You Will Learn How To

  • How to design, secure and test networks
  • Perform the intensive assessments to identify and mitigate risks to the IT infrastructure
  • Identify security problems and how to avoid and eliminate them

Course Benefits

EC-Council Certified Security Analyst (ECSA) is an advanced ethical hacking training certification that complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. ECSA will not only expose the learner to hacking tools and technologies but will take it a step further by exploring how to analyze the outcome from these tools and technologies.

The ECSA certification will lead you to the Licensed Penetration Tester certification.

EC-Council is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester

Who Should Attend

This ECSA course will significantly benefit the following:

  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment professionals
  • Penetration Testers

Course Content

  1. The Need for Security Analysis
  2. Advanced Googling
  3. TCP/IP Packet Analysis
  4. Advanced Sniffing Techniques
  5. Vulnerability Analysis with Nessus
  6. Advanced Wireless Testing
  7. Designing a DMZ
  8. Snort Analysis
  9. Log Analysis
  10. Advanced Exploits and Tools
  11. Penetration Testing Methodologie
  12. Customers and Legal Agreements
  13. Rules of Engagement
  14. Penetration Testing Planning and Scheduling
  15. Pre Penetration Testing Checklist
  16. Information Gathering
  17. Vulnerability Analysis
  18. External Penetration Testing
  19. Internal Network Penetration Testing
  20. Routers and Switches Penetration Testing
  21. Firewall Penetration Testing
  22. IDS Penetration Testing
  23. Wireless Network Penetration Testing
  24. Denial of Service Penetration Testing
  25. Password Cracking Penetration Testing
  26. Social Engineering Penetration Testing
  27. Stolen Laptop, PDAs and Cell phones Penetration Testing
  28. Application Penetration Testing
  29. Physical Security Penetration Testing
  30. Database Penetration testing
  31. VoIP Penetration Testing
  32. VPN Penetration Testing
  33. War Dialing
  34. Virus and Trojan Detection
  35. Log Management Penetration Testing
  36. File Integrity Checking
  37. Blue Tooth and Hand held Device Penetration Testing
    • Makati
    • +63 2 8891 0713
    • +63 2 8751 6482

    • Intramuros
    • +63 2 8524-5572
    • Intramuros
    • 658 Muralla St., Intramuros, Manila 1002, Philippines

    • Makati
    • 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines