Certified Security Analyst - Corporate Training
Bright Solutions Global PLC
Summary
- Tutor is available to students
Location & dates
City Of London
London
EC4N6HL
United Kingdom
Overview
he ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilising EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.ABOUT THE EXAM
From the commencement of the 5 day class and the activation of the ECSA Dashboard on ASPEN, you will have 60 days in total to submit your penetration testing report based on the challenge scenario to EC-Council, which will prove that you undestand the concepts thought in the course. This is the eligibility criterion to enable you to challenge the ECSA exam.
The Final ECSA Exam is a Multiple Choice Question Exam.
ECSA V10 EXAM INFO:
- Credit Towards Certification: ECSA v10
- Number of Questions: 150
Description
Why Attend this Course?
A SECURITY CREDENTIAL LIKE NO OTHER!
The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
What Makes this Course Stand Apart?
EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)The ECSA program offers a seamless learning progress, continuing where the CEH program left off.
Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
What you will Learn?
Upon completion of this course, you will be able to:
* Understand the various elements of security concerns due to intrusions and also information security standards and laws to protect the data
* Understand the various components of the TCP/IP model and its security
* Identify what should be tested and which type of penetration testing needs to perform
* Prepare ‘Rules of Behavior’ agreement that outlines the framework for external and internal penetration testing and Rules of Engagement (ROE) to overcome legal, federal, and policy-related restrictions
* Develop the penetration test plan to perform external and internal network penetration testing in the organization
* Gather information about the target company, perform vulnerability analysis and list the areas that need testing and penetration
* Perform Firewall, IDS, password cracking, social engineering, web application, SQL, etc. penetration testing in the organization
* Create a final penetration testing report
Who is this course for?
* Network Server Administrators
* Firewall Administrators
* Information Security Analysts
* System Administrators
* Risk Assessment Professionals
Requirements
You must have attended CEH course or have the relevant knowledge of the domains covered in CEH.
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.