-con e-child\" data-id=\"5614f0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d511d11 elementor-widget elementor-widget-image\" data-id=\"d511d11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"562\" src=\"https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/ECIH.jpg\" class=\"attachment-large size-large wp-image-6942\" alt=\"\" srcset=\"https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/ECIH.jpg 1000w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/ECIH-300x169.jpg 300w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/ECIH-768x432.jpg 768w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/ECIH-720x405.jpg 720w, https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/ECIH-600x337.jpg 600w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1155979 e-con-full e-flex e-con e-child\" data-id=\"1155979\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a58aac5 elementor-widget elementor-widget-toggle\" data-id=\"a58aac5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1731\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1731\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Objectif de la formation<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1731\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1731\"><p style=\"text-align: justify;\">Dans l&rsquo;optique de prot\u00e9ger les actifs informationnels des organisations, ces concepts sont d\u00e9sormais essentiels pour pouvoir g\u00e9rer et r\u00e9pondre aux futures menaces et attaques. Cette formation vous apprend comment r\u00e9agir face \u00e0 un incident de s\u00e9curit\u00e9 tels que des logiciels malveillants, des attaques par e-mail, des attaques sur les applications web, sur le r\u00e9seau ou dans le Cloud. Elle vous enseigne \u00e9galement \u00e0 recueillir les preuves et \u00e0 g\u00e9rer des attaques internes. Il est crucial d&rsquo;avoir ces comp\u00e9tences afin de faire face aux menaces et aux attaques, de les g\u00e9rer et de prot\u00e9ger votre entreprise.<\/p><p>A la suite de cette formation, vous serez capables de vous inscrire \u00e0 l&rsquo;examen de certification d&rsquo;EC-Council Certified Incident Handler<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1732\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1732\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Description<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1732\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1732\"><p style=\"text-align: justify;\">Les connaissances th\u00e9oriques suivies des cas pratiques suivants vont contribuer \u00e0 l&rsquo;acquisition des connaissances li\u00e9es \u00e0 cette formation:<\/p><p style=\"text-align: justify;\">\u2192 Introduction \u00e0 la gestion et aux r\u00e9ponses aux incidents;<\/p><p style=\"text-align: justify;\">\u2192 Processus et gestion de r\u00e9ponse aux incidents;<\/p><p style=\"text-align: justify;\">\u2192 Forensic Readiness et First Response;<\/p><p style=\"text-align: justify;\">\u2192 Gestion et r\u00e9ponse aux incidents de s\u00e9curit\u00e9 li\u00e9s aux malwares;<\/p><p style=\"text-align: justify;\">\u2192 Gestion et r\u00e9ponse aux incidents de messagerie \u00e9lectronique;<\/p><p style=\"text-align: justify;\">\u2192 Gestion et r\u00e9ponse aux incidents de s\u00e9curit\u00e9 r\u00e9seau;<\/p><p style=\"text-align: justify;\">\u2192 Gestion et r\u00e9ponse aux incidents de s\u00e9curit\u00e9 applicatifs web;<\/p><p style=\"text-align: justify;\">\u2192 Gestion et r\u00e9ponse aux incidents de s\u00e9curit\u00e9 du cloud computing;<\/p><p style=\"text-align: justify;\">\u2192 Gestion et r\u00e9ponse aux incidents li\u00e9s aux menaces internes.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1733\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1733\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Pr\u00e9-requis<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1733\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1733\"><p>Avoir des connaissances g\u00e9n\u00e9rales en r\u00e9seau et en s\u00e9curit\u00e9 informatique.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1734\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1734\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Public cible<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1734\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1734\"><p style=\"text-align: justify;\">\u2192 Gestionnaires d\u2019incidents, administrateurs d\u2019\u00e9valuation des risques, Pentesters, Cyber-enqu\u00eateurs judiciaires;<\/p><p style=\"text-align: justify;\">\u2192 Consultants en \u00e9valuation de vuln\u00e9rabilit\u00e9s<br \/>Administrateurs de syst\u00e8mes, Ing\u00e9nieurs de syst\u00e8mes, Administrateurs de pare-feu;<\/p><p style=\"text-align: justify;\">\u2192 Responsables de r\u00e9seaux, Responsables IT;<br \/>\u2192 Toute personne int\u00e9ress\u00e9e par la gestion et la r\u00e9ponse aux incidents.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-665feb2 e-flex e-con-boxed e-con e-parent\" data-id=\"665feb2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-777cf19 elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"777cf19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cristechservices.com\/index.php\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contactez-nous<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Objectif de la formation Dans l&#8217;optique de prot\u00e9ger les actifs informationnels des organisations, ces concepts sont d\u00e9sormais essentiels pour pouvoir g\u00e9rer et r\u00e9pondre aux futures menaces et attaques. Cette formation vous apprend comment r\u00e9agir face \u00e0 un incident de s\u00e9curit\u00e9 tels que des logiciels malveillants, des attaques par e-mail, des attaques sur les applications web, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6800,"parent":6168,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_regular_price":[],"currency_symbol":[],"iawp_total_views":7,"footnotes":""},"class_list":["post-6799","page","type-page","status-publish","has-post-thumbnail","hentry"],"post_slider_layout_featured_media_urls":{"thumbnail":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie-150x150.jpg",150,150,true],"post_slider_layout_landscape_large":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie.jpg",818,419,false],"post_slider_layout_portrait_large":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie.jpg",818,419,false],"post_slider_layout_square_large":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie.jpg",818,419,false],"post_slider_layout_landscape":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie-600x400.jpg",600,400,true],"post_slider_layout_portrait":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie-600x419.jpg",600,419,true],"post_slider_layout_square":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie-600x419.jpg",600,419,true],"full":["https:\/\/cristechservices.com\/wp-content\/uploads\/2024\/08\/Roles-and-Responsibilities-of-Incident-Handler-Copie.jpg",818,419,false]},"_links":{"self":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=6799"}],"version-history":[{"count":16,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6799\/revisions"}],"predecessor-version":[{"id":6946,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6799\/revisions\/6946"}],"up":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/pages\/6168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/media\/6800"}],"wp:attachment":[{"href":"https:\/\/cristechservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=6799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}