About the course
EC-Council Certified Security Analyst
About this Course
Tech Type: Premium
Course Code: ECCSA
Duration: 5 Days
Events taking place after the 1st of May 2017 will no longer offer classroom examinations. You will receive your Pearson Vue exam voucher in your course fee, but will need to arrange this exam at Pearson Vue testing facility.
Please note - Commencing January 1st, 2019, EC-Council will no longer ship out physical certificates. EC-Council certified members can continue to download their e-Certificates from the ASPEN portal. Certified members who still wish to receive a physical certificate may request one via 'email@example.com'.
Printed certificate requests in the UK will cost $75 ($50 for the US).
EC Council Certified Security Analyst, ECSA is an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking.
While the Certified Ethical Hacker certification exposes the delegate to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing methods and techniques, this pen testing computer security certification helps delegates perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
This makes the Certified Security Analyst 'Pen Testing' certification a relevant milestone toward achieving EC Council's Licensed penetration Tester, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.
The objective of Certified Security Analyst 'pen testing' certification is to add value to experienced Information security professionals by providing computer security training that will help them analyze the outcomes of their Vulnerability Assessments. Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking.
- Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.
- This certification is a pre-requisite to EC-Council's Licensed Penetration Tester Program.
Do I have to be CEH to Attempt the ECSA Certification? No. While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to attain the CEH certification prior to the commencement of the ECSA course.
ECCSA Curriculum consists of instructor-led training.
The Need for Security Analysis
TCP/IP Packet Analysis
Advanced Sniffing Techniques
Vulnerability Analysis with Nessus
Advanced Wireless Testing
Designing a DMZ
Advanced Exploits and Tools
Pen Testing Methodologies
Customers and Legal Agreements
Rules of Engagement
Penetration Testing Planning and Scheduling
Pre Penetration Testing Checklist
External Penetration Testing
Internal Network Penetration Testing
Routers and Switches Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Wireless Network Penetration Testing
Denial of Service Penetration Testing
Password Cracking Penetration Testing
Social Engineering Penetration Testing
Stolen Laptop, PDAs and Cell phones Penetration Testing
Application Penetration Testing
Physical Security Penetration Testing
Database Penetration testing
VoIP Penetration Testing
VPN Penetration Testing
Virus and Trojan Detection
Log Management Penetration Testing
File Integrity Checking
Blue Tooth and Hand held Device Penetration Testing
Telecommunication and Broadband Communication Penetration Testing
Email Security Penetration Testing
Security Patches Penetration Testing
Data Leakage Penetration Testing
Penetration Testing Deliverables and Conclusion
Penetration Testing Report and Documentation Writing
Penetration Testing Report Analysis
Post Testing Actions
Ethics of a Licensed Penetration Tester
Standards and Compliance