You are an ethical hacker. Probably a Certified Ethical Hacker. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge, an arsenal of hacking tools and are also proficient in writing custom hacking code. But is that enough?
Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client?
ANALYZE. SECURE. DEFEND.
The ECSA penetration testing course provides you with real world hands-on penetration testing experience. This globally accepted hacking and penetration testing class covers the testing of modern infrastructures, operating systems and application environments while teaching students how to document and write a penetration testing report.
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH), further enhancing your ability and fully exploiting your knowledge by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.
- Instructor-led Classroom Training (by EC-Council Certified Instructors)
- Official EC-Council Courseware
- iLabs, Online Labs (6 Months Access)
- Certification Exam Voucher
- Test Preparation Program
- Certificate of Attendance
- Extra training hours (48 hours instead of 40)
Who is it for?
Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals.
While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to take the Certified Ethical Hacker v10 course and obtain the CEH prior to the commencement of the ECSA course.
Outline of ECSA v10
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement Methodology
- Open Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Network Penetration Testing Methodology - External
- Network Penetration Testing Methodology - Internal
- Network Penetration Testing Methodology - Perimeter Devices
- Web Application Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Testing Actions
Professional penetration testers are required to continue learning throughout their career, closely engaging in and keeping informed with the rapidly changing cybersecurity industry. To enable continuous learning, the ECSA course comes packed with the following self-study resources.
- Penetration Testing Essential Concepts
- Password Cracking Penetration Testing
- Denial-of-Service Penetration Testing
- Stolen Laptop, PDAs and Cell Phones Penetration Testing
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Virtual Machine Penetration Testing
- War Dialing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Standards and Compliance
- Information System Security Principles
- Information System Incident Handling and Response
- Information System Auditing and Certification
Exam Title: Certified Security Analyst v10 (ECSA v10 Exam)
|Instruction Languages||EL, EN|
|Certificate of Attendance||Yes|
|Certification Track||Certified Security Analyst v10|
|Partner Institution||EC Council|
|Days and Hours||Start Date||End Date||Hours per Week|
|Tuesday & Thursday, 18:00-22:00||02/04/2019||23/05/2019||8|