ECSAv10 – EC-Council Certified Security Analyst v10
Official EC-COUNCIL Training & Certification
ECSA is a globally respected penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and prepare professional penetration testing report. This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s published penetration testing methodology.
The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by-step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted.
This course is a part of the VAPT (Vulnerability Assessment and Penetration Testing) Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
Deloitte is an official Authorized Training Center for the EC-Council, offering official training sessions, which include:
- Official courseware
- Authorized instructors (with actual professional experience)
- Certification examination voucher
ECSAv10 consists of 12 core modules presented during the actual training, and an additional 24 self-study modules to enable continuous learning.
1. Introduction to Penetration Testing and Methodologies
2. Penetration Testing Scoping and Engagement Methodology
3. Open Source Intelligence (OSINT) Methodology
4. Social Engineering Penetration Testing
5. Network Penetration Testing Methodology - External
6. Network Penetration Testing Methodology - Internal
7. Network Penetration Testing Methodology - Perimeter Devices
8. Web Application Penetration Testing Methodology
9. Database Penetration Testing Methodology
10. Wireless Penetration Testing Methodology
11. Cloud Penetration Testing Methodology
12. Report Writing and Post Testing Actions
1. Penetration Testing Essential Concepts
2. Password Cracking Penetration Testing
3. Denial-of-Service Penetration Testing
4. Stolen Laptop, PDAs and Cell Phones 4. Penetration Testing
5. Source Code Penetration Testing
6. Physical Security Penetration Testing
7. Surveillance Camera Penetration Testing
8. VoIP Penetration Testing
9. VPN Penetration Testing
10. Virtual Machine Penetration Testing
11. War Dialing
12. Virus and Trojan Detection
13. Log Management Penetration Testing
14. File Integrity Checking
15. Telecommunication and Broadband
16. Communication Penetration Testing
17. Email Security Penetration Testing
18. Security Patches Penetration Testing
19. Data Leakage Penetration Testing
20. SAP Penetration Testing
21. Standards and Compliance
22. Information System Security Principles
23. Information System Incident Handling and 23. Response
24. Information System Auditing and Certification
The EC-Council iLabs Cyber Range
The ECSA course is a fully hands-on program with labs and exercises that cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to.
This can be achieved effectively with the EC-Council iLabs Cyber Range. It allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.
Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete live range open for any form of hacking or testing.
This course will significantly benefit Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, Risk Assessment Professionals, and anyone who is concerned about the integrity of their network infrastructure.
Although the prerequisites are not mandatory, it is important to keep in mind that this is an intermediary-level Cyber Security/Penetration Testing course, therefore it will be expected of you to have at least 2 years prior experience in general Cyber Security projects. Also, it is recommended that you prior attend the CEH (Certified Ethical Hacker) course and certification.
Ec-Council Certified Security Analyst v10 – Official EC-COUNCIL Training & Certification
Price (VAT excluded): 1.950 EUR / delegate
• November 19 – November 23, 2018
* Discounts apply for groups of at least 3 participants from the same company.
** The dates are subject to change if the minimum number of participants is not met.
Course language: Romanian (course materials will be in English)
All the participants will be receiving:
• Official EC-Council Courseware
• Official EC-Council iLabs Cyber Range access for 6 months
• Official EC-Council ECSA Certification Examination voucher