EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) Training in United Kingdom (UK)
EC-Council Certified Security Analyst (ECSA)
  • EC-Council Certified Security Analyst (ECSA)

    5 Days Course
    Network Security
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    Reviews

    Course Details

    Overview

    EC-Council Certified Security Analyst course enhances the key skills of the penetration testers and equips them with comprehensive know-how of the practical implementation of penetration testing and its various techniques. The participants will conduct the penetration testing on a company having varied departments with multiple servers and subnetworks, operating systems and which are full proofed with both militarized and non-militarized defense architectures.

    Objectives

    The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

    • Focuses on pentesting methodology with an emphasis on hands-on learning
    • The exam will now have a prerequisite of submitting a pentesting report
    • The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification

    Outline

    • Security Analysis and Penetration Testing Methodologies
    • TCP IP Packet Analysis
    • Pre-penetration Testing Steps
    • Information Gathering Methodology
    • Vulnerability Analysis
    • External Network Penetration Testing Methodology
    • Internal Network Penetration Testing Methodology
    • Firewall Penetration Testing Methodology
    • IDS Penetration Testing Methodology
    • Web Application Penetration Testing Methodology
    • SQL Penetration Testing Methodology
    • Database Penetration Testing Methodology
    • Wireless Network Penetration Testing Methodology
    • Mobile Devices Penetration Testing Methodology
    • Cloud Penetration Testing Methodology
    • Report Writing and Post Test Actions

    Target Audience

    • Ethical Hackers
    • Penetration Testers
    • Network server administrators
    • Firewall Administrators
    • Security Testers
    • System Administrators and Risk Assessment professionals

    Course Schedule

      Dec 25 - Dec 29, 2017
    London
      Mar 26 - Mar 30, 2018
    London
      Jun 25 - Jun 29, 2018
    London
      Sep 24 - Sep 28, 2018
    London
      Dec 24 - Dec 28, 2018
    London