Course:EC Council Certified Security Analyst (ECSA)

Duration: 40 Hours

About this course:

         If you possess sound knowledge of security or have CEH certification you are ready to opt for ECSA course. Since EC Council Certified Security Analyst, ECSA is an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking.

         While the Certified Ethical Hacker certification exposes the delegate to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing methods and techniques, this pen testing computer security certification helps delegates perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.

         This makes the Certified Security Analyst 'Pen Testing' certification a relevant milestone toward achieving EC Council's Licensed Penetration Tester, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.

         The objective of Certified Security Analyst 'pen testing' certification is to add value to experienced Information security professionals by providing computer security training that will help them analyze the outcomes of their Vulnerability Assessments. Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking.

Target Audience:

          » Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.

          » This certification is a pre-requisite to EC-Council's Licensed Penetration Tester Program.


                  Do I have to be CEH to Attempt the ECSA Certification?? No. While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to attain the CEH certification prior to the commencement of the ECSA course .

Course Outline:
Modules :

           The Need for Security Analysis

           Advanced Googling

           TCP/IP Packet Analysis

           Advanced Sniffing Techniques

           Vulnerability Analysis with Nessus

           Advanced Wireless Testing

           Designing a DMZ

           Log Analysis

           Advanced Exploits and Tools

           Pen Testing Methodologies

           Customers and Legal Agreements

           Rules of Engagement

           Penetration Testing Planning and Scheduling

           Pre Penetration Testing Checklist

           Information Gathering

           Vulnerability Analysis

           External Penetration Testing

           Internal Network Penetration Testing

           Routers and Switches Penetration Testing

           Firewall Penetration Testing

           IDS Penetration Testing

           Wireless Network Penetration Testing

           Denial of Service Penetration Testing

           Password Cracking Penetration Testing

           Social Engineering Penetration Testing

           Stolen Laptop, PDAs and Cell phones Penetration Testing

           Application Penetration Testing

           Physical Security Penetration Testing

           Database Penetration testing

           VPN Penetration Testing

           War Dialing

           Virus and Trojan Detection

           Log Management Penetration Testing

           File Integrity Checking

           Blue Tooth and Hand held Device Penetration Testing

           Telecommunication and Broadband Communication Penetration Testing

           Email Security Penetration Testing

           Security Patches Penetration Testing

           Data Leakage Penetration Testing

           Penetration Testing Deliverables and Conclusion

           Penetration Testing Report and Documentation Writing

           Penetration Testing Report Analysis

           File Integrity Checking

           Ethics of a Licensed Penetration Tester

           Standards and Compliance

Delivery method: Classroom / Attend from Anywhere

Contact Us

Note : In this demo, we have stopped email sending functionality.