ECSA Certification Training | EC-Council Certified Security Analyst Training

ECSA Certification Training | EC-Council Certified Security Analyst Training

Introduction:

ECSA Certification Training | EC-Council Certified Security Analyst Training by Example

This ECSA Certification Training | EC-Council Certified Security Analyst Training course is a five-day hands-on training program that uses real-time scenarios. In this ECSA Certification Training | EC-Council Certified Security Analyst Training course, you will learn about penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.

The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct realistic penetration tests by using EC-Council's published penetration testing methodology.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

Network server administrators
Firewall administrators
Information security analysts
System administrators
Risk assessment professionals

ECSA Certification Training | EC-Council Certified Security Analyst TrainingRelated Courses:

Duration: 5 days

Skilled Gained:

Perform network and application penetration testing using both automated and manual techniques
Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats
Assess assigned system to determine system security status
Design and recommend security policies and procedures
Ensure compliance to policies and procedures
Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases
Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management
Respond to more complex queries and request for computer security information and report from both internal and external customers

Course Content:

1. Need for Security Analysis
2. TCP IP Packet Analysis
3. Penetration Testing Methodologies
4. Customers and Legal Agreements
5. Rules of Engagement
6. Penetration Testing Planning and Scheduling
7. Pre-penetration Testing Steps
8. Information Gathering
9. Vulnerability Analysis
10. External Penetration Testing
11. Internal Network Penetration Testing
12. Firewall Penetration Testing
13. IDS Penetration Testing
14. Password Cracking Penetration Testing
15. Social Engineering Penetration Testing
16. Web Application Penetration Testing
17. SQL Penetration Testing
18. Penetration Testing Reports and Post Testing Actions

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment