ECSA Certification Training | EC-Council Certified Security Analyst Training

ECSA Certification Training | EC-Council Certified Security Analyst Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

ECSA Certification Training | EC-Council Certified Security Analyst Training Course Hands-on

The ECSA Certification Training | EC-Council Certified Security Analyst Training v8 (ECSA) program teaches information security professionals to conduct realistic penetration tests by using EC-Council’s published penetration testing methodology. This ECSA Certification Training | EC-Council Certified Security Analyst Training v8 course is a five-day hands-on training program that uses real-time scenarios. In this ECSA Certification Training | EC-Council Certified Security Analyst Training v8 course, you will learn about penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.

Customize It:

• If you are familiar with some aspects of this ECSA Certification Training | EC-Council Certified Security Analyst Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the ECSA Certification Training | EC-Council Certified Security Analyst Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the ECSA Certification Training | EC-Council Certified Security Analyst Training course in manner understandable to lay audiences.

Related Courses:

CSFI-CSCOE | Certified SCADA Cyberspace Operations Engineer Training
CSFI-CSCOE | Certified SCADA Cyberspace Operations Engineer Training

Prerequisites:

While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement of the ECSA course.

Audience / Target Group:

The target audience for this ECSA Certification Training | EC-Council Certified Security Analyst Training course:

• Network server administrators
• Firewall administrators
• Information security analysts
• System administrators
• Risk assessment professionals

What You Will Learn:

Upon completing this ECSA Certification Training | EC-Council Certified Security Analyst Training course, learners will be able to meet these objectives:

• Perform network and application penetration testing using both automated and manual techniques
• Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats
• Assess assigned system to determine system security status
• Design and recommend security policies and procedures
• Ensure compliance to policies and procedures
• Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases
• Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management
• Respond to more complex queries and request for computer security information and report from both internal and external customers

ECSA Certification Training | EC-Council Certified Security Analyst Training – Course Syllabus:

Core Modules

1. Need for Security Analysis
2. TCP IP Packet Analysis
3. Penetration Testing Methodologies
4. Customers and Legal Agreements
5. Rules of Engagement
6. Penetration Testing Planning and Scheduling
7. Pre-penetration Testing Steps
8. Information Gathering
9. Vulnerability Analysis
10. External Penetration Testing
11. Internal Network Penetration Testing
12. Firewall Penetration Testing
13. IDS Penetration Testing
14. Password Cracking Penetration Testing
15. Social Engineering Penetration Testing
16. Web Application Penetration Testing
17. SQL Penetration Testing
18. Penetration Testing Reports and Post Testing Actions

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

Location

If multiple locations, please list in the additional comments field.

On-site
Virtual


Public Training Schedule
Private Group Training

Print Friendly, PDF & Email