EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)

Technology : EC Council

Course Brief

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

  • Focuses on pentesting methodology with an emphasis on hands-on learning
  • The exam will now have a prerequisite of submitting a pentesting report
  • The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification

Topics
Security Analysis and Penetration Testing Methodologies
TCP IP Packet Analysis
Pre-penetration Testing Steps
Information Gathering Methodology
Vulnerability Analysis
External Network Penetration Testing Methodology
Internal Network Penetration Testing Methodology
Firewall Penetration Testing Methodology
IDS Penetration Testing Methodology
Web Application Penetration Testing Methodology
SQL Penetration Testing Methodology
Database Penetration Testing Methodology
Wireless Network Penetration Testing Methodology
Mobile Devices Penetration Testing Methodology
Cloud Penetration Testing Methodology
Report Writing and Post Test Actions
Start Date End Date Timing Duration

Full Name

Email

Phone

Course Name

Select Schedule

Select Program