Categories
Courses
EC-Council Certified Security Analyst training will help learners in teaching how to perform efficient and advanced penetration testing in an enterprise network environment that must be exploited, attacked, defended, and evaded. Learn the methodology for network, web application, database, wireless, and cloud pen testing, conducting pentest and its advanced methodologies, social engineering pen-testing.
4.5 (1634) 8750 Learner
This certification offers to take your skills to the next level by teaching and to master learners how to pen test OT systems, write your exploits, conduct advanced binaries exploitation, build your tools, double pivot to access hidden networks, and customize exploits/scripts for getting into the innermost segments of the server or network.
International industry expertise at your disposal as you deep-dive into the research topic and sector of your choice.
The EC-Council Certified Security Analyst (ECSA) course is a fully hands-on program with labs and exercises that cover real-world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to.
Information Security Officer
Network Administrator
Penetration Tester
Security Analyst
Systems Administrator
Computer Network Fundamentals
Network Security Controls and Devices
Windows and Linux Security
Web Application and Web Server Architecture and Operations
Web Application Security Mechanisms
Information Security Attacks
Information Security Standards
Penetration Testing Process
Methodologies & Benefits
Types, Areas and Selection of Pentesting
Penetration Testing Scoping and Rules and Engagement
Penetration Testing Engagement Contract and Preparation
OSINT Through World Wide Web (WWW), Website Analysis, DNS Interrogation
Social Engineering Penetration Testing Techniques & Steps
Social Engineering Penetration testing using E
External Network Information & Reconnaissance
Scanning, and Exploitation
Internal Network Information Reconnaissance and Scanning
Internal Network Enumeration and Vulnerability Scanning
Local and Remote System Exploitation
Firewall Security Assessment Techniques
iDs Security Assessment Techniques
Router and Switch Security Assessment Techniques
XSS, Parameter Tampering, Weak Cryptography, Security Misconfiguration
Client side scripting, vulnerabilities penetration techniques
Authentication, Authorization, session, Web Server Vulnerabilities Penetration Testing
Database Penetration Testing Techniques & Information Reconnaissance
Database Enumeration & Exploitation
WLAN Penetration Testing Techniques
RFID and NFC Penetration Testing Techniques
Mobile Device Penetration Testing Techniques
loT Penetration Testing Techniques
Cloud Specific Penetration Testing Techniques and Recommendations
Cloud Specific Penetration Testing Methods
Penetration Testing Report Writing Process
Penetration Testing Reporting Formats
EC-Council Certified Security Analyst (ECSA) Certification will allow individuals to enhance their skills and gain advanced knowledge in implementing details on security analysis, TCP/IP packet analysis, advanced googling, LPT methodologies, Log analysis, advanced sniffing techniques, snort analysis, vulnerability analysis with Nessus, designing a DMZ and advanced wireless techniques.
Who should take this course?
EC-Council Certified Security Analyst (ECSA) program is ideal for IT professionals who are already working or want to make a career as a professional
Prerequisites
There are prerequisites for becoming EC-Council Certified Security Analyst or Professional.
ECSA Exam:
ECSA (Practical) Exam:
Credit Towards Certification: ECSA
Number of Questions: 150
Passing score: 70%
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC Exam Portal
Speak with
Mail Us
Contact Us
Contact our customer support team for assistance.