Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
RSA® Certification Program
The RSA Proven Professional Certification Program offers technology professionals the knowledge, skills and credentials necessary to become a trusted adviser in deploying and maintaining RSA security system platforms.
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning. The new ECSAv10 includes updated curricula and an industry recognized comprehensive stepby-step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges. Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals. It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted. idence.
Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals.
5 days (ILT)
Prior to exam, students must either:
• Attend official training via an EC-Council accredited training channel Or
• Possess a minimum of 2 years of working experience in a related InfoSec domain
Upon successful completion of this course, participants should be able to:
• Network Penetration Testing: Identify security issues in network design and implementation
• Web Application Penetration Testing: Detect security issues in web applications that exists due to insecure design and development practices
• Social Engineering Penetration Testing: Identify employees that do not properly authenticate, follow, validate, handle, the processes and technology
• Wireless Penetration Testing: Identify misconfigurations in organization’s wireless infrastructure including WLAN, Mobile,