EC-Council Certified Security Analyst (ECSA)



Similar documents
Hackers are here. Where are you?

Hackers are here. Where are you?

Analyze. Secure. Defend. Do you hold ECSA credential?

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Configuring, Managing, and Maintaining Server 2008 R2

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Title: Penetration Testing: Security Analysis

CRYPTUS DIPLOMA IN IT SECURITY

Certified Ethical Hacker (CEH)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

DUCC-CVP v8.0 - Deploying Unified Contact Center Enterprise v8.0 with CVP

Networking: EC Council Network Security Administrator NSA

Training Course ECSA/LPT

Active Directory Services with Windows Server

Troubleshooting TCP/IP Networks with Wireshark

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Certified Security Analyst

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

UCCXA - Cisco Unified Contact Center Express Advanced v4

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Penetration testing & Ethical Hacking. Security Week 2014

EC Council Certified Ethical Hacker V8

CyberNEXS Global Services

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Footprinting and Reconnaissance Tools

Network/Internet Forensic and Intrusion Log Analysis

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Detailed Description about course module wise:

Information Security. Training

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

EC-Council. Program Brochure. EC-Council. Page 1

Virtual Learning Tools in Cyber Security Education

IDS and Penetration Testing Lab ISA656 (Attacker)

The Open Cyber Challenge Platform *

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Vulnerability Assessment and Penetration Testing

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Course Title: Course Description: Course Key Objective: Fee & Duration:

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Hosts HARDENING WINDOWS NETWORKS TRAINING

INFORMATION SECURITY TRAINING CATALOG (2015)

IDS and Penetration Testing Lab ISA 674

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

QOS - Implementing Cisco Quality of Service

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

How To Prevent Hacker Attacks With Network Behavior Analysis

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Learn Ethical Hacking, Become a Pentester

Introduction to Cyber Security / Information Security

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

[CEH]: Ethical Hacking and Countermeasures

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

InfoSec Academy Pen Testing & Hacking Track

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

CIS 4204 Ethical Hacking Fall, 2014

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Network Security Administrator

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Penetration Testing. Presented by

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

ECSA/LPT v8. Product Marketing Slides. Designed by Security Auditors. Presented by Professionals.

Ethical Hacking Course Layout

Understanding Security Testing

Access FedVTE online at: fedvte.usalearning.gov

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

LINUX / INFORMATION SECURITY

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Information Technology Career Cluster Advanced Cybersecurity Course Number:

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Cisco IPS Tuning Overview

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Jort Kollerie SonicWALL

Transcription:

EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for the ECSA and LPT certifications. The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct realistic penetration tests by using EC-Council's published penetration testing methodology. This course is a five-day hands-on training program that uses real-time scenarios. In this course, you will learn about penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally. Why EC-Council Certified Security Analyst is Best Presents industry accepted comprehensive penetration testing standards on 44 domains Covers advanced topics such as mobile, cloud, and virtual machine penetration testing Completely maps to the National Initiative for Cybersecurity Education (NICE)'s workforce framework, which includes: Protect and defend Operate and collect Analyze specialty area Covers all the requirements of National Information Assurance Training Standard For Information Systems Security Officers (CNSS - 4014) and National Training Standard for System Certifiers (NSTISSI - 4015) Benefits of Becoming ECSA Data security program-advanced penetration testing The curriculum is backed by and designed by the best in the field Students earn greater industry acceptance as seasoned security professionals Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques. The ECSA sets students on the path toward achieving the LPT certification Certification: EC-Council Certified Security Analyst (ECSA) Licensed Penetration Tester (LPT) The ECSA program provides one voucher to sit for the ECSA v8 exam. The ECSA certificate is provided on successfully passing the online ECSA exam. The ECSA sets students on the path toward achieving the Licensed Penetration Tester (LPT) certification. Access Your Class Recording for Six Months

Enjoy six months of access to a fully indexed and searchable recording of your class when you choose our Virtual Classroom Live learning experience. What You'll Learn Perform network and application penetration testing using both automated and manual techniques Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats Assess assigned system to determine system security status Design and recommend security policies and procedures Ensure compliance to policies and procedures Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management Respond to more complex queries and request for computer security information and report from both internal and external customers Who Needs to Attend Network server administrators Firewall administrators Information security analysts System administrators Risk assessment professionals Prerequisites While the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement of the ECSA course. Follow-On Courses There are no follow-ons for this course. Certification Programs and Certificate Tracks This course is part of the following programs or tracks: EC-Council Certified Security Analyst and EC-Council Licensed Penetration Tester Course Outline Core Modules 1. Need for Security Analysis 2. TCP IP Packet Analysis 3. Penetration Testing Methodologies 4. Customers and Legal Agreements 5. Rules of Engagement 6. Penetration Testing Planning and Scheduling

7. Pre-penetration Testing Steps 8. Information Gathering 9. Vulnerability Analysis 10. External Penetration Testing 11. Internal Network Penetration Testing 12. Firewall Penetration Testing 13. IDS Penetration Testing 14. Password Cracking Penetration Testing 15. Social Engineering Penetration Testing 16. Web Application Penetration Testing 17. SQL Penetration Testing 18. Penetration Testing Reports and Post Testing Actions Self-Study Modules 19. Router and Switches Penetration Testing 20. Wireless Network Penetration Testing 21. Denial-of-Service Penetration Testing 22. Stolen Laptop, PDAs and Cell Phones Penetration Testing 23. Source Code Penetration Testing 24. Physical Security Penetration Testing 25. Surveillance Camera Penetration Testing 26. Database Penetration Testing 27. VoIP Penetration Testing 28. VPN Penetration Testing 29. Cloud Penetration Testing 30. Virtual Machine Penetration Testing 31. War Dialing 32. Virus and Trojan Detection 33. Log Management Penetration Testing

34. File Integrity Checking 35. Mobile Devices Penetration Testing 36. Telecommunication and Broadband Communication Penetration Testing 37. Email Security Penetration Testing 38. Security Patches Penetration Testing 39. Data Leakage Penetration Testing 40. SAP Penetration Testing 41. Standards and Compliance 42. Information System Security Principles 43. Information System Incident Handling and Response 44. Information System Auditing and Certification Labs The ECSA course is a fully hands-on program. The exercises cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring candidates up to speed with the latest threats to which organizations are vulnerable. This can be achieved with the EC-Council ilabs cyber range. It allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. Our simplistic web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available. With ilabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it's convenient. Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art "Open Environment" allowing students to launch a complete Live range open for any form of hacking or testing. Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction. Lab 1: TCPIP Packet Analysis TCP/IP Packet Analysis Using Wireshark Lab 2: Information Gathering Information Gathering Lab 3: Vulnerability Analysis Vulnerability Analysis Using the Nessus Tool Lab 4: External Penetration Testing Exploring and Auditing a Network Using Nmap

Lab 5: Internal Network Penetration Testing Scanning a Local Machine for Open Ports Using TCPView User Activity Monitoring and Recording Using Power Spy 2013 Capture Remote Interfaces Using Wireshark Lab 6: Firewall Penetration Testing HTTP Tunneling to Bypass Firewalls Using HTTPort Lab 7: IDS Penetration Testing Detecting Intrusions Using Snort Intrusion Detection Using KFSensor Honeypot IDS Lab 8: Password Cracking Penetration Testing Extracting Administrator Passwords Using L0phtCrack Lab 9: Social Engineering Penetration Testing Social Engineering Penetration Testing using Social Engineering Toolkit (SET) Creating an Exploit Using Metasploit for Windows 7 Penetration Testing Lab 10: Web Application Penetration Testing Hacking Web Applications Lab 11: SQL Penetration Testing SQL Injection Attacks on MS SQL Database Bilginç IT Academy Telefon: 0212 282 77 00 Fax: 0212 282 77 04 E-posta: info@bilginc.com Adres: Huzur Mahallesi Fatih Caddesi No:67 Kat:4 4.Levent/İstanbul