EC-Council - EC-Council Certified Security Analyst (ECSA) v8
Code: 3402
Length: 5 days
URL: View Online
The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct realistic
penetration tests by using EC-Council's published penetration testing methodology.
This course is a five-day hands-on training program that uses real-time scenarios. In this course, you will learn about penetration
testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.
Why EC-Council Certified Security Analyst is Best
Presents industry accepted comprehensive penetration testing standards on 44 domains
Covers advanced topics such as mobile, cloud, and virtual machine penetration testing
Completely maps to the National Initiative for Cybersecurity Education (NICE)'s workforce framework, which includes:
Protect and defend
Operate and collect
Analyze specialty area
Covers all the requirements of National Information Assurance Training Standard For Information Systems Security Officers
(CNSS - 4014) and National Training Standard for System Certifiers (NSTISSI - 4015)
Benefits of Becoming ECSA
Data security program-advanced penetration testing
The curriculum is backed by and designed by the best in the field
Students earn greater industry acceptance as seasoned security professionals
Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques.
The ECSA sets students on the path toward achieving the LPT certification
Certification:
EC-Council Certified Security Analyst (ECSA)
Licensed Penetration Tester (LPT)
The ECSA program provides one voucher to sit for the ECSA v8 exam. The ECSA certificate is provided on successfully passing
the online ECSA exam. The ECSA sets students on the path toward achieving the Licensed Penetration Tester (LPT) certification.
Suggested Audience
Skills Gained
Perform network and application penetration testing using both automated and manual techniques
Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both
internal and external threats
Assess assigned system to determine system security status
Design and recommend security policies and procedures
Ensure compliance to policies and procedures
Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and
databases
Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary
and provide an analysis summary for management
Respond to more complex queries and request for computer security information and report from both internal and external
customers
Who Can Benefit
Network server administrators
Firewall administrators
Information security analysts
System administrators
Risk assessment professionals
Prerequisites
While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to
take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement of the ECSA course.
Course Details
Core Modules
1. Need for Security Analysis
2. TCP IP Packet Analysis
3. Penetration Testing Methodologies
4. Customers and Legal Agreements
5. Rules of Engagement
6. Penetration Testing Planning and Scheduling
7. Pre-penetration Testing Steps
8. Information Gathering
9. Vulnerability Analysis
10. External Penetration Testing
11. Internal Network Penetration Testing
12. Firewall Penetration Testing
13. IDS Penetration Testing
14. Password Cracking Penetration Testing
15. Social Engineering Penetration Testing
16. Web Application Penetration Testing
17. SQL Penetration Testing
18. Penetration Testing Reports and Post Testing Actions
Self-Study Modules
19. Router and Switches Penetration Testing
20. Wireless Network Penetration Testing
21. Denial-of-Service Penetration Testing
22. Stolen Laptop, PDAs and Cell Phones Penetration Testing
23. Source Code Penetration Testing
24. Physical Security Penetration Testing
25. Surveillance Camera Penetration Testing
26. Database Penetration Testing
27. VoIP Penetration Testing
28. VPN Penetration Testing
29. Cloud Penetration Testing
30. Virtual Machine Penetration Testing
31. War Dialing
32. Virus and Trojan Detection
33. Log Management Penetration Testing
34. File Integrity Checking
35. Mobile Devices Penetration Testing
36. Telecommunication and Broadband Communication Penetration Testing
37. Email Security Penetration Testing
38. Security Patches Penetration Testing
39. Data Leakage Penetration Testing
40. SAP Penetration Testing
41. Standards and Compliance
42. Information System Security Principles
43. Information System Incident Handling and Response
44. Information System Auditing and Certification
Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no
required instructor or administrative interaction.
Lab 1: TCPIP Packet Analysis
TCP/IP Packet Analysis Using Wireshark
Lab 2: Information Gathering
Information Gathering
Lab 3: Vulnerability Analysis
Vulnerability Analysis Using the Nessus Tool
Lab 4: External Penetration Testing
Exploring and Auditing a Network Using Nmap
ExitCertified® Corporation and iMVP® are registered trademarks of ExitCertified ULC and ExitCertified Generated 4
Corporation and Tech Data Corporation, respectively
Copyright ©2019 Tech Data Corporation and ExitCertified ULC & ExitCertified Corporation.
All Rights Reserved.