EC Council Certified Security Analyst (ECSA)
An Introduction to the Premier Pen Testing Information Security:
This course is the intermediate level of an advanced level which demonstrates the investigative approach to the ethical hacking. While in the basic level Certified Ethical Hacker (CEH) Certification, we learn about the hacking tools and techniques, the intermediate level prepares us to extensively analyze the results of the hacking tools. It helps us in carrying out the assessments required to effectively find out and mitigate the risks to infrastructure.
This certification adds value to the Information Security Professionals by giving them a practically oriented approach to the penetration testing. A successful completion of this Certification makes you eligible to appear for the most coveted and advanced certification for security professionals, the Licensed Penetration Tester (LPT) Certification.
Advanced Penetration Testing and Security Analysis:
This program introduces us to the intricacies of the hacking tools and technologies. It teaches the Information Security Professionals to traverse beyond merely running the tools, to practically provide the countermeasures, detection and protection measures for the vulnerabilities that they locate using the available tools. This course about Security Analysis gives you a applied as well as legal perspective of designing, securing and testing the network architecture to make it impermeable for the external malicious crackers and hackers. Most interesting part of the program is where they learn how to eliminate the risks altogether, with the courseware providing a bird-eye’s view of the networking environment.
Advantages of ECSA Certification:
1. This certification is creatively designed by the best professionals in the security domain and is meant for the experienced candidates.
2. ECSA certified professionals are considered as a seasoned security professional and relish a wider industrial acceptance.
3. Learning curve spans from in-depth analysis of the outcomes from the security tools and security testing techniques to the critical suggestions provided for the mitigation of risks involved.
Pen Testing Training – Target Audience
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Administrators
- Security Testers
- System Administrators
- Risk Assessment Professionals
1.Security Analysis and Penetration Testing Methodologies
2.TCP IP Packet Analysis
3.Pre-penetration Testing Steps
4.Information Gathering Methodology
6.External Network Penetration Testing Methodology
7.Internal Network Penetration Testing Methodology
8.Firewall Penetration Testing Methodology
9.IDS Penetration Testing Methodology
10.Web Application Penetration Testing Methodology
11.SQL Penetration Testing Methodology
12.Database Penetration Testing Methodology
13.Wireless Network Penetration Testing Methodology
14.Mobile Devices Penetration Testing Methodology
15.Cloud Penetration Testing Methodology
16.Report Writing and Post Test Actions
1.Password Cracking Penetration Testing
2.Router and Switches Penetration Testing
3.Denial-of-Service Penetration Testing
4.Stolen Laptop, PDAs and Cell Phones Penetration Testing
5.Source Code Penetration Testing
6.Physical Security Penetration Testing
7.Surveillance Camera Penetration Testing
8.VoIP Penetration Testing
9.VPN Penetration Testing
10.Virtual Machine Penetration Testing
12.Virus and Trojan Detection
13.Log Management Penetration Testing
14.File Integrity Checking
15.Telecommunication and Broadband Communication Penetration Testing
16.Email Security Penetration Testing
17.Security Patches Penetration Testing
18.Data Leakage Penetration Testing
19.SAP Penetration Testing
20.Standards and Compliance
21.Information System Security Principles
22.Information System Incident Handling and Response
23.Information System Auditing and Certification
ECSA - What’s Next?
This Certification makes you eligible to appear for the course at the zenith of the security domain, Licensed Penetration Tester (LPT). Basic eligibility criteria for the LPT is both Certified Ethical Hacker (CEH) and ECSA Certification.