Technical labor programs endorsed by the Ministry of Education
View all technical programsDescubre nuestra trayectoria como institución de educación de alta calidad
Programas alineados a certificaciones internacionales y necesidades del mercado global
Ver Oferta Académica CompletaAn advanced incident response certification that provides practical and strategic skills to detect, manage, and mitigate cyberattacks in real time. Designed for SOC teams, analysts, administrators, and any IT professional responsible for responding to cyber threats.
An advanced incident response certification that provides practical and strategic skills to detect, manage, and mitigate cyberattacks in real time. Designed for SOC teams, analysts, administrators, and any IT professional responsible for responding to cyber threats.
At the end of the course, participants will be able to:
To fully benefit from the course, participants are required to have:
| Certificación Internacional Incident Handler (E|CIH) – Versión 3 | Applies |
|---|---|
| Certificación Internacional Incident Handler (E|CIH) – Versión 3 | 24 hours |
The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.
The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.
The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.
As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.
You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.
Pre-enroll nowMake your payment quickly, safely and reliably
- For bank transfer payments, request the details by email
capacita@aulamatriz.edu.co.
- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.
An advanced incident response certification that provides practical and strategic skills to detect, manage, and mitigate cyberattacks in real time. Designed for SOC teams, analysts, administrators, and any IT professional responsible for responding to cyber threats.
At the end of the course, participants will be able to:
To fully benefit from the course, participants are required to have:
| Certificación Internacional Incident Handler (E|CIH) – Versión 3 | Applies |
|---|---|
| Certificación Internacional Incident Handler (E|CIH) – Versión 3 | 24 hours |
The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.
The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.
La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."
As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.
Make your payment quickly, safely and reliably
- For bank transfer payments, request the details by email
capacita@aulamatriz.edu.co.
- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.
Fundamentals of incident management, legal framework, and best practices.
Phases: preparation, identification, containment, eradication, recovery, and lessons learned.
Preparation for forensic investigation and initial response steps.
Analysis, containment, and mitigation of malware such as trojans, ransomware, etc.
Identification and response to phishing attacks, BEC, and other email vectors.
Response to scans, intrusions, DDoS, and other network threats.
Management of vulnerabilities in web applications: injections, XSS, CSRF, etc.
Procedures for identifying and mitigating incidents in cloud environments.
Identification and control of internal threats, both malicious and negligent.
Incident management in connected devices (IoT) and industrial environments (OT).
Solo te pedimos tu número para explicarte nuestra metodología y brindarte una atención personalizada.