Certified Security Analyst (CSA)
SummaryThe EC-Council Certified Security Analyst (ECSA) program teaches information security professionals to conduct realistic penetration tests by using EC-Council's published penetration testing methodology.
This course is a five-day hands-on training program that uses real-time scenarios. In this course, you will learn about penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.
PrerequisitesWhile the Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course, we strongly advise candidates to take the Certified Ethical Hacker v8 course to attain the CEH prior to the commencement of the ECSA course.
Module 1: Need for Security Analysis
Module 2: TCP IP Packet Analysis
Module 3: Penetration Testing Methodologies
Module 4: Customers and Legal Agreements
Module 5: Rules of Engagement
Module 6: Penetration Testing Planning and Scheduling
Module 7: Pre-penetration Testing Steps
Module 8: Information Gathering
Module 9: Vulnerability Analysis
Module 10: External Penetration Testing
Module 11: Internal Network Penetration Testing
Module 12: Firewall Penetration Testing
Module 13: IDS Penetration Testing
Module 14: Password Cracking Penetration Testing
Module 15: Social Engineering Penetration Testing
Module 16: Web Application Penetration Testing
Module 17. SQL Penetration Testing
Module 18. Penetration Testing Reports and Post Testing Actions