Overview
Courses Benefits
EC-Council Certified Security Analyst v10 (ECSA) is an advanced ethical hacking training certification that complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. ECSA will not only expose the learner to hacking tools and technologies but will take it a step further by exploring how to analyze the outcome from these tools and technologies.The ECSA certification will lead you to the Licensed Penetration Tester certification.
EC-Council is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 60 countries through a training network of more than 450 training partners globally.
ActiveLearning is an Authorized Training Partner of EC-Council in the Philippines.
You Will Learn How To
- How to design, secure and test networks
- Perform the intensive assessments to identify and mitigate risks to the IT infrastructure
- Identify security problems and how to avoid and eliminate them
Who Should Attend
This ECSA course will significantly benefit the following:
- Network server administrators,
- Firewall Administrators
- Security Testers
- System Administrators
- Risk Assessment professionals
- Penetration Testers
Course Outline
- The Need for Security Analysis
- Advanced Googling
- TCP/IP Packet Analysis
- Advanced Sniffing Techniques
- Vulnerability Analysis with Nessus
- Advanced Wireless Testing
- Designing a DMZ
- Snort Analysis
- Log Analysis
- Advanced Exploits and Tools
- Penetration Testing Methodologie
- Customers and Legal Agreements
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre Penetration Testing Checklist
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Routers and Switches Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Wireless Network Penetration Testing
- Denial of Service Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Stolen Laptop, PDAs and Cell phones Penetration Testing
- Application Penetration Testing
- Physical Security Penetration Testing
- Database Penetration testing
- VoIP Penetration Testing
- VPN Penetration Testing
- War Dialing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Blue Tooth and Hand held Device Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- Penetration Testing Deliverables and Conclusion
- Penetration Testing Report and Documentation Writing
- Penetration Testing Report Analysis
- Post Testing Actions
- Ethics of a Licensed Penetration Tester
- Standards and Compliance