(ECSA) v8
Code: 3402
Lengt h: 5 days
URL: View Online
The EC-Council Certied Security Analyst (ECSA) program teaches information security professionals to conduct
realistic penetration tests by using EC-Council's published penetration testing methodology.
This course is a ve-day hands-on training program that uses real-time scenarios. In this course, you will learn
about penetration testing methodology that is repeatable and that can be used in a penetration testing
engagement, globally.
Covers advanced topics such as mobile, cloud, and virtual machine penetration testing
Completely maps to the National Initiative for Cybersecurity Education (NICE)'s workforce framework, which
includes:
Covers all the requirements of National Information Assurance Training Standard For Information Systems
Security Ocers (CNSS - 4014) and National Training Standard for System Certiers (NSTISSI - 4015)
Certied Security Analysts learn to analyze the outcomes of security tools and security testing techniques.
The ECSA sets students on the path toward achieving the LPT certication
Certication:
EC-Council Certied Security Analyst (ECSA)
The ECSA program provides one voucher to sit for the ECSA v8 exam. The ECSA certicate is provided on
successfully passing the online ECSA exam. The ECSA sets students on the path toward achieving the Licensed
Penetration Tester (LPT) certication.
Skills Gained
Perform network and application penetration testing using both automated and manual techniques
Design and perform audits of computer systems to ensure they are operating securely and that data is
Evaluate highly complex security systems according to industry best practices to safeguard internal
Lead investigations of security violations and breaches and recommend solutions; prepare reports on
Respond to more complex queries and request for computer security information and report from both internal
Firewall administrators
System administrators
Prerequisites
While the Certied Ethical Hacker (CEH) certication is not a prerequisite for the ECSA course, we strongly
advise candidates to take the Certied Ethical Hacker v8 course to attain the CEH prior to the commencement
of the ECSA course.
Course Details
Core Modules
2. T CP IP Packet Analysis
5. Rules of Engagement
9. Vulnerability Analysis
Self-Study Modules
Available target machines are completely virtualized allowing us to control and reset machines quickly and easily
with no required instructor or administrative interaction.
Information Gathering
ExitC ertied C orporation and iMVP are registered tradem arks of ExitC ertied ULC and Generated Jul 4 8:40:38 UTC 2017
ExitC ertied C orporation and Tech Data C orporation, respectively
C opyright 2017 Tech Data C orporation and ExitC ertied ULC & ExitC ertied C orporation.
All Rights Reserved.