Академический Документы
Профессиональный Документы
Культура Документы
(ECSA) v8
Code: 3402
Lengt h: 5 days
URL: View Online
The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct
realistic penetration tests by using EC-Council's published penetration testing methodology.
This course is a five-day hands-on training program that uses real-time scenarios. In this course, you will learn
about penetration testing methodology that is repeatable and that can be used in a penetration testing
engagement, globally.
• Covers advanced topics such as mobile, cloud, and virtual machine penetration testing
• Completely maps to the National Initiative for Cybersecurity Education (NICE)'s workforce framework, which
includes:
• Covers all the requirements of National Information Assurance Training Standard For Information Systems
Security Officers (CNSS - 4014) and National Training Standard for System Certifiers (NSTISSI - 4015)
• Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques.
• The ECSA sets students on the path toward achieving the LPT certification
Certification:
• EC-Council Certified Security Analyst (ECSA)
The ECSA program provides one voucher to sit for the ECSA v8 exam. The ECSA certificate is provided on
successfully passing the online ECSA exam. The ECSA sets students on the path toward achieving the Licensed
Penetration Tester (LPT) certification.
Skills Gained
• Perform network and application penetration testing using both automated and manual techniques
• Design and perform audits of computer systems to ensure they are operating securely and that data is
• Evaluate highly complex security systems according to industry best practices to safeguard internal
• Lead investigations of security violations and breaches and recommend solutions; prepare reports on
• Respond to more complex queries and request for computer security information and report from both internal
• Firewall administrators
• System administrators
Prerequisites
While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly
advise candidates to take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement
of the ECSA course.
Course Details
Core Modules
2. T CP IP Packet Analysis
5. Rules of Engagement
9. Vulnerability Analysis
Self-Study Modules
Available target machines are completely virtualized allowing us to control and reset machines quickly and easily
with no required instructor or administrative interaction.
• Information Gathering
ExitC ertified® C orporation and iMVP ® are registered tradem arks of ExitC ertified ULC and Generated Feb 4 17:45:25 UTC 2018
ExitC ertified C orporation and Tech Data C orporation, respectively
C opyright ©2018 Tech Data C orporation and ExitC ertified ULC & ExitC ertified C orporation.
All Rights Reserved.