CÔNG TY TNHH TRAINOCATE VIỆT NAM
ECSA - EC-Council Certified Security Analyst

ECSA - EC-Council Certified Security Analyst

ECSA - EC-Council Certified Security Analyst

Overview

Duration: 5.0 days

The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.

It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.

This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

Objectives

The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification

Content

  • Module 00: Penetration Testing Essential Concepts (Self-Study)

  • Module 01: Introduction to Penetration Testing and Methodologies

  • Module 02: Penetration Testing Scoping and Engagement Methodology

  • Module 03: Open-Source Intelligence (OSINT) Methodology

  • Module 04: Social Engineering Penetration Testing Methodology

  • Module 05: Network Penetration Testing Methodology – External

  • Module 06: Network Penetration Testing Methodology – Internal

  • Module 07: Network Penetration Testing Methodology – Perimeter Devices

  • Module 08: Web Application Penetration Testing Methodology

  • Module 09: Database Penetration Testing Methodology

  • Module 10: Wireless Penetration Testing Methodology

  • Module 11: Cloud Penetration Testing Methodology

  • Module 12: Report Writing and Post Testing Actions

Audience

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment Professionals

Prerequisites

Computer Networks

Certification

ECSA v10 Exam info:

  • Credit Towards Certification: ECSA v10
  • Number of Questions: 150
  • Passing Score: 70%
  • Test Duration: 4 Hours

Lịch khai giảng

Form đăng ký

Bằng cách nhấn nút "ĐĂNG KÝ", tôi hoàn toàn đồng ý với Chính sách bảo mật

Các khóa đào tạo EC-Council khác

CHFI - Computer Hacking Forensic Investigator

Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors. In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law. Far too many cyber-attacks are occurring across the globe where laws are clearly broken and due to improper or non-existent forensic investigations, the cyber criminals go either unidentified, undetected, or are simply not prosecuted. Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics.
5.0 ngày

Bản quyền thuộc về Trainocate Việt Nam

back to top