Hacker School

  Hyderabad: +91-9618070760, +91-40-42224138  |  Bangalore: +91-9900343000, +91-80-42024031
                 
  • FacebookTwitterGoogle+

EC Council Certified Security Analyst (ECSA)

 

An Introduction to the Premier Pen Testing Information Security:

This course is the intermediate level of an advanced level which demonstrates the investigative approach to the ethical hacking. While in the basic level Certified Ethical Hacker (CEH) Certification, we learn about the hacking tools and techniques, the intermediate level prepares us to extensively analyze the results of the hacking tools. It helps us in carrying out the assessments required to effectively find out and mitigate the risks to infrastructure.

This certification adds value to the Information Security Professionals by giving them a practically oriented approach to the penetration testing. A successful completion of this Certification makes you eligible to appear for the most coveted and advanced certification for security professionals, the Licensed Penetration Tester (LPT) Certification.

Advanced Penetration Testing and Security Analysis:

This program introduces us to the intricacies of the hacking tools and technologies. It teaches the Information Security Professionals to traverse beyond merely running the tools, to practically provide the countermeasures, detection and protection measures for the vulnerabilities that they locate using the available tools. This course about Security Analysis gives you a applied as well as legal perspective of designing, securing and testing the network architecture to make it impermeable for the external malicious crackers and hackers. Most interesting part of the program is where they learn how to eliminate the risks altogether, with the courseware providing a bird-eye’s view of the networking environment.

Advantages of ECSA Certification:

1. This certification is creatively designed by the best professionals in the security domain and is meant for the experienced candidates.
2. ECSA certified professionals are considered as a seasoned security professional and relish a wider industrial acceptance.
3. Learning curve spans from in-depth analysis of the outcomes from the security tools and security testing techniques to the critical suggestions provided for the mitigation of risks involved. 

Pen Testing Training – Target Audience

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment Professionals

 

Course Modules:

1.Security Analysis and Penetration Testing Methodologies

2.TCP IP Packet Analysis

3.Pre-penetration Testing Steps

4.Information Gathering Methodology

5.Vulnerability Analysis

6.External Network Penetration Testing Methodology

7.Internal Network Penetration Testing Methodology

8.Firewall Penetration Testing Methodology

9.IDS Penetration Testing Methodology

10.Web Application Penetration Testing Methodology

11.SQL Penetration Testing Methodology

12.Database Penetration Testing Methodology

13.Wireless Network Penetration Testing Methodology

14.Mobile Devices Penetration Testing Methodology

15.Cloud Penetration Testing Methodology

16.Report Writing and Post Test Actions

 

Self-Study Modules:

1.Password Cracking Penetration Testing

2.Router and Switches Penetration Testing

3.Denial-of-Service Penetration Testing

4.Stolen Laptop, PDAs and Cell Phones Penetration Testing

5.Source Code Penetration Testing

6.Physical Security Penetration Testing

7.Surveillance Camera Penetration Testing

8.VoIP Penetration Testing

9.VPN Penetration Testing

10.Virtual Machine Penetration Testing

11.War Dialing

12.Virus and Trojan Detection

13.Log Management Penetration Testing

14.File Integrity Checking

15.Telecommunication and Broadband Communication Penetration Testing

16.Email Security Penetration Testing

17.Security Patches Penetration Testing

18.Data Leakage Penetration Testing

19.SAP Penetration Testing

20.Standards and Compliance

21.Information System Security Principles

22.Information System Incident Handling and Response

23.Information System Auditing and Certification

 

ECSA - What’s Next?

This Certification makes you eligible to appear for the course at the zenith of the security domain, Licensed Penetration Tester (LPT).  Basic eligibility criteria for the LPT is both Certified Ethical Hacker (CEH) and ECSA Certification.

You are here: Home Certifications EC-Council Certified Security Analyst (ECSA)
Quick Inquiry Form