EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) Training
EC-Council Certified Security Analyst (ECSA)
  • EC-Council Certified Security Analyst (ECSA)

    5 Dages kursus
    Network Security
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    Course Details

    Overview

    EC-Council Certified Security Analyst course enhances the key skills of the penetration testers and equips them with comprehensive know-how of the practical implementation of penetration testing and its various techniques. The participants will conduct the penetration testing on a company having varied departments with multiple servers and subnetworks, operating systems and which are full proofed with both militarized and non-militarized defense architectures.

    Objectives

    The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

    • Focuses on pentesting methodology with an emphasis on hands-on learning
    • The exam will now have a prerequisite of submitting a pentesting report
    • The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification

    Outline

    • Security Analysis and Penetration Testing Methodologies
    • TCP IP Packet Analysis
    • Pre-penetration Testing Steps
    • Information Gathering Methodology
    • Vulnerability Analysis
    • External Network Penetration Testing Methodology
    • Internal Network Penetration Testing Methodology
    • Firewall Penetration Testing Methodology
    • IDS Penetration Testing Methodology
    • Web Application Penetration Testing Methodology
    • SQL Penetration Testing Methodology
    • Database Penetration Testing Methodology
    • Wireless Network Penetration Testing Methodology
    • Mobile Devices Penetration Testing Methodology
    • Cloud Penetration Testing Methodology
    • Report Writing and Post Test Actions

    Target Audience

    • Ethical Hackers
    • Penetration Testers
    • Network server administrators
    • Firewall Administrators
    • Security Testers
    • System Administrators and Risk Assessment professionals

    Kommende datoer

      Oct 23 to Oct 27, 2017
    Copenhagen
      Jan 15 - Jan 19, 2018
    Copenhagen
      Apr 23 - Apr 27, 2018
    Copenhagen
      Jul 16 - Jul 20, 2018
    Copenhagen
      Oct 15 - Oct 19, 2018
    Copenhagen