Become a Licensed Penetration Tester!
EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.
The ECSA/LPT training program is a highly interactive security class designed to teach Security Professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure.
Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.
During this five-day course you’ll learn:
The Need for Security Analysis
TCP/IP Packet Analysis
Advanced Sniffing Techniques
Vulnerability Analysis with Nessus
Advanced Wireless Testing
Designing a DMZ
Advanced Exploits and Tools
Penetration Testing Methodologies
Customers and Legal Agreements
Rules of Engagement
Penetration Testing Planning and Scheduling
Pre Penetration Testing Checklist
External Penetration Testing
Internal Network Penetration Testing
Routers and Switches Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Wireless Network Penetration Testing
Denial of Service Penetration Testing
Password Cracking Penetration Testing
Social Engineering Penetration Testing
Stolen Laptop, PDAs and Cell phones Penetration Testing
Application Penetration Testing
Physical Security Penetration Testing
Database Penetration testing
VoIP Penetration Testing
VPN Penetration Testing
Virus and Trojan Detection
Log Management Penetration Testing
File Integrity Checking
Blue Tooth and Hand held Device Penetration Testing
Telecommunication and Broadband Communication Penetration Testing
Email Security Penetration Testing
Security Patches Penetration Testing
Data Leakage Penetration Testing
Penetration Testing Deliverables and Conclusion
Penetration Testing Report and Documentation Writing
Penetration Testing Report Analysis
Post Testing Actions
Ethics of a Licensed Penetration Tester
Standards and Compliance
Why Penetration Testing
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.
Ready to Register?
Click on the registration button and you will be redirected to the ECSA info page. Fill out the form at the bottom of that page and you will contacted within 24 hours! Thanks so much!
EC-Council | iClass Online Event Venue is a robust learning environment designed to enhance the remote learning experience of our Information Security Students. iClass encompasses current technologies in online Web Conferencing, VOIP Services, and distributed Video Platforms! By combining live instruction, classroom interactivity, remote control capabilities, live hands-on labs where applicable, and the power of the world wide web, students now have more learning options than ever when it comes to EC-Council titles.
Ready to Register?
If you are looking for self paced, online training click HERE!