EC-Council Certified Security Analyst – ECSA v9
COURSE OVERVIEW
The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques you learned in the Certied Ethical Hacker course
(CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology
It is a highly interactive, comprehensive, standards-based and methodology intensive training program 5-day security class which teaches information security professionals to conduct real life penetration tests.
This course is the part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certied Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certication.
DURATIONS: 40 Hours (5 days)
AUDIENCE:
CERTIFICATION
Upon completion of this course, students will receive the Certificate of Completion from SmartPro.
EXAM
- Number of Questions: 150
- Passing Score: 70%
- Test Duration: 4 hours
- Test Format: MCQ
- Test Delivery: EC-Council exam portal or Pearson VUE
COURSE TOPICS
Module 01: Security Analysis and Penetration Testing Methodologies
Module 02: TCP/IP Packet Analysis
Module 03: Pre-penetration Testing Steps
Module 04: Information Gathering Methodology
Module 05: Vulnerability Analysis
Module 06: External Network Penetration Testing Methodology
Module 07: Internal Network Penetration Testing Methodology
Module 08: Firewall Penetration Testing Methodology
|
Module 09: IDS Penetration Testing
Module 10: Web Application Penetration Testing Methodology
Module 11: SQL Penetration Testing Methodology
Module 12: Database Penetration Module 11: SQL Penetration Testing Methodology
Testing Methodology
Module 13: Wireless Network Penetration Testing Methodology
Module 14: Mobile Devices Penetration Testing Methodology
Module 15: Cloud Penetration Testing Methodology
Module 16: Report Writing and Post Test Actions
|