-
Course Code
ECSE-003
EC-Council Certified Security Analyst
- You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is pawned. You dream about enumeration and you can scan networks in your sleep. You have enough knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.
- The ECSA penetration testing certification is a security credential like no other, the ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
Learning Outcomes
- Analyze the outcomes of their penetration testing
- Design, test, & secure the network for protecting the organization against the threat arising due to cyber threats and attacks
- Conduct intensives assessment to effectively find the risk towards the security infrastructure of the organization
Course Contents
- Security Analysis and Penetration Testing Methodologies
- TCP IP Packet Analysis
- Pre-penetration Testing Steps
- Information Gathering Methodology
- External Network Penetration Testing Methodology
- Internal Network Penetration Testing Methodology
- Firewall Penetration Testing Methodology
- IDS Penetration Testing Methodology
- Web Application Penetration Testing Methodology
- SQL Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Network Penetration Testing Methodology
- Mobile Devices Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Test Actions
- Password Cracking Penetration Testing
- Router and Switches Penetration Testing
- Denial-of-Service Penetration Testing
- Stolen Laptop, PDAs and Cell Phones Penetration Testing
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- VPN Penetration Testing
- Virtual Machine Penetration Testing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Information System Security Principles
- Information System Incident Handling and Response
- Information System Auditing and Cortication
Our Methodology
- Make coaching and monitoring innovative and using modern
- Media training also using on the go training by using interactive means and focusing on
- The exercises, practical applications and real situations study
- Live delivery method, instructor-led training
- Experienced consultant, trainers, and professional
- Qualified trainer with high-level experience
Attendance Reports
- Send daily attendance reports to training departments
- Send full attendance report to training dep. by the end of the course
- Attend 100 % from the course days also provide daily
- Issue attendance certificate for participant who attend minimum 80% from the course duration
Pre/Post Reports
- Pre- assessment before starting training
- Post assessment after finish training
- Full report for the deferent between Pre-& Post assessment
Who Should Attend
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Administrators & Security Testers
- System Administrators and Risk Assessment professionals