Course code: ECSA« Back

EC-Council Certified Security Analyst

The original EC-Council Certified Security Analyst training is an advanced security training suitable for all CEH attendants. Students will learn how to efectively analyze all aspect of IT security in order to develop the security analyze methods and reporting using all the tools and techniques covered in the Certified Ethical Hacking training. During this very intensive training the students will learn how to design security components and how to efectively implement the security components testing methodology. The training prepares students for the 412-79 EC-Council Certified Security

 DateDurationCourse priceHandbook priceCourse languageLocation 
GTK 8/26/2019 5 58 000 CZK included in course price Český jazyk GOPAS Praha
 
11/18/2019 5 58 000 CZK included in course price Český jazyk GOPAS Praha
 
2/17/2020 5 58 000 CZK included in course price Český jazyk GOPAS Praha
 
5/18/2020 5 58 000 CZK included in course price Český jazyk GOPAS Praha
 
10/28/2019 5 2 330,00 EUR included in course price Slovenský jazyk GOPAS Bratislava
 

AffiliateDurationCatalogue priceHandbook priceITB
Praha5 58 000 CZK included in course price 50
Brno5 58 000 CZK included in course price 50
Bratislava5 2 330,00 EUR included in course price 50

Who is the course for

This training is for network administrators, firewall administrators, penetration testers and system administrators.

What we teach you

  • Analyze the components of penetration testing
  • Create proper final reports during penetration tests
  • Implement security risk management solutions to mitigate the security vulnerabilities

Required skills

All attendants should have a very solid understanding of all topics covered in both GOC3 and CEHv8 training.

Teaching methods

Professional explanation with practical samples and examples.

Teaching materials

Official EC-Council ECSA materials in the volume of several thousand pages

Course outline

EC-Council is currently developing a new version of this training which will be offered during 3rd quarter of 2014. The topics will be extended and contain the newest security solutions and security threats.

  • The reasons for implementing security analysis
  • Advanced google hacking
  • TCP/IP traffic inspection
  • Advanced sniffing techniques
  • Implementation of security weakness analysis using Nessus and other vulnerability scanners
  • Advanced wireless network pentesting
  • Network flow analysis
  • Using SNORT for traffic inspection
  • Advanced exploitation techniques
  • Penetration testing methodology
  • Penetration test planning and scheduling
  • Testing network infrastructure components – routers and switches
  • Firewall testing
  • IDS testing
  • Testing DDOS and DrDOS attacks
  • Password cracking tests
  • Social engineering
  • Application testing
  • Testing the physical security
  • Database testing
  • VoIP infrastructure testing
  • VPN testing
  • Detection of virus and Trojan horses
  • Testing log management
  • Testing BlueTooth and mobile devices
  • Testing e-mail communication security
  • Creating reports and final documentation
  • Analyzing the pentesting report outcome
  • Implementing security management solutions
  • The reasons for implementing security analysis
  • Advanced google hacking
  • TCP/IP traffic inspection
  • Advanced sniffing techniques
  • Implementation of security weakness analysis using Nessus and other vulnerability scanners
  • Advanced wireless network pentesting
  • Network flow analysis
  • Using SNORT for traffic inspection
  • Advanced exploitation techniques
  • Penetration testing methodology
  • Penetration test planning and scheduling
  • Testing network infrastructure components – routers and switches
  • Firewall testing
  • IDS testing
  • Testing DDOS and DrDOS attacks
  • Password cracking tests
  • Social engineering
  • Application testing
  • Testing the physical security
  • Database testing
  • VoIP infrastructure testing
  • VPN testing
  • Detection of virus and Trojan horses
  • Testing log management
  • Testing BlueTooth and mobile devices
  • Testing e-mail communication security
  • Creating reports and final documentation
  • Analyzing the pentesting report outcome
  • Implementing security management solutions
Official EC-Council Courseware Certified Security Analyst

Price:
included in course price
The prices are without VAT.


Graph of course relations