EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA)
  • EC-Council Certified Security Analyst (ECSA)

    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    5 dager

    EC-Council

    Kursplan

     Oct 16 to Oct 20, 2017
    Oslo

    Course Details

    EC-Council Certified Security Analyst (ECSA)

    EC-Council Certified Security Analyst course enhances the key skills of the penetration testers and equips them with comprehensive know-how of the practical implementation of penetration testing and its various techniques. The participants will conduct the penetration testing on a company having varied departments with multiple servers and subnetworks, operating systems and which are full proofed with both militarized and non-militarized defense architectures.

    The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

    • Focuses on pentesting methodology with an emphasis on hands-on learning
    • The exam will now have a prerequisite of submitting a pentesting report
    • The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification
    • Security Analysis and Penetration Testing Methodologies
    • TCP IP Packet Analysis
    • Pre-penetration Testing Steps
    • Information Gathering Methodology
    • Vulnerability Analysis
    • External Network Penetration Testing Methodology
    • Internal Network Penetration Testing Methodology
    • Firewall Penetration Testing Methodology
    • IDS Penetration Testing Methodology
    • Web Application Penetration Testing Methodology
    • SQL Penetration Testing Methodology
    • Database Penetration Testing Methodology
    • Wireless Network Penetration Testing Methodology
    • Mobile Devices Penetration Testing Methodology
    • Cloud Penetration Testing Methodology
    • Report Writing and Post Test Actions
    • Ethical Hackers
    • Penetration Testers
    • Network server administrators
    • Firewall Administrators
    • Security Testers
    • System Administrators and Risk Assessment professionals