EC-Council Certified Security Analyst (ECSA)

Course Details:

You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.
Is that enough?

Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client?

Course Syllabus


There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable.

It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

A Security Credential Like No Other!

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

  • About the Program
    • The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning
  • Who Is It For?
      Ethical Hackers
      Penetration Testers
      Network server administrators
      Firewall Administrators
      Security Testers
      System Administrators and Risk Assessment professionals
  • CND Course Outline
      Module 00: Penetration Testing Essential Concepts (Self-Study).
      Module 01: Introduction to Penetration Testing and Methodologies.
      Module 02: Penetration Testing Scoping and Engagement Methodology.
      Module 03: Open-Source Intelligence (OSINT) Methodology.
      Module 04: Social Engineering Penetration Testing Methodology.
      Module 05: Network Penetration Testing Methodology – External.
      Module 06: Network Penetration Testing Methodology – Internal.
      Module 07: Network Penetration Testing Methodology – Perimeter Devices.
      Module 08: Web Application Penetration Testing Methodology.
      Module 09: Database Penetration Testing Methodology.
      Module 10: Wireless Penetration Testing Methodology.
      Module 11: Cloud Penetration Testing Methodology
      Module 12: Report Writing and Post Testing Actions.

Write Reviews

Copyright © 2018 | AIMT World | All rights reserved