Your Cart Is Empty
Home > Technical Courses > Cyber Security > EC-Council Certified Security Analyst (ECSA)
This ECSA penetration testing course provides you with a hands-on penetration testing experience while you prepare to take the ESCA exam.
The EC-Council Certified Security Analyst (ECSA) certification is one of the most prestigious security credentials. This ECSA penetration testing course provides you with a hands-on penetration testing experience while you prepare to take the ESCA exam. Improve your ethical hacking skills by gaining skills in EC-Council’s published penetration testing methodology.Included with this course is an EC-Council ECSA exam voucher that enables you to take the exam remotely.Certification Voucher ExtensionsEC-Council is extending expiration dates on ALL ECC Exam Vouchers by 90 days at no cost, to ensure everyone has the appropriate time to prepare for their certification exams.
Category
ID
Duration
Level
Price
Cyber Security
13555
5 Day(s)
Intermediate
$3,375.00
Objectives
Certification ExamThe ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing methodologies.To be eligible to take this exam, you are required to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found. This report will be graded by our professionals. Candidates that successfully submit an acceptable report will proceed on to a multiple-choice exam that tests a candidate’s knowledge.Candidates that successfully pass the multiple-choice exam will be awarded the ECSA credential.
Course Outline1. Security Analysis and Penetration Testing Methodologies2. TCP IP Packet Analysis3. Pre-penetration Testing Steps4. Information Gathering Methodology5. Vulnerability Analysis6. External Network Penetration Testing Methodology7. Internal Network Penetration Testing Methodology8. Firewall Penetration Testing Methodology9. IDS Penetration Testing Methodology
10. Web Application Penetration Testing Methodology11. SQL Penetration Testing Methodology12. Database Penetration Testing Methodology13. Wireless Network Penetration Testing Methodology14. Mobile Devices Penetration Testing Methodology15. Cloud Penetration Testing Methodology16. Report Writing and Post Test ActionsSelf-Study Modules1. Password Cracking Penetration Testing2. Router and Switches Penetration Testing3. Denial-of-Service Penetration Testing4. Stolen Laptop, PDAs and Cell Phones Penetration Testing5. Source Code Penetration Testing6. Physical Security Penetration Testing7. Surveillance Camera Penetration Testing8. VoIP Penetration Testing9. VPN Penetration Testing10. Virtual Machine Penetration Testing11. War Dialing12. Virus and Trojan Detection13. Log Management Penetration Testing14. File Integrity Checking15. Telecommunication and Broadband Communication Penetration Testing16. Email Security Penetration Testing17. Security Patches Penetration Testing18. Data Leakage Penetration Testing19. SAP Penetration Testing20. Standards and Compliance21. Information System Security Principles22. Information System Incident Handling and Response23. Information System Auditing and Certi¬cationNote: Self-study modules are available in ASPEN portal
Questions?
EC-Council Certified Security Analyst Certification
Certified Ethical Hacker (CEH) certification is not required but strongly recommended as a prerequisite to attending this course.
Productivity Point Learning Solutions evolved out of a desire to increase our outreach both nationally and internationally.
Productivity Point Headquarters 1580 Sawgrass Corporate Parkway Suite 205 Sunrise, Florida 33323 United States
Contact T 1-844-238-8607 P 1-954-425-6141 F 1-954-928-9057 E info@productivitypointls.com