ECSA - EC-Council Certified Security Analyst

EC-Council Certified Security Analyst

(ECSA)

Ec-council

The ECSA penetration testing certification is a security credential like no other!


The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

Next Available Date

Class-room

I would like to receive email from Makintouch Consulting and learn about other offerings related to this course.

Course Description

The EC-Council Certified Security Analyst (ECSA v10) training and certification course is a continution of CEH program .The updated 10th versions of ECSAv10 includes updated curriculum mathching the industry progress and similar step-by-step penetration testing methodology. The ECSA follows a set of methodollogies which covers the pentesting requirements across various verticals.

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing published penetration testing methodology

• Focuses on pentesting methodology with an emphasis on hands-on learning

• The exam will now have a prerequisite of submitting a pentesting report

• The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification

Target Audience

Ethical Hackers

Penetration Testers

Security Analysts & Security Engineers

Network Server Administrators & System Administrators

Firewall Administrators & Security Testers

Risk Assessment Professionals

Prerequisites

No formal pre-requisites for this course

Course Outline

Security Analysis and Penetration Testing Methodologies

  • TCP IP Packet Analysis
  • Pre-penetration Testing Steps
  • Information Gathering Methodology
  • Vulnerability Analysis
  • External Network Penetration Testing Methodology
  • Internal Network Penetration Testing Methodology
  • Firewall Penetration Testing Methodology
  • IDS Penetration Testing Methodology
  • Web Application Penetration Testing Methodology
  • SQL Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Network Penetration Testing Methodology
  • Mobile Devices Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Test Actions
  • Password Cracking Penetration Testing
  • Router and Switches Penetration Testing
  • Denial-of-Service Penetration Testing
  • Stolen Laptop, PDAs and Cell Phones Penetration Testing
  • Source Code Penetration Testing
  • Physical Security Penetration Testing
  • Surveillance Camera Penetration Testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • Virtual Machine Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • SAP Penetration Testing
  • Standards and Compliance
  • Information System Security Principles
  • Information System Incident Handling and Response
  • Information System Auditing and Certification

Course Objectives

By the end of this training you will:

  • Introduction to Penetration Testing
  • Penetration Testing Scoping and Engagement Methodology
  • Open Source Intelligence (OSINT) Methodology
  • Social Engineering Penetration Testing Methodology
  • Network Penetration Testing Methodology -External, Internal & Perimeter Devices
  • Web Application Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Testing Actions.


Need more info? Let us know and we will be happy to respond

DETAILS


5 DAYS
INTERMEDIATE
LAGOS, ABUJA

php shell download
istanbul escort