ECSAv10: Security Analyst (Penetration Testing)
The new ECSAv10 program offers a seamless learning progress, continuing where the CEH program left off.
Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.
- Ethical Hackers
- Penetration Testers
- Network server administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment professionals
Recommended prerequisites to attend the ECSA training:
- A minimum of 24 months working experience in a related Information Security domain
- Certified Ethical Hacker training/certification
About the instructor: Robert Petrunic
Robert is a high profiled technology trainer and practitioner. He has broad experience in security, forensics and penetration testing, virtualization (both Microsoft and VMware), and all the flavors of Microsoft Windows server OS. He is a certified trainer for several leading companies: MCT (Microsoft Certified Trainer), VCI (VMware Certified Instructor), CEI (Certified EC Council Instructor) and ISC2 trainer (CISSP).
Specialties: Security and virtualization. Transferring knowledge in this Field to other People is at the top of my interests.
- Security Analysis and Penetration Testing Methodologies
- TCP IP Packet Analysis
- Pre-penetration Testing Steps
- Information Gathering Methodology
- Vulnerability Analysis
- External Network Penetration Testing Methodology
- Internal Network Penetration Testing Methodology
- Firewall Penetration Testing Methodology
- IDS Penetration Testing Methodology
- Web Application Penetration Testing Methodology
- SQL Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Network Penetration Testing Methodology
- Mobile Devices Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Test Actions
This course is directly aimed towards EC Council Certified Security Analyst Program .
The actual exam is NOT included in the price.
From the commencement of the 5 day class and the activation of the ECSA Dashboard on ASPEN, you will have 60 days in total to submit your penetration testing report based on the challenge scenario to EC-Council, which will prove that you undestand the concepts tought in the course. This is the eligibility criterion to enable you to challenge the ECSA exam.
The Final ECSA Exam is a Multiple Choice Question Exam.
The ECSA exam includes 2 required stages:
- Report writing stage requires candidates to perform various penetration testing exercises on EC-Council’s iLabs before submitting a penetration test report to EC-Council for assessment. Candidates that submit reports to the required standards will be provided with exam vouchers for the multiple choice exam.
- Multiple choice exams are proctored online through the EC-Council Exam portal
ECSA Exam info :
- Credit Towards Certification: ECSA v10
- Number of Questions: 150
- Passing Score: 70%
- Test Duration: 4 Hours
Other relevant courses