ECSA

EC-Council Certifed Security Analyst

WHAT IS ECSA?

You are an ethical hacker. In fact, you are a Certi ed Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have su cient knowledge and an arsenal of hacking tools and you are also pro cient in writing custom hacking code.

Is that enough?



The ECSA program takes the tools and techniques you learned in the Certifed Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology


ECSA v9 - Course Outline

Module Description
01 Security Analysis and Penetration Testing Methodologies
02 TCP IP Packet Analysis
03 Pre-penetration Testing Steps
04 Information Gathering Methodology
05 Vulnerability Analysis
06 External Network Penetration Testing Methodology
07 Internal Network Penetration Testing Methodology
08 Firewall Penetration Testing Methodology
09 IDS Penetration Testing Methodology/td>
10 Web Application Penetration Testing Methodology
11 HSQL Penetration Testing Methodology
12 Database Penetration Testing Methodology
13 Wireless Network Penetration Testing Methodology
14 Mobile Devices Penetration Testing Methodology
15 Cloud Penetration Testing Methodology
16 EReport Writing and Post Test Actions
KNOW MORE ABOUT ECSA - EC-Council Certifed Security Analyst