EC COUNCIL Certified Security Analyst (ECSA)

Watch demo Course

  • Define Security and Information Security
  • Know the pillars of information security
  • Understand the need for security analysis

5.0/5

(2300 Ratings)

3000

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning

Module 00: Penetration Testing Essential Concepts (Self-Study)

Module 01: Introduction to Penetration Testing and Methodologies

Module 02: Penetration Testing Scoping and Engagement Methodology

Module 03: Open-Source Intelligence (OSINT) Methodology

Module 04: Social Engineering Penetration Testing Methodology

Module 05: Network Penetration Testing Methodology – External

Module 06: Network Penetration Testing Methodology – Internal

Module 07: Network Penetration Testing Methodology – Perimeter Devices

Module 08: Web Application Penetration Testing Methodology

Module 09: Database Penetration Testing Methodology

Module 10: Wireless Penetration Testing Methodology

Module 11: Cloud Penetration Testing Methodology

Module 12: Report Writing and Post Testing Actions

ECSA v10 Exam info:

Credit Towards Certification: ECSA v10

Number of Questions: 150

Passing score: 70%

Test Duration: 4 Hours

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning

Module 00: Penetration Testing Essential Concepts (Self-Study)

Module 01: Introduction to Penetration Testing and Methodologies

Module 02: Penetration Testing Scoping and Engagement Methodology

Module 03: Open-Source Intelligence (OSINT) Methodology

Module 04: Social Engineering Penetration Testing Methodology

Module 05: Network Penetration Testing Methodology – External

Module 06: Network Penetration Testing Methodology – Internal

Module 07: Network Penetration Testing Methodology – Perimeter Devices

Module 08: Web Application Penetration Testing Methodology

Module 09: Database Penetration Testing Methodology

Module 10: Wireless Penetration Testing Methodology

Module 11: Cloud Penetration Testing Methodology

Module 12: Report Writing and Post Testing Actions

ECSA v10 Exam info:

Credit Towards Certification: ECSA v10

Number of Questions: 150

Passing score: 70%

Test Duration: 4 Hours

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
Request More Information

Reviews

reviewer.png

Rashi Gupta

Engineer

I am so happy that I have enrolled in this course. It gave me a lot of information to help me secure my system as well as awareness and inside view on how internet security happens. Thank you very much!


Find this Course at other locations:



Disclaimer

PRINCE2® and ITIL® are registered trademarks of AXELOS Limited. Used under licence from AXELOS Limited. All rights reserved.

The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

COBIT® 5 is a registered trademark of ISACA in United States and other countries. DevOps Foundation®, Certified Agile Service Manager (CASM)®, Certified Agile Process Owner (CAPO)® & Agile Service Management® are registered marks of the DevOps Institute.

PMBOK®, Project Management Institute® PMI®, Certified Associate in Project Management (CAPM)®, Project Management Professional (PMP)®, Program Management Professional (PgMP)®, Portfolio Management Professional (PfMP)®, PMI Agile Certified Practitioner (PMI-ACP)®, PMI Professional in Business Analysis (PMI-PBA)®, PMI Risk Management Professional (PMI-RMP)®, PMI Scheduling Professional (PMI-SP)® are the Registered Marks of the Project Management Institute, Inc.

TOGAF® is a registered trademark of The Open Group