EC Council Certified Security Analyst Course & Exam

Document created by Matthew Bradley Employee on Oct 8, 2018
Version 1Show Document
  • View in full screen mode

Register Now 

 

 

In order to register for a class, you need to first create an EMC account

If you need further assistance, contact us

 

Overview

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning. The new ECSAv10 includes updated curricula and an industry recognized comprehensive stepby-step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges. Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals. It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted. idence.

 

Audience

Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals. 

 

Duration

5 days (ILT)

 

Prerequisite Knowledge/Skills

Prior to exam, students must either:

• Attend official training via an EC-Council accredited training channel Or 

• Possess a minimum of 2 years of working experience in a related InfoSec domain

 

Course Objectives

Upon successful completion of this course, participants should be able to:

• Network Penetration Testing: Identify security issues in network design and implementation 

• Web Application Penetration Testing: Detect security issues in web applications that exists due to insecure design and development practices 

• Social Engineering Penetration Testing: Identify employees that do not properly authenticate, follow, validate, handle, the processes and technology 

• Wireless Penetration Testing: Identify misconfigurations in organization’s wireless infrastructure including WLAN, Mobile, 

• Cloud Penetration Testing: Determine security issues in organization’s cloud infrastructure 

• Database Penetration Testing: Identify security issues in the configuration of database server and their instances 

 

Course Outline

Penetration Testing Essential Concepts (Self-Study)

Introduction to Penetration Testing and Methodologies

Penetration Testing Scoping and Engagement Methodology

Open-Source Intelligence (OSINT) Methodology

Social Engineering Penetration Testing Methodology

Network Penetration Testing Methodology – External

Network Penetration Testing Methodology – Internal

Network Penetration Testing Methodology – Perimeter Devices

Web Application Penetration Testing Methodology

Database Penetration Testing Methodology

Wireless Penetration Testing Methodology

Cloud Penetration Testing Methodology

Report Writing and Post Testing Actions 

 

Register Now 

 

 

In order to register for a class, you need to first create an EMC account

If you need further assistance, contact us

Attachments

    Outcomes