EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Similar documents
Course Title: Penetration Testing: Security Analysis

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA)

Hackers are here. Where are you?

Hackers are here. Where are you?

Analyze. Secure. Defend. Do you hold ECSA credential?

Training Course ECSA/LPT

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

CRYPTUS DIPLOMA IN IT SECURITY

Certified Ethical Hacker (CEH)

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Networking: EC Council Network Security Administrator NSA

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CYBERTRON NETWORK SOLUTIONS

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Information Security. Training

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

INFORMATION SECURITY TRAINING CATALOG (2015)

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Course Title Penetration Testing: Procedures & Methodologies

Linux Network Security

NETWORK PENETRATION TESTING

Build Your Own Security Lab

IDS and Penetration Testing Lab ISA656 (Attacker)

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

A Decision Maker s Guide to Securing an IT Infrastructure

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Network Security Administrator

Chapter 1 The Principles of Auditing 1

Security Testing: Step by Step System Audit with Rational Tools. First Presented for:

Access FedVTE online at: fedvte.usalearning.gov

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Network/Internet Forensic and Intrusion Log Analysis

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

CompTIA Network+ (Exam N10-005)

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Ethical Hacking Course Layout

An Introduction to Network Vulnerability Testing

Troubleshooting TCP/IP Networks with Wireshark

Windows Operating Systems. Basic Security

Course Title: Course Description: Course Key Objective: Fee & Duration:

Detailed Description about course module wise:

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

eeye Digital Security Product Training

Penetration testing & Ethical Hacking. Security Week 2014

Fundamentals of a Windows Server Infrastructure MOC 10967

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Description: Objective: Attending students will learn:

NETWORK SECURITY (W/LAB) Course Syllabus

Introduction to Cyber Security / Information Security

WHITE PAPER. An Introduction to Network- Vulnerability Testing

!!!!!!!!!!!!!!!!!!!!!!

[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Open Source Security Tools

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

ICANWK406A Install, configure and test network security

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Global Partner Management Notice

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Principles of Information Assurance Syllabus

Microsoft Technologies

Certified Security Analyst

Security Considerations White Paper for Cisco Smart Storage 1

Securing SIP Trunks APPLICATION NOTE.

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Network Attacks and Defenses

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

FREQUENTLY ASKED QUESTIONS

Some Tools for Computer Security Incident Response Team (CSIRT)

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Effective Software Security Management

Securing Cisco Network Devices (SND)

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

SANS Top 20 Critical Controls for Effective Cyber Defense

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Transcription:

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments. EC-Council s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics. Course Objectives The objective of a Licensed Penetration Tester is to ensure that each professional licensed by ECCouncil follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all compliance requirements required by the industry. Unlike a normal security certification, the licensed penetration tester is a program that trains security professionals to analyze the security posture of a network exhaustively and recommend corrective measures authoritatively. EC-Council's license vouches for their professionalism and expertise thereby making these professionals more sought after by organizations and consulting firms globally Intended Audience Police and other law enforcement personnel Defense and Military personnel e-business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies IT managers Course Outline Required Exam(s) 412-79 Price $2,995.00 Duration 5 days Methods of Delivery Instructor Led Distance Learning On-Site Prerequisites Required Prerequisites for this Training Package: Certified Ethical Hacker Module 1: The Need for Security Analysis What Are We Concerned About? So What Are You Trying To Protect? Why Are Intrusions So Often Successful? What Are The Greatest Challenges? In Order to Ensure... We Must Be Diligent Threat Agents Assessment Questions Risk Information Security Awareness Security policies No Simple Solutions U.S. Legislation U.K. Legislation The Data Protection Act 1998 The Human Rights Act 1998 Interception of Communications The Freedom of Information Act 2000 The Audit Investigation and Community Enterprise Act 2005

Module 2: Advanced Googling Site Operator intitle:index.of error warning login logon username userid employee.id your username is password passcode your password is admin administrator ext:html ext:htm ext:shtml ext:asp ext:php inurl:temp inurl:tmp inurl:backup inurl:bak Google Advance Search Form Categorization of the Operators Viewing Live Webcams intranet help.desk Locating Public Exploit Sites Locating Vulnerable Targets Directory Listings Object Not Found Error Messages Default Pages Searching for Passwords Goolag Scanner Features of Goolag Module 3: TCP/IP Packet Analysis TCP/IP Model Comparing OSI and TCP/IP TCP UDP Port Numbers What Makes Each Connection Unique? TCP Operation Sequencing Numbers Positive Acknowledgement and Retransmission What is IPV6? Denial of Service (DoS) Attacks Module 4: Advanced Sniffing Techniques What is Wireshark? Example Wireshark: Tshark Wireshark: Tcpdump Wireshark: Capinfos Wireshark: Idl2wrs Wireshark: Dumpcap Wireshark: Editcap Wireshark: Mergecap Wireshark: Text2pcap Upgrading Wireshark Protocol Dissection Steps to Solve GNU/ Linux Server Network Connectivity Issues Using Wireshark for Network Troubleshooting Using Wireshark for System Administration Using Wireshark for System Administration Using Wireshark for Security Administration Wireless Sniffing with Wireshark Scanning Remote Access Trojans Wireshark DNP3 Dissector Infinite Loop Vulnerability Timestamps Time zones

Module 5: Vulnerability Analysis with Nessus Nessus Nessus Assessment Process Configuring Nessus Using the Nessus Client Starting a Nessus Scan Plug-in Selection False Positives Writing Nessus Plug-ins Nessus Architecture and design Host and service detection Vulnerability fingerprinting and DoS testing Nessus User community Security Center http://www.tenablesecurity.com Nessus: Managing data How to Simplify Security Scan Wireless Scanning for WAPs and Detecting WAPs Module 6: Advanced Wireless Testing Wireless Concepts Wired Equivalent Privacy Wireless Security Technologies Attacks And Tools War Driving The Jargon WarChalking WarPumpkin Wireless: Tools of the Trade AirCrack-ng Determining Network Topology: Network View WarDriving and Wireless Penetration Testing with OS X Mapping WarDrives with StumbVerter MITM Attack Module 7: Designing a DMZ Introduction DMZ Design Fundamentals Designing a DMZ using IPtables Designing Windows DMZ Designing Sun Solaris DMZ Designing Wireless DMZ Designing Linux DMZ Protecting Internet Servers (Using DMZ Networks) DMZ Router Security Best-Practice DMZ Switch Security Best-Practice Six Ways to Stop Data Leaks Module 8: Snort Analysis Snort Overview Modes of Operation Features of Snort Configuring Snort Working of Snort The Stream4 Preprocessor Inline Functionality Writing Snort Rules

Module 9: Log Analysis Introduction to Logs Analyzing Syslog Analyzing Web Server Logs Analyzing Wired Router Logs Analyzing Wireless Network Devices Logs Analyzing Windows Logs Analyzing Unix Logs Analyzing Linux Logs Analyzing SQL Server Logs Analyzing Oracle Logs: Oracle Metric log file Analyzing Solaris System Logs Analyzing VPN Server Logs Analyzing Firewall Logs Analyzing IDS Logs Analyzing DHCP Logs NTP Configuration Log Analysis Tools Log Alert Tools Module 10: Advanced Exploits and Tools Common Vulnerabilities Tools of the Trade: Debuggers Tools of the Trade: GDB Tools of the Trade: Metasploit Tools of the Trade: Canvas Tools of the Trade: CORE Impact Microsoft Baseline Security Analyzer (MBSA) Network Security Analysis Tool (NSAT) Sunbelt Network Security Inspector (SNSI) Module 11: Penetration Testing Methodologies Module 12: Customers and Legal Agreements Module 13: Rules of Engagement Module 14: Penetration Testing Planning and Scheduling Module 15: Pre Penetration Testing Checklist Module 16: Information Gathering Module 17: Vulnerability Analysis Module 18: External Penetration Testing Module 19: Internal Network Penetration Testing Module 20: Routers and Switches Penetration Testing Module 21: Firewall Penetration Testing Module 22: IDS Penetration Testing Module 23: Wireless Network Penetration Testing Module 24: Denial of Service Penetration Testing Module 25: Password Cracking Penetration Testing Module 26: Social Engineering Penetration Testing Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing Module 28: Application Penetration Testing Module 29: Physical Security Penetration Testing Module 30: Database Penetration Testing Module 31: VoIP Penetration Testing

Module 32: VPN Penetration Testing Module 33: War Dialing Module 34: Virus and Trojan Detection Module 35: Log Management Penetration Testing Module 36: File Integrity Checking Module 37: Blue Tooth and Hand held Device Penetration Testing Module 38: Telecommunication and Broadband Communication Penetration Testing Module 39: Email Security Penetration Testing Module 40: Security Patches Penetration Testing Module 41: Data Leakage Penetration Testing Module 42: Penetration Testing Deliverables and Conclusion Module 43: Penetration Testing Report and Documentation Writing Module 44: Penetration Testing Report Analysis Module 45: Post Testing Actions Module 46: Ethics of a Licensed Penetration Tester Module 47: Standards and Compliance ECSA Labs: The Need for Security Analysis Advanced Googling TCP/IP Packet Analysis Advance Sniffing Techniques Vulnerability Analysis with Nessus Advanced Wireless Techniques Designing a DMZ Snort Analysis Log Analysis Advanced Exploits and Tools