ECSA: EC-Council Certified Security Analyst

Overview

Duration: 5 days
CPE Credits: 35
Course Number: SEC-319
ECSA Certification - EC-Council Certified Security Analyst Training Provided by Intrinsec

This authorized ECSA training seminar is a five day, 35 CPE course offered to you by Intrinsec Security – an Accredited Training Center in partnership with EC-Council

ECSA Training Information

The EC-Council Certified Security Analyst (ECSA) penetration testing course provides you with a real-world hands-on penetration testing experience and is a globally accepted hacking and penetration testing course that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The training exercises and class material takes the tools and techniques that are reviewed in the Certified Ethical Hacker (CEH) course and teaches students how to apply these skills/tools by utilizing EC-Council’s published penetration testing methodology.

Aside from a reserved seat in an official prep course for the ECSA certification, the resources provided to students with registration include official EC-Council courseware along with an ECSA exam voucher. When you combine the instructor-led training with the included course resources, this official EC-Council class is a great learning tool for those interested in reviewing how to apply hacking skills in a pen test scenario and gaining the ECSA certification.

What Comes With This Course

  • Five Days of Official ECSA Training from an Authorized EC-Council Instructor
  • Official EC-Council ECSA Training Courseware
  • iLabs, Online Labs for ECSA (6 Months of Access)
  • Official EC-Council Test Prep Program
  • Exam Voucher for ECSA

ALL OF THE RESOURCES YOU NEED TO BECOME ECSA CERTIFIED

COURSEWARE AND MANUALS
iLabs, VIRTUAL EXERCISES
PRACTICE TESTS
EXAM VOUCHER

What You Will Learn

This official ECSA training seminar is based on the 16 domains featured in the ECSA certification program, ensuring you successfully prepare for the ECSA exam while also enhancing your overall competencies in penetration testing.

Module 1: Security Analysis and Penetration Testing Methodologies

Module 1: Security Analysis and Penetration Testing Methodologies

 

ECSA Lessons in Module 1
  • OPM Government Data Breach Impacted 21.5 Million
  • Hackers Steal up to $1 Billion from Banks
  • Information Security Breach Survey
  • Data Breach Statistics
  • Module Objectives
  • Security Concerns
  • Security Policies
  • Information Security Standards
  • COBIT
  • Information Security Acts
  • Information Security Acts and Laws
  • Penetration Testing Methodology
  • Module Summary
Module 2: TCP/IP Packet Analysis

Module 2: TCP/IP Packet Analysis

 

ECSA Lessons in Module 2
  • Module Objectives
  • Module Flow
  • Overview of TCP/IP Protocol Stack
  • Analysis of Application Layer Protocols
  • Analysis of Transport Layer Protocols
  • Analysis of Internet Layer Protocols
  • Analysis of a TCP/IP Connection
  • TCP/IP in Mobile Networks
  • Module Summary
Module 3: Pre-penetration Testing Steps

Module 3: Pre-penetration Testing Steps

 

ECSA Lessons in Module 3
  • Module Objectives
  • Pre-penetration Testing Steps
  • Module Summary
Module 4: Information Gathering Methodology

Module 4: Information Gathering Methodology

 

ECSA Lessons in Module 4
  • Module Objectives
  • Information Gathering
  • Information Gathering Terminologies
  • Information Gathering Steps
  • Footprinting Tools
  • Module Summary
Module 5: Vulnerability Analysis

Module 5: Vulnerability Analysis

 

ECSA Lessons in Module 5
  • Module Objectives
  • Vulnerability Assessment
  • Module Summary
Module 6: External Network Penetration Testing Methodology

Module 6: External Network Penetration Testing Methodology

 

ECSA Lessons in Module 6
  • Module Objectives
  • External Intrusion Test and Analysis
  • Why is it done?
  • Client Benefits
  • External Penetration Testing
  • Steps for Conducting External Penetration Testing
  • Recommendations to Protect your System from External Threats
  • Module Summary
Module 7: Internal Network Penetration Testing Methodology

Module 7: Internal Network Penetration Testing Methodology

 

ECSA Lessons in Module 7
  • Module Objectives
  • Internal Network Penetration Testing
  • Why Internal Network Penetration Testing?
  • Internal Network
  • Steps for Internal Network Penetration Testing
  • Automated Internal Network Penetration Testing Tools
  • Recommendations for Internal Network Penetration Testing
  • Module Summary
Module 8: Firewall Penetration Testing Methodology

Module 8: Firewall Penetration Testing Methodology

 

ECSA Lessons in Module 8
  • Module Objectives
  • What is a Firewall?
  • What Does a Firewall Do?
  • What Can’t a Firewall Do?
  • Types of Firewalls
  • Packet Filtering
  • Firewall Policy
  • Firewall Implementation
  • Build a Firewall Ruleset
  • Maintenance and Management of Firewall
  • Steps for Conducting Firewall Penetration Testing
  • Best Practices for Firewall Configuration
  • Module Summary
Module 9: IDS Penetration Testing

Module 9: IDS Penetration Testing

 

ECSA Lessons in Module 9
  • Penetration Testing Methodology
  • Module Objectives
  • Introduction to Intrusion Detection Systems (IDS)
  • Types of IDS
  • Why IDS Penetration Testing?
  • Common Techniques Used to Evade IDS Systems
  • IDS Penetration Testing Steps
  • IDS Evasion Tools: Traffic IQ Professional
  • IDS Evasion Tools
  • Intrusion Detection System: Snort
  • Intrusion Detection Tools
  • IDS Countermeasures
  • Module Summary
Module 10: Web Application Testing Methodology

Module 10: Web Application Testing Methodology

 

ECSA Lessons in Module 10
  • Module Objectives
  • Why Web Applications Are So Critical
  • Web Application Penetration Testing/Security Testing
  • Web App Pen Testing Methodology
  • Connection String Injection
  • Module Summary
Domain 11: Hacking Webservers

Module 11: SQL Penetration Testing Methodology

 

ECSA Lessons in Module 11
  • Module Objectives
  • SQL Injection
  • Module Summary
Module 12: Database Penetration Testing Methodology

Module 12: Database Penetration Testing Methodology

 

ECSA Lessons in Module 12
  • Module Objectives
  • Database Penetration Testing Steps
  • Oracle Database Penetration Testing
  • Oracle Auditing – Wrong Statements Logged
  • MS SQL Server Penetration Testing
  • MySQL Server Penetration Testing
  • Database Password Cracking Tool
  • Database Vulnerability Assessment Tool
  • Database Penetration Testing Tool
  • Recommendations for Securing Databases
  • Module Summary
Module 13: Wireless Network Penetration Testing Methodology

Module 13: Wireless Network Penetration Testing Methodology

 

ECSA Lessons in Module 13
  • Module Objectives
  • Wireless Penetration Testing
  • Wireless Security Threats
  • Wireless Penetration-Testing Tools
  • Wireless Penetration Testing Steps
  • RFID Penetration Testing
  • NFC Penetration Testing
  • IoT Penetration Testing
  • Module Summary
Module 14: Mobile Devices Penetration Testing Methodology

Module 14: Mobile Devices Penetration Testing Methodology

 

ECSA Lessons in Module 14
  • Module Objectives
  • Why Mobile Device Penetration Testing
  • Mobile Devices Market Share
  • Mobile Penetration Testing Requires Rooting/Jailbreaking of Mobile Devices
  • Mobile Penetration Testing Methodology
  • Android Application Penetration Testing
  • iPhone Application Penetration Testing
  • Mobile Phone Security Best Practices
  • Module Summary
Module 15: Cloud Penetration Testing Methodology

Module 15: Cloud Penetration Testing Methodology

 

ECSA Lessons in Module 15
  • Module Objectives
  • Cloud Computing Security and Concerns
  • Security Risks Involved in Cloud Computing
  • Security Controls and the Cloud Computing Compliance Model
  • Role of Penetration Testing in Cloud Computing
  • Key Considerations for Pen Testing in the Cloud
  • Scope of Cloud Pen Testing
  • Cloud Penetration Testing Steps
  • Recommendations for Cloud Testing
  • Module Summary
Module 16: Report Writing and Post Test Actions

Module 16: Report Writing and Post Test Actions

 

ECSA Lessons in Module 16
  • Module Objectives
  • Module Flow
  • Penetration Testing Deliverables
  • Writing Pen Testing Report
  • Pen Testing Report Format
  • Result Analysis
  • Post Testing Actions
  • Report Retention
  • Module Summary

This ECSA Training Program Is Brought To You By:

 

VIEW UPCOMING CLASS DATES

Two Things You Should Know About Intrinsec

WE’LL PAY YOU TO BECOME ECSA CERTIFIED

With the YOU PASS WE PAY promo, you’re eligible to receive $300 if you pass the ECSA exam within 90 days of completing this course!

TELL ME MORE
*See terms & conditions for details.

FIND A LOWER PRICE AND WE’LL MATCH IT

Our PRICE MATCH GUARANTEE is simple – not only do you get the most effective training available, but you also pay the best price!

TELL ME MORE
 

Why Yes, We Do Provide Group Training!

We have multiple options for you to lower costs and get more of your people trained.

Schedule

DateTimeLocationPriceRegister
Oct 9 - 13, 2017 8:00am - 4:00pm MST Live Online USD $3,345.00
Dec 18 - 22, 2017 8:00am - 4:00pm MST Live Online USD $3,345.00
 

Request Group Training