Disclosure: when you buy through links on our site, we may earn an affiliate commission.

GCIH Tests

Prepare for the GCIH exam by reviewing these test questions and their in-depth detailed explanations.
4.0
4.0/5
(35 reviews)
937 students
Created by

8.2

CourseMarks Score®

8.3

Freshness

7.2

Feedback

8.4

Content

Platform: Udemy
Language: English
Next start: On Demand

Table of contents

Description

This course contains two tests with detailed explanations of correct answers and incorrect options to allow you to efficiently prepare for the GCIH exam. It can also be really beneficial to security managers performing technical interviews to incident handlers and SOC analysts in addition to anyone looking for a role in incident handling and wants to prepare for very demanding technical interviews.

Exam Details
Passing score: 70%
Total questions: 100-150
Duration: 4 hours

Objectives:
•Incident Handling: Overview and Preparation
•Incident Handling: Identification
•Incident Handling: Containment
•Incident Handling: Eradication, Recovery, and Lessons Learned
•Reconnaissance
•Scanning: Discovery and Mapping
•Scanning: Techniques and Defense
•Client Attacks
•Password Attacks
•Overflow Attacks
•Network Attacks
•Session Hijacking and Cache Poisoning
•Denial of Service Attacks
•Web Application Attacks
•Techniques for maintaining access
•Covering Tracks: Networks
•Covering Tracks: Systems
•Worms, Bots & Botnets
Recommendation
The GCIH exam includes a few questions requiring exam takers to perform specific actions to get a result. The best method to prepare for this is to create a lab that will allow you to practice any questions that have practical elements in them. Those will be explicitly noted in the questions and detailed instructions will be provided on how to get an answer using a lab. The simplest setup can include a few virtual  (or physical) machines. An example collection can include:
•Machine running Kali Linux
•Machine running Metasploitable2 or Metasploitable3 (to be used as a target machine for attacks)
•Machine running Windows (any latest versions of Windows Server or personal editions that you might have licenses for)

You will learn

Requirements

This course is for

• Anyone aiming to take the GCIH exam and gain the associated certification
• People who want to learn more about incident handling
• Individuals seeking Cyber Security roles and wanting to prepare for interviews
• Hiring managers who would like to interview candidates for security roles
Security Specialist, Book and Course Author
Nick Mitropoulos is the CEO of Scarlet Dragonfly and has more than 13 years of experience in security training, cyber security, incident handling, vulnerability management, security operations, threat intelligence and data loss prevention.
He is a certified ISC2 & EC-Council instructor, a GIAC advisory board member, a Cisco champion and an IEEE senior member full of passion for teaching. He regularly provides training in a variety of security topics, mainly focusing in SIEM, security operation centres, incident response and security certification courses.
Nick holds over 25 security certifications including GIAC (GCIH, GPEN, GWAPT, GISF), EC-Council (CEH, CEI Certified Instructor), ISC2 (SSCP, Certified ISC2 instructor), CompTIA (Security+), Cisco (CCNA Cyber Ops, CCNA Security, CCNA Routing & Switching, CCDA), Palo Alto (ACE), Qualys (Certified Specialist in AssetView and ThreatPROTECT, Cloud Agent, PCI Compliance, Policy Compliance, Vulnerability Management, Web Application Scanning), Splunk (Splunk Certified User) and many more.
Browse all courses by on Coursemarks.
Platform: Udemy
Language: English
Next start: On Demand

Students are also interested in