EC Council Certified Security Analyst

EC-Council ECSA Training Philippines

Course: 833

Type: Hands-On Training

Duration: 5 days

Courses Benefits:

EC-Council Certified Security Analyst (ECSA) is an advanced ethical hacking training certification that complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. ECSA will not only expose the learner to hacking tools and technologies but will take it a step further by exploring how to analyze the outcome from these tools and technologies.

The ECSA certification will lead you to the  Licensed Penetration Tester certification.

CEH EC-Council is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 60 countries through a training network of more than 450 training partners globally.

ActiveLearning is an Authorized Training Partner of EC-Council in the Philippines.

You Will Learn How To:

  • How to design, secure and test networks
  • Perform the intensive assessments to identify and mitigate risks to the IT infrastructure
  • Identify security problems and how to avoid and eliminate them

Who Should Attend:

This ECSA course will significantly benefit the following:

  • Network server administrators,
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment professionals
  • Penetration Testers

Course Content:

  • The Need for Security Analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Techniques
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Penetration Testing Methodologie
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell phones Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Blue Tooth and Hand held Device Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Licensed Penetration Tester
  • Standards and Compliance

Upcoming Dates

Upon Request (9:00am - 5:00pm)

Course Investment

For pricing info, call us at +632-726-8128 or Email us.
Money Saving Tuition Plans

REQUEST MORE INFO ENROLL NOW!
Enrolling entitles you to...
  • Class participation
  • Team workshops
  • Use of in-class and hands-on equipment
  • Course CD
  • Comprehensive course materials
  • Lunch and refreshments
  • Course Completion Certificate
  • Certification Exam Voucher