Course List

  • Home -
  • Course List

EC-Council Security Ananlyst

The ECSA program offers a seamless learning progress continuing where the CEH program left off.

course

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by-step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents  a  set  of  distinguishable  comprehensive  methodologies  that  are  able  to  cover  different pentesting requirements across different verticals.

It  is  a  highly  interactive,  comprehensive,  standards  based,  intensive  5-days  training  program  that teaches information security professionals how professional real-life penetration testing are conducted.

Building  on  the  knowledge,  skills  and  abilities  covered  in  the  new  CEH  v10  program,  we  have simultaneously re-engineered the ECSA program as a progression from the former.

Organizations  today  demand  a  professional  level  pentesting  program  and  not  just  pentesting programs that provide training on how to hack through applications and networks.Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and/or industry published pentesting frameworksThis  course  is  a  part  of  the  VAPT  Track  of  EC-Council.

This  is  a  “Professional”  level  course,  with  the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification. 

In the new ECSAv10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential.  This new credential allows employers to validate easily the skills of the student.

Course Outline

1.    Introduction to Penetration Testing and Methodologies
2.   Penetration Testing Scoping and Engagement Methodology
3.   Open Source Intelligence (OSINT) Methodology
4.   Social Engineering Penetration Testing Methodology
5.   Network Penetration Testing Methodology - External
6.   Network Penetration Testing Methodology - Internal
7.   Network Penetration Testing Methodology - Perimeter Devices
8.   Web Application Penetration Testing Methodology
9.   Database Penetration Testing Methodology
10. Wireless Penetration Testing Methodology
11.  Cloud Penetration Testing Methodology
12.  Report Writing and Post Testing Actions

Self Sudy Modules

1.    Penetration Testing Essential Concepts 
This is an Essential Prerequisite as it helps you to 
prepares you the ECSA courseware. Serves as a base 
to build Advanced Pen Testing Concepts
2.   Password Cracking Penetration Testing 
3.   Denial-of-Service Penetration Testing 
4.   Stolen Laptop, PDAs and Cell Phones Penetration Testing 
5.   Source Code Penetration Testing
6. Physical Security Penetration Testing 
6.   Surveillance Camera Penetration Testing 
7.   VoIP Penetration Testing 
8.   VPN Penetration Testing 
9.   Virtual Machine Penetration Testing 
10. War Dialing 
11.  Virus and Trojan Detection 
12.  Log Management Penetration Testing 
13.  File Integrity Checking 
14.  Telecommunication and Broadband Communication Penetration Testing 
15.  Email Security Penetration Testing 
16.  Security Patches Penetration Testing 
17.  Data Leakage Penetration Testing 
18.  SAP Penetration Testing 
19.  Standards and Compliance 
20. Information System Security Principles 
21.  Information System Incident Handling and Response 
22. Information System Auditing and Certification

Багшийн CV шууд үзэх

Instructor Certificate List:

  • Microsoft Certified Trainer [MCT]
  • Certified EC-Council Instructor [CEI]
  • EC-Council Circle Of Excellence Instructor 

 

Certificate List:

  • Certified Ethical Hacker [CEH]
  • EC-Council Certified Security Analyst [ECSA]
  • Certified Hacking Forensic Investigator [CHFI]
  • EC-Council Disaster Recovery Professional [EDRP]
  • EC-Council Certified Network Defender [CND]
  • EC-Council Certified Secure Computer User [CSCU]
  • CAST 612 Mobile Hacking and Forensics Microsoft Certified IT Professional [MCITP]
  • Application Security
  • Microsoft Certified Solution Associate [MCSA]
  • Server Virtualization with Windows Server Hyper-V and
  • System Center
  • Vmware Certified Professional [VCP]
  • Certified Lead Security Incident Professional
  • Comptia Security+
  • Symantec Endpoint Protection
  • Symantec NetBackup
  • Veeam Certified Engineer
  • CAST -611,614
  • ISTQB