EC-Council Certified Security Analyst (ECSA) v10
9:00am to 5.00pm
80 Jurong East Street 21 #04-04
Devan Nair Institute
S$3,000 (excl of G.S.T)
|2021 Course Dates
18 – 22 Jan 2021
19 – 23 Apr 2021
28 – 2 Jul 2021
|None of the published dates will work for you? Speak to our training consultants for a private tuition arrangement or a closed door training.|
|Do note that this course listed uses digital courseware. You are required to bring your own device to access the digital manual.|
The ECSA program offers a seamless learning progress continuing where the CEH program left off.
The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted.
Building on the knowledge, skills and abilities covered in the new CEH v10 program, we have simultaneously re-engineered the ECSA program as a progression from the former.
Organizations today demand a professional level pentesting program and not just pentesting programs that provide training on how to hack through applications and networks.
Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and/or industry published pentesting frameworks.
This course is a part of the VAPT Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
In the new ECSAv10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential. This new credential allows employers to validate easily the skills of the student.
Module 1: Introduction to Penetration Testing and Methodologies
Module 2: Penetration Testing Scoping and Engagement Methodology
Module 3: Open Source Intelligence (OSINT) Methodology
Module 4: Social Engineering Penetration Testing Methodology
Module 5: Network Penetration Testing Methodology – External
Module 6: Network Penetration Testing Methodology – Internal
Module 7: Network Penetration Testing Methodology – Perimeter Devices
Module 8: Web Application Penetration Testing Methodology
Module 9: Database Penetration Testing Methodology
Module 10: Wireless Penetration Testing Methodology
Module 11: Cloud Penetration Testing Methodology
Module 12: Report Writing and Post Testing Actions
Module 1: Password Cracking Penetration Testing
Module 2: Penetration Testing Essential Concepts This is an Essential Prerequisite as it helps you to prepares you the ECSA courseware. Serves as a base to build Advanced Pen Testing Concepts
Module 3: Password Cracking Penetration Testing
Module 4: Denial-of-Service Penetration Testing
Module 5: Stolen Laptop, PDAs and Cell Phones Penetration Testing
Module 6: Source Code Penetration Testing
Module 7: Physical Security Penetration Testing
Module 8: Surveillance Camera Penetration Testing
Module 9: VoIP Penetration Testing
Module 10: VPN Penetration Testing
Module 11: Virtual Machine Penetration Testing
Module 12: War Dialing
Module 13: Virus and Trojan Detection
Module 14: Log Management Penetration Testing
Module 15: File Integrity Checking
Module 16: Telecommunication and Broadband Communication Penetration Testing
Module 17: Email Security Penetration Testing
Module 18: Security Patches Penetration Testing
Module 19: Data Leakage Penetration Testing
Module 20: SAP Penetration Testing
Module 21: Standards and Compliance
Module 22: Information System Security Principles
Module 23: Information System Incident Handling and Response
Module 24: Information System Auditing and Certification
Note: Self-study modules are available in ASPEN portal
Click Here for full course Outline