EC Council Certified Security Analyst (ECSA)
Details
The ECSA certification will lead you to the Licensed Penetration Tester certification.
You Will Learn How To:
- How to design, secure and test networks
- Perform the intensive assessments to identify and mitigate risks to the IT infrastructure
- Identify security problems and how to avoid and eliminate them.
This ECSA course will significantly benefit the following:
- Network server administrators,
- Firewall Administrators
- Security Testers
- System Administrators
- Risk Assessment professionals
- Penetration Testers
Outline
- The Need for Security Analysis
- Advanced Googling
- TCP/IP Packet Analysis
- Advanced Sniffing Techniques
- Vulnerability Analysis with Nessus
- Advanced Wireless Testing
- Designing a DMZ
- Snort Analysis
- Log Analysis
- Advanced Exploits and Tools
- Penetration Testing Methodologie
- Customers and Legal Agreements
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre Penetration Testing Checklist
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Routers and Switches Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Wireless Network Penetration Testing
- Denial of Service Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Stolen Laptop, PDAs and Cell phones Penetration Testing
- Application Penetration Testing
- Physical Security Penetration Testing
- Database Penetration testing
- VoIP Penetration Testing
- VPN Penetration Testing
- War Dialing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Blue Tooth and Hand held Device Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- Penetration Testing Deliverables and Conclusion
- Penetration Testing Report and Documentation Writing
- Penetration Testing Report Analysis
- Post Testing Actions
- Ethics of a Licensed Penetration Tester
- Standards and Compliance
Speaker/s
He is considered an expert instructor for EC-Council in Malaysia and has been awarded EC-Council Instructor of the Year for the past 5 years. He holds numerous certifications in various IT fields including Certified Ethical Hacker, Certified Hacking
Forensic Investigator, Microsoft Certified Trainer, CCNP, and PMP. Nimalan holds a degree in B.S. Telecommunications and Computer Engineering.
ActiveLearning, Inc. is the Philippines' leading provider of Information Technology and Project Management education, where thousands of students take courses from Application Development to Project Management to Network Security, and much more. Our courses are taught by expert instructors, and learning is enhanced through a blend of in-depth lectures, workshops, and hands-on exercises.
Expert Instructors
Learn from expert instructors who practice what they teach. Our instructors are involved in constant research and development, who constantly apply the lessons they teach, and who know the same technical issues you face every day.
Superior Courseware
Our courseware go through rigorous evaluation before they are released for instruction. By constantly monitoring industry developments, we make sure that you get course materials that are up to date.
Interactivity
More than just classroom lectures, practical, hands-on exercises are carefully developed for you to immediately put in to practice what you learn. By being immersed in a classroom setting, you get to participate, inquire, and be involved - all essential in expediting the learning process. Aspects you won't find in Computer-Based-Training and self-study. ...