Taking too long? Close loading screen.

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA)

Learn penetration testing methodologies while preparing for the ECSA and LPT certifications.

ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern
infrastructures, operating systems, and application environments while teaching the students how to
document and write a penetration testing report.
This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s
published penetration testing methodology.

The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct realistic penetration tests by using EC-Council’s published penetration testing methodology.

This course is a five-day hands-on training program that uses real-time scenarios. In this course, you will learn about penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.

Why EC-Council Certified Security Analyst is Best
  • Presents industry accepted comprehensive penetration testing standards on 44 domains
  • Covers advanced topics such as mobile, cloud, and virtual machine penetration testing
  • Completely maps to the National Initiative for Cybersecurity Education (NICE)’s workforce framework, which includes:
  • Protect and defend
  • Operate and collect
  • Analyze specialty area
  • Covers all the requirements of National Information Assurance Training Standard For Information Systems Security Officers (CNSS – 4014) and National Training Standard for System Certifiers (NSTISSI – 4015)
Benefits of Becoming ECSA
  • Data security program-advanced penetration testing
  • The curriculum is backed by and designed by the best in the field
  • Students earn greater industry acceptance as seasoned security professionals
  • Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques.
  • The ECSA sets students on the path toward achieving the LPT certification
Certification:
  • EC-Council Certified Security Analyst (ECSA)
  • Licensed Penetration Tester (LPT)

The ECSA program provides one voucher to sit for the ECSA v8 exam. The ECSA certificate is provided on successfully passing the online ECSA exam. The ECSA sets students on the path toward achieving the Licensed Penetration Tester (LPT) certification. 

Follow-On Courses

  • CISSP Prep Course

 

  • Perform network and application penetration testing using both automated and manual techniques
  • Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats
  • Assess assigned system to determine system security status
  • Design and recommend security policies and procedures
  • Ensure compliance to policies and procedures
  • Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases
  • Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management
  • Respond to more complex queries and request for computer security information and report from both internal and external customers

• Test format: Multiple choice
• Number of Questions: 150
• Passing Score: 70%
• Test Duration: 4 Hours
Penetration testing:
• Complete ECSA Practical Cyber Range
Challenges in thirty Days
• Submit report within thirty Days completion
of challenges
• Passing Criteria: 70 / 100 (Max)

  • Network server administrators
  • Firewall administrators
  • Information security analysts
  • System administrators
  • Risk assessment professionals

Prerequisites

While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement of the ECSA course.

  • Certified Ethical Hacker v8

The course is delivered using a balanced combination of video, presentation, workshops and discussion sessions. The workshops and discussions are focused on putting into practice the techniques covered in the presentation and video. The workshops are used extensively to reinforce learning and to contribute to the development of understanding. Delegates are provided with a set of comprehensive bound course notes covering the presentation material and workshop exercises, a Workshop Workbook, a two-CD CDROM of relevant resources, and other materials and checklists for future reference and use.

Core Modules
  • Need for Security Analysis
  • TCP IP Packet Analysis
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre-penetration Testing Steps
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Web Application Penetration Testing
  • SQL Penetration Testing
  • Penetration Testing Reports and Post Testing Actions
Self-Study Modules
  • Router and Switches Penetration Testing
  • Wireless Network Penetration Testing
  • Denial-of-Service Penetration Testing
  • Stolen Laptop, PDAs and Cell Phones Penetration Testing
  • Source Code Penetration Testing
  • Physical Security Penetration Testing
  • Surveillance Camera Penetration Testing
  • Database Penetration Testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • Cloud Penetration Testing
  • Virtual Machine Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Mobile Devices Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • SAP Penetration Testing
  • Standards and Compliance
  • Information System Security Principles
  • Information System Incident Handling and Response
  • Information System Auditing and Certification

Labs

The ECSA course is a fully hands-on program. The exercises cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring candidates up to speed with the latest threats to which organizations are vulnerable.

This can be achieved with the EC-Council iLabs cyber range. It allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our simplistic web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available.

With iLabs, lab exercises can be accessed 24×7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing students to launch a complete Live range open for any form of hacking or testing.

Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction.

Lab 1: TCPIP Packet Analysis

  • TCP/IP Packet Analysis Using Wireshark

Lab 2: Information Gathering

  • Information Gathering

Lab 3: Vulnerability Analysis

  • Vulnerability Analysis Using the Nessus Tool

Lab 4: External Penetration Testing

  • Exploring and Auditing a Network Using Nmap

Lab 5: Internal Network Penetration Testing

  • Scanning a Local Machine for Open Ports Using TCPView
  • User Activity Monitoring and Recording Using Power Spy 2013
  • Capture Remote Interfaces Using Wireshark

Lab 6: Firewall Penetration Testing

  • HTTP Tunneling to Bypass Firewalls Using HTTPort

Lab 7: IDS Penetration Testing

  • Detecting Intrusions Using Snort
  • Intrusion Detection Using KFSensor Honeypot IDS

Lab 8: Password Cracking Penetration Testing

  • Extracting Administrator Passwords Using L0phtCrack

Lab 9: Social Engineering Penetration Testing

  • Social Engineering Penetration Testing using Social Engineering Toolkit (SET)
  • Creating an Exploit Using Metasploit for Windows 7 Penetration Testing

Lab 10: Web Application Penetration Testing

  • Hacking Web Applications

Lab 11: SQL Penetration Testing

  • SQL Injection Attacks on MS SQL Database