EC-Council Certified Security Analyst (ECSA) Certification & Training Course
Overview
What is ECSA Certification?
ECSA stands for the EC-Council Certified Security Analyst Certification. It’s an advanced security certification course build upon the foundation of the Certified Ethical Hacker (CEH) certification program. It aims at providing a hands-on experience to help you uncover the security threats affecting organizations of different sizes and types.
Why ECSA Training?
Successfully chase your dream of becoming a certified security analyst. SpireTec offers ECSA Training via online or on-site classroom mean. Learn techniques, tools, and practices covered in the latest ECSA Course. Develop the advanced skills required to perform penetration testing to identify different types of eThreats.
ECSA: Skills Measured
Module 00: Penetration Testing Essential Concepts (Self-Study)
Module 01: Introduction to Penetration Testing and Methodologies
Module 02: Penetration Testing Scoping and Engagement Methodology
Module 03: Open-Source Intelligence (OSINT) Methodology
Module 04: Social Engineering Penetration Testing Methodology
Module 05: Network Penetration Testing Methodology – External
Module 06: Network Penetration Testing Methodology – Internal
Module 07: Network Penetration Testing Methodology – Perimeter Devices
Module 08: Web Application Penetration Testing Methodology
Module 09: Database Penetration Testing Methodology
Module 10: Wireless Penetration Testing Methodology
Module 11: Cloud Penetration Testing Methodology
Module 12: Report Writing and Post Testing Actions
Who Should Earn EC-Council ECSA Certification?
Ethical Hackers
A certified ethical hacker is an expert in hacking, who helps companies to realize their vulnerabilities and develop the best protection to safeguard their data. The training on ECSA Certified Security Analyst Certification helps you learn and update skills, as the world of hacking progresses quickly. The average salary of a Certified Ethical Hacker (CEH) in the US job market is $93,536 per year.
Penetration Testers
Penetration testers assess the security vulnerabilities and weaknesses affecting digital assets and computer networks of an organization. Our training based on the ECSA course, helps you define the penetration testing scope and methodologies for different types of IT products or services, and perform reverse engineering, malware analysis, protocol analysis, and debugging.
Network server administrators
Network administrators are responsible for the upkeep of computer hardware and software systems and protecting the organizational data against any breach. The skills outlined in the Certified security analyst course help network administrator identify the vulnerabilities of their systems and implement the best security practices.
Firewall Administrators
The IT professionals are accountable for day-to-day network activities, such as those related to incident and change management, to ensure end-user requests are handled and addressed within defined SLAs. They troubleshoot Wifi, firewalls, routers, switches, and controllers to ensure people have uninterrupted access to what they need based on the level of permission.
Prerequisites for ECSA Certification
A fundamental understanding of ethical hacking, firewall, routers, and other network components.
Full Description
Course Outline
1. Security Analysis and Penetration Testing Methodologies
2. TCP IP Packet Analysis
3. Pre-penetration Testing Steps
4. Information Gathering Methodology
5. Vulnerability Analysis
6. External Network Penetration Testing Methodology
7. Internal Network Penetration Testing Methodology
8. Firewall Penetration Testing Methodology
9. IDS Penetration Testing Methodology
10. Web Application Penetration Testing Methodology
11. SQL Penetration Testing Methodology
12. Database Penetration Testing Methodology
13. Wireless Network Penetration Testing Methodology
14. Mobile devises Penetration Testing Methodology
15. Cloud Penetration Testing Methodology
16. Report Writing and Post Test Actions
Fees & Schedule
Delivery Mode | Course Duration | Fees |
---|---|---|
Live Virtual Training | 5 Days | Ask for Quote |
Onsite Classroom Training | 5 Days | Ask for Quote |
Customized Training | 5 Days | Ask for Quote |