Introduction:
Certified Security Analyst Training (ECSA) Course with Hands-On Labs (Online or Classroom Live)
The EC-Council Certified Security Analyst Training (ECSA) penetration testing course provides you with a real-world hands-on penetration testing experience and is a globally accepted hacking and penetration testing course that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The training exercises and class material takes the tools and techniques that are reviewed in the Certified Ethical Hacker (CEH) course and teaches students how to apply these skills/tools by utilizing EC-Council’s published penetration testing methodology.
Aside from a reserved seat in an official prep course for the ECSA certification, the resources provided to students with registration include official EC-Council courseware along with an ECSA exam voucher. When you combine the instructor-led training with the included course resources, this official EC-Council class is a great learning tool for those interested in reviewing how to apply hacking skills in a pen test scenario and gaining the ECSA certification.
In the new Certified Security Analyst Certification (ECSA) v10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential. This new credential allows employers to validate easily the skills of the student.
Your Registration Includes
- 5 Days of ECSA Training from an Authorized EC-Council Instructor
- Official EC-Council ECSA Training Courseware
- Official EC-Council ECSA Training Lab Manual
- Official EC-Council ECSA Tools
- ECSA certification Exam voucher
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
Duration: 5 days
Related Courses:
- Cybersecurity Foundations
- CISSP Certification Training | Certified Information Systems Security Professional
- CISA Certification Training | Certified Information Systems Auditor
- CISM Certification Training | Certified Information Security Manager
- CIPP Certification Training | Certified Information Privacy Professional
- CSSLP Certification Training | Certified Secure Software Lifecycle Professional Training
Resources:
- Certified Security Analyst Training (ECSA) Study Guide by EC-Council Press Series – Barnesandnoble.com
- Certified Security Analyst (ECSA) Study Guide by EC-Council – Paperback/Barnes & Noble
- EC-Council Certified Security Analyst (ECSA) Study Guide by EC-Council – Paperback/Kindle – Amazon
- EC-Council Certified Security Analyst Training (ECSA) Guide by EC-Council – Hardcover /Amazon
- EC-Council Certified Security Analyst Training (ECSA) Complete Guide By: EC-Council – Hardcover/vitalsource.com
Certified Security Analyst Training (ECSA) – Customize It:
- If you are familiar with some aspects of EC-Council Certified Security Analyst Training (ECSA), we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Certified Security Analyst (ECSA) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Security Analyst (ECSA) course in manner understandable to lay audiences.
Certified Security Analyst Training (ECSA) – Audience / Target Group:
The intended audience for our EC-Council Certified Security Analyst (ECSA) program is an IT professional who is focused on ethical hacking, specifically those who are involved with penetration testing. ECSA is generally a great fit for those working in roles such as, but not limited to:
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment Professionals
Certified Security Analyst Training (ECSA) – Prerequisites:
The knowledge and skills that a learner must have before attending this EC-Council Certified Security Analyst (ECSA) course are as follows:
- To sit for the exam, one must have either attended a training course at an approved center or validate two years of information security experience. Needless to say, attending the training course is often easier.
- While they do not technically have to have the CEH (Certified Ethical Hacker) certification, it is highly recommended. This is also a good certification for anyone going into cyber security. Note that the CEH does have the EC-Council Network Security Administrator (ENSA) credential as a prerequisite.
Certified Security Analyst Training (ECSA) – Objectives:
This official EC-Council Certified Security Analyst Training (ECSA) seminar reviews all 12 comprehensive modules that were created by EC-Council for ECSA, ensuring our students successfully prepare for the ECSA certification exam while also enhancing their overall competencies in ethical hacking and penetration testing.
- Module 1: Introduction to Penetration Testing and Methodologies
- Module 2: Penetration Testing Scoping and Engagement Methodology
- Module 3: Open Source Intelligence (OSINT) Methodology
- Module 4: Social Engineering Penetration Testing Methodology
- Module 5: Network Penetration Testing Methodology – External
- Module 6: Network Penetration Testing Methodology – Internal
- Module 7: Network Penetration Testing Methodology – Perimeter Devices
- Module 8: Web Application Penetration Testing Methodology
- Module 9: Database Penetration Testing Methodology
- Module 10: Wireless Penetration Testing Methodology
- Module 11: Cloud Penetration Testing Methodology
- Module 12: Report Writing and Post Testing Actions
Certified Security Analyst Training (ECSA) – Course Syllabus:
- The Need for Security Analysis
- Advanced Googling
- TCP/IP Packet Analysis
- Advanced Sniffing Techniques
- Vulnerability Analysis with Nessus
- Advanced Wireless Testing
- Designing a DMZ
- Snort Analysis
- Log Analysis
- Advanced Exploits and Tools
- Pen Testing Methodologies
- Customers and Legal Agreements
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre Penetration Testing Checklist
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Routers and Switches Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Wireless Network Penetration Testing
- Denial of Service Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Stolen Laptop, PDAs and Cell phones Penetration Testing
- Application Penetration Testing
- Physical Security Penetration Testing
- Database Penetration testing
- VoIP Penetration Testing
- VPN Penetration Testing
- War Dialing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Blue Tooth and Handheld Device Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- Penetration Testing Deliverables and Conclusion
- Penetration Testing Report and Documentation Writing
- Penetration Testing Report Analysis
- Post Testing Actions
- Ethics of a Licensed Penetration Tester
- Standards and Compliance
Certified Security Analyst Training (ECSA) Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help!
Request More Information