EC Council Certified Security Analyst Course & Exam

Document created by Matthew Bradley Employee on Oct 8, 2018Last modified by Joseph Cantor on Nov 6, 2019
Version 8Show Document
  • View in full screen mode

Schedule & Register

Schedule Only



In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us



The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning. The new ECSAv10 includes updated curricula and an industry recognized comprehensive stepby-step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges. Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals. It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted. idence.



Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals. 



5 days (ILT)


Prerequisite Knowledge/Skills

Prior to exam, students must either:

• Attend official training via an EC-Council accredited training channel Or 

• Possess a minimum of 2 years of working experience in a related InfoSec domain


Course Objectives

Upon successful completion of this course, participants should be able to:

• Network Penetration Testing: Identify security issues in network design and implementation 

• Web Application Penetration Testing: Detect security issues in web applications that exists due to insecure design and development practices 

• Social Engineering Penetration Testing: Identify employees that do not properly authenticate, follow, validate, handle, the processes and technology 

• Wireless Penetration Testing: Identify misconfigurations in organization’s wireless infrastructure including WLAN, Mobile, 

• Cloud Penetration Testing: Determine security issues in organization’s cloud infrastructure 

• Database Penetration Testing: Identify security issues in the configuration of database server and their instances 


Course Outline

Penetration Testing Essential Concepts (Self-Study)

Introduction to Penetration Testing and Methodologies

Penetration Testing Scoping and Engagement Methodology

Open-Source Intelligence (OSINT) Methodology

Social Engineering Penetration Testing Methodology

Network Penetration Testing Methodology – External

Network Penetration Testing Methodology – Internal

Network Penetration Testing Methodology – Perimeter Devices

Web Application Penetration Testing Methodology

Database Penetration Testing Methodology

Wireless Penetration Testing Methodology

Cloud Penetration Testing Methodology

Report Writing and Post Testing Actions 


Schedule & Register

Schedule Only



In order to register for a class, you need to first create a Dell Education account

If you need further assistance, contact us