EC-Council • ECIH
Validates competency across all stages of incident handling and response, including preparation, incident recording, triage, containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities for network security incidents, malicious code incidents, and insider threats.
Questions
590
Duration
180 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The EC-Council Certified Incident Handler (ECIH) is a specialist-level certification that validates a cybersecurity professional's ability to manage the complete lifecycle of security incident handling and response. Carrying exam code 212-89, the ECIH program covers all phases of the incident response process—from preparation and initial triage through containment, forensic evidence gathering, eradication, system recovery, and post-incident review. The curriculum addresses a wide range of incident categories, including network security incidents, malicious code and malware outbreaks, email security incidents, web application attacks, cloud security incidents, endpoint compromises, and insider threats.
Accredited by the American National Standards Institute (ANSI) and approved by the American Council on Education (ACE), the ECIH is recognized as a rigorous, academically vetted credential. The program exposes candidates to over 800 incident handling and response tools and more than 95 hands-on labs, emphasizing practical, method-driven competency over theoretical knowledge alone. The current version (v3) reflects the evolving threat landscape, incorporating modern attack vectors such as cloud-based incidents and advanced persistent threats.
The ECIH is designed for cybersecurity professionals who are directly involved in detecting, analyzing, or responding to security incidents. Primary target roles include incident response team members, SOC (Security Operations Center) analysts, cyber forensic investigators, vulnerability assessment auditors, penetration testers, and risk assessment administrators. System administrators, network managers, firewall administrators, and IT managers responsible for organizational security posture are also well-suited candidates.
The certification is appropriate for professionals with at least one year of experience in cybersecurity who want to formalize and deepen their incident handling expertise. It is also pursued by federal employees and defense contractors seeking to meet compliance or role-specific requirements in government and regulated industry environments.
EC-Council recommends that candidates have at least one year of experience working as a cybersecurity professional before attempting the ECIH exam. This foundational experience ensures familiarity with networking concepts, operating systems, common attack vectors, and basic security tooling—all of which are assumed knowledge within the curriculum.
There are no mandatory formal educational prerequisites, but a working understanding of TCP/IP networking, Windows and Linux system administration, log analysis, and basic digital forensics concepts will significantly aid comprehension of the course material. Candidates with prior exposure to security frameworks such as NIST SP 800-61 or SANS incident response methodology will find the structured approach of the ECIH program familiar. EC-Council also requires candidates to complete an eligibility application if they are challenging the exam without attending official training.
The ECIH exam (code 212-89) consists of 100 multiple-choice questions and must be completed within 3 hours (180 minutes). The exam is delivered through EC-Council's ECC Exam Center or at Pearson VUE testing centers worldwide, offering both online proctored and in-person options.
EC-Council uses a variable cut-score methodology based on the specific exam form administered. While the generally cited passing score is 70%, cut scores can range from 60% to 85% depending on the difficulty calibration of the form assigned to the candidate—this is determined through psychometric analysis and subject matter expert review during beta testing. There are no separate unscored pilot questions disclosed publicly. Certification must be renewed every three years through EC-Council's continuing education program.
The ECIH certification positions holders for roles such as Incident Responder, SOC Analyst (Tier 2/3), Cyber Forensic Analyst, Threat Intelligence Analyst, and Information Security Manager. In the United States, incident handlers and response professionals earn an average salary of approximately $96,000 per year, with ranges typically between $85,000 and $108,000 depending on experience, industry, and location—with government, defense, and financial services sectors commanding premium compensation.
Compared to alternatives like the SANS GIAC Certified Incident Handler (GCIH), the ECIH is more accessible in terms of cost and entry requirements, making it a practical stepping stone for professionals earlier in their security careers. The ANSI accreditation and ACE approval add credibility recognized by government agencies and academic institutions. For professionals targeting compliance-heavy industries or federal positions, the ECIH also aligns with the NICE Cybersecurity Workforce Framework's 'Protect and Defend' work role category, broadening its applicability in government contracting environments.
1. During ransomware incident containment, an organization must decide between short-term and long-term containment strategies. The ransomware has encrypted 15 percent of file servers and is actively spreading through SMB shares. Which containment approach follows NIST SP 800-61 guidelines? (Select one!)
2. A CSIRT manager must select an appropriate staffing model for a startup company with 150 employees, limited budget, and no internal security expertise. The company requires 24/7 incident response capability. Which staffing model would be MOST appropriate? (Select one!)
3. During a ransomware incident response, a CSIRT analyst discovers the malware encrypted files with the extension .ryuk and left ransom notes in multiple directories. Before attempting recovery, the analyst should consult which resource to determine if a free decryption tool exists? (Select one!)
4. An incident handler performs static malware analysis and needs to disassemble a suspicious executable to understand its functionality without executing it. Which tools provide disassembly capabilities for static analysis? (Select two!)
Select all that apply5. During malware analysis, an incident handler discovers a suspicious executable that modifies the Master Boot Record and loads before the operating system. The malware is able to hide its presence from antivirus software running in the OS. What type of malware is this? (Select one!)
All exams included • Cancel anytime