EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct realistic penetration tests by using EC-Council's published penetration testing methodology. This course is a five-day hands-on training program that uses real-time scenarios. In this course, you will learn about penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally. Why EC-Council Certified Security Analyst is Best Presents industry accepted comprehensive penetration testing standards on 44 domains Covers advanced topics such as mobile, cloud, and virtual machine penetration testing Completely maps to the National Initiative for Cybersecurity Education (NICE)'s workforce framework, which includes: Protect and defend Operate and collect Analyze specialty area Covers all the requirements of National Information Assurance Training Standard For Information Systems Security Officers (CNSS - 4014) and National Training Standard for System Certifiers (NSTISSI - 4015) Benefits of Becoming ECSA Data security program-advanced penetration testing The curriculum is backed by and designed by the best in the field Students earn greater industry acceptance as seasoned security professionals Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques. The ECSA sets students on the path toward achieving the LPT certification Certification: EC-Council Certified Security Analyst (ECSA) Licensed Penetration Tester (LPT) The ECSA program provides one voucher to sit for the ECSA v8 exam. The ECSA certificate is provided on successfully passing the online ECSA exam. The ECSA sets students on the path toward achieving the Licensed Penetration Tester (LPT) certification. Skills Gained
Perform network and application penetration testing using both automated and manual techniques Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats Assess assigned system to determine system security status Design and recommend security policies and procedures Ensure compliance to policies and procedures Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management Respond to more complex queries and request for computer security information and report from both internal and external customers Who Can Benefit Network server administrators Firewall administrators Information security analysts System administrators Risk assessment professionals Prerequisites While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement of the ECSA course. Course Details Core Modules 1. Need for Security Analysis 2. T CP IP Packet Analysis 3. Penetration Testing Methodologies 4. Customers and Legal Agreements 5. Rules of Engagement 6. Penetration Testing Planning and Scheduling 7. Pre-penetration Testing Steps
8. Information Gathering 9. Vulnerability Analysis 10. External Penetration Testing 11. Internal Network Penetration Testing 12. Firewall Penetration Testing 13. IDS Penetration Testing 14. Password Cracking Penetration Testing 15. Social Engineering Penetration Testing 16. Web Application Penetration Testing 17. SQL Penetration Testing 18. Penetration Testing Reports and Post Testing Actions Self-Study Modules 19. Router and Switches Penetration Testing 20. Wireless Network Penetration Testing 21. Denial-of-Service Penetration Testing 22. Stolen Laptop, PDAs and Cell Phones Penetration Testing 23. Source Code Penetration Testing 24. Physical Security Penetration Testing 25. Surveillance Camera Penetration Testing 26. Database Penetration Testing 27. VoIP Penetration Testing 28. VPN Penetration Testing
29. Cloud Penetration Testing 30. Virtual Machine Penetration Testing 31. War Dialing 32. Virus and Trojan Detection 33. Log Management Penetration Testing 34. File Integrity Checking 35. Mobile Devices Penetration Testing 36. Telecommunication and Broadband Communication Penetration Testing 37. Email Security Penetration Testing 38. Security Patches Penetration Testing 39. Data Leakage Penetration Testing 40. SAP Penetration Testing 41. Standards and Compliance 42. Information System Security Principles 43. Information System Incident Handling and Response 44. Information System Auditing and Certification Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction. Lab 1: T CPIP Packet Analysis TCP/IP Packet Analysis Using Wireshark Lab 2: Information Gathering Information Gathering Lab 3: Vulnerability Analysis
Vulnerability Analysis Using the Nessus Tool Lab 4: External Penetration Testing Exploring and Auditing a Network Using Nmap ExitCertified Corporation and imvp are registered tradem arks of ExitCertified ULC and ExitCertified Corporation and Tech Data Corporation, respectively Copyright 2018 Tech Data Corporation and ExitCertified ULC & ExitCertified Corporation. All Rights Reserved. Generated Mar 6 2:43:00 UTC 2018