EC-Council Certified Security Analyst (ECSA) v10


Course Code:

ECSA

Duration:
5 days
9:00am to 5.00pm
Location:
80 Jurong East Street 21 #04-04
Devan Nair Institute
Singapore 609607
Course Fees:
S$3,500 (excl of G.S.T)
2019 Course Dates
15 – 19 Jul 2019
23 – 27 Sep 2019
18 – 21 Nov 2019
None of the published dates will work for you? Speak to our training consultants for a private tuition arrangement or a closed door training.
Do note that this course listed uses digital courseware. You are required to bring your own device to access the digital manual.

Course Overview

The ECSA program offers a seamless learning progress continuing where the CEH program left off.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.

It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted.

Building on the knowledge, skills and abilities covered in the new CEH v10 program, we have simultaneously re-engineered the ECSA program as a progression from the former.

Organizations today demand a professional level pentesting program and not just pentesting programs that provide training on how to hack through applications and networks.

Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and/or industry published pentesting frameworks.

This course is a part of the VAPT Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

In the new ECSAv10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential. This new credential allows employers to validate easily the skills of the student.

Course Outline

Core Modules

Module 1: Introduction to Penetration Testing and Methodologies

Module 2: Penetration Testing Scoping and Engagement Methodology

Module 3: Open Source Intelligence (OSINT) Methodology

Module 4: Social Engineering Penetration Testing Methodology

Module 5: Network Penetration Testing Methodology – External

Module 6: Network Penetration Testing Methodology – Internal

Module 7: Network Penetration Testing Methodology – Perimeter Devices

Module 8: Web Application Penetration Testing Methodology

Module 9: Database Penetration Testing Methodology

Module 10: Wireless Penetration Testing Methodology

Module 11: Cloud Penetration Testing Methodology

Module 12: Report Writing and Post Testing Actions

 

Self-Study Modules

Module 1: Password Cracking Penetration Testing

Module 2: Penetration Testing Essential Concepts This is an Essential Prerequisite as it helps you to prepares you the ECSA courseware. Serves as a base to build Advanced Pen Testing Concepts

Module 3: Password Cracking Penetration Testing

Module 4: Denial-of-Service Penetration Testing

Module 5: Stolen Laptop, PDAs and Cell Phones Penetration Testing

Module 6: Source Code Penetration Testing

Module 7: Physical Security Penetration Testing

Module 8: Surveillance Camera Penetration Testing

Module 9: VoIP Penetration Testing

Module 10: VPN Penetration Testing

Module 11: Virtual Machine Penetration Testing

Module 12: War Dialing

Module 13: Virus and Trojan Detection

Module 14: Log Management Penetration Testing

Module 15: File Integrity Checking

Module 16: Telecommunication and Broadband Communication Penetration Testing

Module 17: Email Security Penetration Testing

Module 18: Security Patches Penetration Testing

Module 19: Data Leakage Penetration Testing

Module 20: SAP Penetration Testing

Module 21: Standards and Compliance

Module 22: Information System Security Principles

Module 23: Information System Incident Handling and Response

Module 24: Information System Auditing and Certification

 

Note: Self-study modules are available in ASPEN portal

Click Here for full course Outline

Take the Next Step

It Takes Less Than 5 Min