Certified Security Analyst (ECSA)

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.
$1,899.00
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.

More Information:

  • Modality: On Demand
  • Provider: EC-Council
  • Difficulty: Intermediate
  • Duration: 32 Hours
  • Course Info: Download PDF
  • Certificate: See Sample

Course Information

What's Included:

  • Official EC Council Training Videos

  • Official EC Council Courseware included

  • Official EC Council ilabs subscription (6 months)

  • EC Council Exam Voucher with Remote Proctoring Service included

About this Course:

The ECSA program offers a seamless learning progress, continuing where the CEH program left off. Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.

The ECSA course is a fully hands-on program with labs and exercises that cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to.

This can be achieved effectively with the EC-Council iLabs Cyber Range. It allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete live range open for any form of hacking or testing.

Course Objectives:

  • Identify security issues in network design and implementation
  • Detect security issues in web applications that exists due to insecure design and development practices
  • Identify employees that do not properly authenticate, follow, validate, handle, the processes and technology
  • Identify misconfigurations in organization’s wireless infrastructure including WLAN, Mobile,
  • Determine security issues in organization’s cloud infrastructure
  • Identify security issues in the configuration of database server and their instances

Audience:

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha