GCIH Exam Prep · Topic 1 of 5

Incident Handling Process & IR Fundamentals

PICERL · Chain of Custody · IR Roles · MITRE ATT&CK · IOCs · Threat Intelligence

Study with Practice Tests →

Incident Handling Process & IR Fundamentals

The foundation of GCIH. Every incident handler must master the structured response lifecycle, evidence handling principles, and threat intelligence frameworks before tackling attacker techniques.

GCIH · Topic 1 of 5 · ~106 Questions · 4 Hours

GCIH Exam Coverage — 5 Topic Areas

TopicKey Concepts
1. Incident Handling ProcessPICERL, chain of custody, IR team roles, MITRE ATT&CK, IOCs, threat intelligence
2. Reconnaissance & ScanningOSINT, Nmap, vulnerability scanning, passive vs active recon
3. Exploitation & Web AttacksPassword attacks, buffer overflows, social engineering, SQLi, XSS, CSRF
4. Network Attacks & IDSARP poisoning, DoS/DDoS, packet analysis, IDS/IPS evasion, NetFlow
5. Malware & Lateral MovementMalware types, C2, persistence, Pass-the-Hash, YARA, memory forensics

Core Concepts at a Glance

PICERL — The IR Lifecycle

Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned. The most tested framework in GCIH. Every incident response action maps to one of these phases.

Chain of Custody

Documented record of who collected evidence, when, where it was stored, and who had access. A broken chain can render evidence inadmissible in court. Hash all evidence immediately with SHA-256 to prove integrity.

MITRE ATT&CK

Framework mapping adversary Tactics (why), Techniques (how), and Procedures (specific implementation). 14 tactics from Reconnaissance through Impact. Used for threat hunting, detection engineering, and red team exercises.

IOCs vs TTPs

IOCs (Indicators of Compromise): IP addresses, file hashes, domains — burn fast (attacker changes them easily). TTPs (Tactics, Techniques, Procedures): behavioral patterns — persist longer, harder to change. TTPs are more valuable for long-term defense.

Containment Types

Short-term: Stop the bleeding immediately (isolate system, block IP, disable account). Long-term: Durable fix without disrupting operations. Always contain before eradicating — rushing to clean up lets attackers pivot.

Pyramid of Pain

David Bianco's model of IOC value: Hash → IP Address → Domain → Network Artifact → Host Artifact → Tool → TTPs (hardest for attacker to change = most painful to lose). Focus detection on higher pyramid levels.

Exam Tips

Phase Ordering Traps

The GCIH exam often asks you to pick the correct NEXT step. Remember: Identification comes before Containment — you must confirm an incident exists before acting. Containment precedes Eradication — never clean up while the attacker still has access.

Evidence Before Action

Document and photograph before touching anything. Volatile evidence (RAM, running processes, network connections) disappears on reboot — capture it first. Order of volatility: Registers/cache → RAM → Swap → Disk → Remote logs → Archive media.

Legal Awareness

Know when to involve law enforcement. Computer Fraud and Abuse Act (CFAA) in the US applies to unauthorized access. Wiretap Act governs network monitoring. Always get legal counsel before conducting offensive action — even on your own network.

PICERL — The IR Lifecycle

The six-phase incident response lifecycle is the backbone of GCIH. Every question about what to do next maps back to one of these phases.

P

Preparation

Build IR capability before incidents occur. Includes: IR policy and plan, team formation (CSIRT), communication trees, incident classification criteria, jump bags, forensic tools, legal retainers, tabletop exercises, threat intelligence subscriptions. Goal: be ready before the breach happens.

I

Identification

Determine whether an event is actually an incident. Sources: SIEM alerts, IDS/IPS, user reports, threat intelligence, SOC analysts. Key questions: What systems are affected? When did it start? Is it still active? Establish a ticket/timeline immediately. Declare an incident when confirmed.

C

Containment

Short-term: Immediately limit damage — network isolate affected systems, block attacker IPs, disable compromised accounts, null-route C2 domains. Long-term: Implement durable controls — ACL changes, firewall rules, credential resets — that can be maintained while business continues. Do NOT reboot or wipe yet — preserve forensic evidence.

E

Eradication

Remove all traces of the attacker from the environment. Actions: delete malware, close backdoors, patch vulnerabilities exploited, remove rogue accounts, clean infected systems. Verify eradication is complete before proceeding. Failing to find all persistence mechanisms = reinfection.

R

Recovery

Restore systems to normal operation. Restore from known-good backups, rebuild from clean images, re-enable services in a controlled manner. Monitor closely post-recovery for signs of reinfection. Define success criteria — what does "recovered" look like? Gradual return to production, not all-at-once.

L

Lessons Learned

Post-incident review within 2 weeks. Questions: What happened? What was the timeline? What did we do well? What could be improved? Update IR plan, runbooks, detection rules, and training based on findings. This phase feeds back into Preparation, making the cycle self-improving.

Incident Classification

SeverityDescriptionResponse TimeExamples
Critical (P1)Active breach, data exfiltration, ransomware spreadingImmediate (<1 hr)Ransomware outbreak, confirmed APT, active data theft
High (P2)Compromise confirmed, limited spread<4 hoursSingle workstation malware, credential breach discovered
Medium (P3)Suspicious activity, unconfirmed breach<24 hoursPhishing email opened, unusual login pattern
Low (P4)Policy violation, minimal riskBest effortEmployee on unauthorized website, port scan from external

Order of Volatility — Evidence Collection Priority

Most Volatile (Collect First)

1. CPU registers, cache
2. RAM (running processes, network sockets, encryption keys)
3. Network connections and routing tables
4. Running processes and services
5. Open files and handles

Less Volatile

6. Swap/page file
7. Hard disk contents (file system, logs, artifacts)
8. Remote logging and monitoring data
9. Physical configuration (hardware)

Least Volatile

10. Archived media (backup tapes, offsite backups)

Key: collect RAM before rebooting — rebooting destroys all volatile evidence. Use tools like Volatility, WinPmem, or LiME for live memory acquisition.

IR Team & Evidence Handling

Effective incident response requires both the right team structure and rigorous evidence handling procedures. Legal admissibility depends on proper chain of custody.

CSIRT Team Roles

RoleResponsibilities
IR Manager / Incident CommanderOverall coordination, decision authority, executive communication, escalation decisions
Lead Analyst / Technical LeadTechnical investigation, directs forensics, determines attacker TTPs, scoping
Forensic AnalystEvidence collection and preservation, disk/memory imaging, artifact analysis
Malware AnalystStatic and dynamic malware analysis, IOC extraction, capability assessment
Threat HunterProactive search for attacker presence not detected by alerts
Legal CounselAdvises on law enforcement notification, evidence handling legality, disclosure requirements
Communications LeadInternal and external communications, PR coordination, regulatory notifications
IT/Operations SupportSystem access, network changes, backup restoration, business continuity

Chain of Custody Fundamentals

What Must Be Documented

• Who collected the evidence (name, role)
• Date, time, and location of collection
• Description of evidence (make, model, serial, hash)
• Every transfer: who gave to whom, when
• Storage location and access controls
• Any analysis performed and by whom

Evidence Integrity

Hash evidence immediately upon collection using SHA-256 (not MD5 — collisions possible). Store hash separately from evidence. Re-hash before and after each analysis to prove no tampering. Work on forensic copies — never the original. Write-blockers prevent accidental modification of physical media.

Legal Considerations

Computer Fraud and Abuse Act (CFAA): US law criminalizing unauthorized computer access. Even defenders must have authorization to access systems. Wiretap Act: governs real-time monitoring of communications. Always have written authorization before conducting network monitoring or forensics.

Evidence Types

TypeExamplesHandling Notes
Digital — VolatileRAM contents, running processes, network connections, ARP cacheCapture immediately; lost on power-off
Digital — Non-VolatileHard disk, USB drives, logs, config filesForensic image with write-blocker; hash before/after
NetworkPCAP files, NetFlow, firewall logs, SIEM eventsTime-sync critical; preserve raw captures
PhysicalHardware, printouts, sticky notes with passwordsPhoto in place before moving; bag and tag
TestimonialWitness statements, user accounts of eventsDocument immediately; separate witnesses

Tabletop Exercises

Purpose

Simulate incident scenarios in a discussion-based format — no actual systems affected. Tests: decision-making, communication flows, role clarity, gap identification in the IR plan. Should involve: IR team, legal, executives, IT, communications, and business stakeholders.

Common Scenarios

Ransomware outbreak · CEO email compromise (BEC) · Data breach of customer PII · Insider threat exfiltration · Supply chain compromise · DDoS attack on critical services · Credential stuffing attack on web application

After-Action Review

Document: what decisions were made, what gaps were identified, what the plan says vs what actually happened. Update IR playbooks based on findings. Schedule follow-up exercise to validate improvements. Frequency: at least annually, after major org changes, or after real incidents.

Threat Intelligence & MITRE ATT&CK

Threat intelligence transforms raw data into actionable knowledge about adversaries. MITRE ATT&CK provides a common language for describing attacker behavior.

MITRE ATT&CK Framework

#TacticWhat the Attacker Is DoingExample Technique
TA0043ReconnaissanceGathering information before attackingActive Scanning, OSINT
TA0042Resource DevelopmentBuilding attack infrastructureAcquire infrastructure, develop tools
TA0001Initial AccessGetting a footholdSpearphishing, exploit public-facing app
TA0002ExecutionRunning malicious codePowerShell, WMI, scheduled tasks
TA0003PersistenceMaintaining foothold across rebootsRegistry run keys, startup folder, services
TA0004Privilege EscalationGaining higher permissionsToken impersonation, exploit SUID
TA0005Defense EvasionAvoiding detectionObfuscation, timestomping, LOLBins
TA0006Credential AccessStealing credentialsMimikatz, keylogging, Kerberoasting
TA0007DiscoveryLearning the environmentNetwork scanning, AD enumeration
TA0008Lateral MovementMoving through the networkPass-the-Hash, PsExec, RDP
TA0009CollectionGathering data of interestData staged, screen capture, keylogging
TA0011Command & ControlCommunicating with compromised systemsHTTPS C2, DNS tunneling, domain fronting
TA0010ExfiltrationStealing data out of the environmentExfil over C2, cloud storage upload
TA0040ImpactManipulating, destroying, or disruptingRansomware, disk wipe, defacement

IOCs & The Pyramid of Pain

Level 1 (Trivial) — Hash Values

MD5/SHA-256 file hashes of malicious files. Easiest to block — add hash to blocklist. But trivial for attacker to change — recompile or add a byte. Useful for known malware identification but not durable detection.

Level 2 (Easy) — IP Addresses

C2 server IPs, scanner IPs. Easy to block at firewall. Attacker rotates IPs constantly — burned within hours. Still useful for short-term containment and correlation with threat intel feeds.

Level 3 (Simple) — Domain Names

Malicious domains used for C2, phishing, malware delivery. Block at DNS. Attacker registers new domains — takes more effort than new IPs. DGA (Domain Generation Algorithm) domains are especially hard to block.

Level 4-5 (Annoying) — Artifacts

Network artifacts: unusual user-agents, URI patterns, protocol abnormalities in traffic. Host artifacts: registry keys, file paths, mutex names, scheduled task names. These take real attacker effort to change and are good behavioral indicators.

Level 6 (Challenging) — Tools

Specific attacker tools: Mimikatz, Cobalt Strike, BloodHound. Blocking known tools forces attacker to develop or acquire new ones. Tool signatures in AV/EDR. Attackers often customize tools to evade tool-based detection.

Level 7 (Painful) — TTPs

Attacker behaviors and techniques — hardest to change because they reflect the attacker's core methodology. Detection at this level forces the adversary to rethink their entire approach. Behavioral detection in EDR/SIEM targets this level.

Threat Intelligence Sharing Standards

StandardPurposeFormat
STIX (Structured Threat Info Expression)Describes threat intelligence objects (indicators, campaigns, actors)JSON
TAXII (Trusted Automated eXchange of Indicator Info)Transport mechanism for sharing STIX contentHTTPS API
OpenIOCMandiant's format for expressing IOCs in machine-readable formXML
MISP (Malware Info Sharing Platform)Open-source threat intelligence platform for sharing IOCsJSON/XML
ISACs (Info Sharing & Analysis Centers)Sector-specific threat sharing (FS-ISAC, H-ISAC, etc.)Various

Practice Quiz — Incident Handling Process & IR Fundamentals

10 questions covering PICERL, chain of custody, evidence handling, MITRE ATT&CK, and threat intelligence. Select the best answer.

1. Which phase of the PICERL model focuses on limiting the spread of an incident to prevent further damage while preserving evidence?
2. Which of the following best describes the purpose of "chain of custody" in an incident investigation?
3. During which PICERL phase is malicious software removed and exploited vulnerabilities patched?
4. In MITRE ATT&CK, what is the relationship between Tactics, Techniques, and Procedures?
5. An IR team discovers an infected workstation. Which action should they take FIRST before touching the system?
6. According to the Order of Volatility, which evidence type should be collected FIRST?
7. Which framework specifically maps adversary Tactics, Techniques, and Procedures to help defenders understand and detect attacker behavior?
8. On the Pyramid of Pain, which indicator type is MOST valuable for long-term detection because it is hardest for attackers to change?
9. STIX and TAXII are standards used for which purpose?
10. What is the PRIMARY purpose of a tabletop exercise in incident response?

Memory Hooks

Six sticky mental anchors for the highest-yield IR Fundamentals concepts.

🔄
PICERL
"Please Identify Containment, Eradicate, Recover, Learn"
Preparation=Plan before. Identification=Is this real? Containment=Stop bleeding. Eradication=Remove evil. Recovery=Back to business. Lessons=Improve. Exam trap: Containment comes BEFORE Eradication — never clean up while attacker still has access.
🔗
Chain of Custody
"Every hand that touches evidence must be documented"
Who collected, when, where stored, every transfer. Break in chain = evidence inadmissible. Hash with SHA-256 immediately (not MD5 — collision risk). Work on forensic copies — never originals. Write-blockers prevent accidental modification of physical media.
🎯
MITRE ATT&CK
"Tactics=Why · Techniques=How · Procedures=Exactly How"
14 Tactics from Reconnaissance to Impact. Techniques = general attack method (T1059). Procedures = adversary-specific steps (APT29 uses PowerShell with encoded commands). Used for threat hunting, detection rule creation, and measuring security coverage gaps.
🔺
Pyramid of Pain
"Higher up = harder for attacker to change = more valuable"
Bottom (easy to change): Hash → IP → Domain → Network/Host Artifact → Tool. Top (painful): TTPs. Focus detection engineering on TTPs and tools — they persist. IOC-based detection (hash/IP) burns out in hours as attacker rotates indicators.
Order of Volatility
"Capture what disappears first"
RAM → Network connections → Running processes → Swap → Disk → Remote logs → Backups. Never reboot before capturing RAM — you lose: encryption keys, running process memory, network sockets, attacker tools in memory. Tools: WinPmem, LiME (Linux), Volatility (analysis).
🧊
Containment Strategy
"Short-term stops the bleeding · Long-term stops the recurrence"
Short-term: isolate NOW (network segment off, block C2 IP, disable account) — preserve evidence, don't wipe. Long-term: durable fix (firewall rule, patch, rebuilt system) — sustainable while ops continue. Rushing to eradication without containment = attacker pivots before you finish.

Flashcards & Study Advisor

Click any card to flip it. 8 high-yield concept cards for rapid review.

👆 Click a card to reveal the answer

PICERL — 6 Phases
Name all 6 phases in order and their core purpose.
Preparation (build capability) → Identification (confirm incident) → Containment (limit damage) → Eradication (remove attacker) → Recovery (restore ops) → Lessons Learned (improve). Key: Containment always before Eradication. Lessons Learned feeds back to Preparation.
Chain of Custody
What 4 things must always be documented?
1. Who collected the evidence (name, badge)
2. When and where collected (date, time, location)
3. Every transfer (from→to, date, reason)
4. Storage conditions and access log
Plus: SHA-256 hash at collection and before each analysis. Work on copies, never originals.
MITRE ATT&CK — 14 Tactics
What are the first 4 and last 2 tactics in order?
First: Reconnaissance → Resource Development → Initial Access → Execution
…Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, C&C, Exfiltration…
Last: Exfiltration → Impact
Total: 14 tactics. Each tactic has multiple techniques (T-numbers).
Pyramid of Pain — 7 Levels
List from bottom (easy) to top (painful for attacker).
Bottom → Top:
1. Hash values (trivial to change)
2. IP addresses
3. Domain names
4. Network artifacts
5. Host artifacts
6. Tools
7. TTPs (most painful — forces attacker to retool entirely)
Order of Volatility
What are the top 3 most volatile evidence sources?
1. CPU registers and cache (lost instantly)
2. RAM — running processes, open sockets, encryption keys, attacker tools in memory
3. Network connections and ARP/routing tables
Always capture RAM before rebooting. Use WinPmem or LiME. Analyze with Volatility framework.
STIX vs TAXII
What does each standard do?
STIX (Structured Threat Info Expression): the FORMAT for describing threat intelligence — defines objects like Indicators, Campaigns, Threat Actors, Malware in JSON.
TAXII (Trusted Automated eXchange): the TRANSPORT for sharing STIX content — HTTPS-based API with Collections and Channels. Think: STIX=language, TAXII=mail carrier.
Short-term vs Long-term Containment
When do you use each and what's the risk of skipping short-term?
Short-term: immediate damage limitation — isolate system, block C2 IP, disable compromised account. Fast but may disrupt operations.
Long-term: sustainable fix — firewall rules, rebuilt system, patched vulnerability — maintains business ops.
Skipping short-term: attacker sees containment starting and pivots to other systems before you finish.
Incident Classification Levels
What do P1 through P4 represent?
P1 Critical: Active breach, spreading, data exfil — respond immediately (<1hr). Ransomware outbreak, confirmed APT.
P2 High: Confirmed compromise, limited — <4hrs. Single workstation malware.
P3 Medium: Suspicious, unconfirmed — <24hrs. Phishing email opened.
P4 Low: Policy violation, minimal risk — best effort.

Study Advisor

Select a topic for targeted exam-day guidance.

PICERL — Exam Strategy

  • The exam loves "what should you do NEXT?" — always think: are you still in Identification, or have you moved to Containment? Don't skip phases.
  • Containment BEFORE Eradication is the #1 rule. Cleaning up while attacker has access is pointless — they'll re-compromise immediately.
  • Lessons Learned is NOT optional. It's a required phase, not a nice-to-have. Schedule it within 2 weeks while memory is fresh.
  • Preparation means having everything READY before incidents occur: playbooks, contact lists, jump bags, legal retainers, tool licenses.
  • Recovery includes monitoring — after restoring systems, watch closely for signs of re-infection before declaring recovery complete.

Ready to pass the GCIH?

Practice with full-length adaptive exams covering all GCIH topic areas.

Start Free Practice Tests →