The EC-Council Certified Security Analyst (ECSA) program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.
It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.
This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
Module
- Security Analysis and Penetration Testing Methodologies
TCP IP Packet Analysis
Pre-penetration Testing Steps
Information Gathering Methodology
Vulnerability Analysis
External Network Penetration Testing Methodology
Internal Network Penetration Testing Methodology
Firewall Penetration Testing Methodology
IDS Penetration Testing Methodology
Web Application Penetration Testing Methodology
SQL Penetration Testing Methodology
Database Penetration Testing Methodology
Wireless Network Penetration Testing Methodology
Mobile Devices Penetration Testing Methodology
Cloud Penetration Testing Methodology
Report Writing and Post Test Actions