Menu
  • LOGIN
  • No products in the cart.

Certified Security Analyst Course Description

If you are a security professional & looking to value-add yourself with continuous learning, then EC-Council Certified Security Analyst credential is a must have certification to your cap.

The ECSA penetration tester course was designed by professionals to teach ethical hackers how to apply their hacking skills (Not limited to but including The Five Phases of Ethical Hacking) in a pen test scenario.

he ECSA Training course readies students for EC-Council’s CSA certificate exam which validates information security professionals’ understanding of and experience with, conducting realistic penetration tests. With top experts and an interactive, lab filled environment, students learn advanced knowledge and experience regarding the available methodologies, tools, and techniques which are required to perform comprehensive information security penetration tests. Students gain practical experience with the Licensed Penetration Tester in order to perform the intensive assessments required to effectively identify and mitigate risks to an infrastructure’s security.

 

Certified Security Analyst Course Learning Outcomes;

  • Perform Network And Application Penetration Testing Using Both Automated And Manual Techniques.
  • Design And Perform Audits Of Computer Systems To Ensure They Are Operating Securely And That Data Is Protected From Both Internal And External Threats.
  • Assess Assigned System To Determine System Security Status.
  • Design And Recommend Security Policies And Procedures.
  • Ensure Compliance To Policies And Procedures.
  • Evaluate Highly Complex Security Systems According To Industry Best Practices To Safeguard Internal Information Systems And Databases.
  • Lead Investigations Of Security Violations And Breaches And Recommend Solutions; Prepare Reports On Intrusions As Necessary And Provide An Analysis Summary For Management.
  • Respond To More Complex Queries And Request For Computer Security Information And Report From Both Internal And External Customers

 

Certified Security Analyst Training – Suggested Audience

This training is aimed at IT Security & administration professionals. Suggested attendees are:

  • Network Server Administrators.
  • Firewall Administrators.
  • Information Security Analysts.
  • System Administrators.
  • Risk Assessment.
  • Systems Administrators.
  • Security Testers.
  • Risk Assessment Professionals.
  • Network Security Analysts.
  • Penetration Testers.
  • Incident Management Analysts

 

Certified Security Analyst Training – Prerequisites

  • CEH would be a added bonus, but not mandatory.
  • Experience in IT Security Environment.

 

Certified Security Analyst In-house/Corporate Training

If you have a group of 5-6 participants, apply for in-house training. For commercials please send us an email with group size to hello@pincorps.com

Course Curriculum

Module 1: The Need for Security Analysis
Module 2: Advanced Googling
Module 3: TCP/IP Packet Analysis
Module 4: Advanced Sniffing Techniques
Module 5: Vulnerability Analysis with Nessus
Module 6: Advanced Wireless Testing
Module 7: Designing a DMZ
Module 8: Snort Analysis
Module 9: Log Analysis
Module 10: Advanced Exploits and Tools
Module 11: Penetration Testing Methodologies
Module 12: Customers and Legal Agreements
Module 13: Penetration Testing Planning and Scheduling
Module 14: Pre Penetration Testing Checklist
Module 15: Information Gathering
Module 16: Vulnerability Analysis
Module 17: External Penetration Testing
Module 18: Internal Network Penetration Testing
Module 19: Router Penetration Testing
Module 20: Firewall Penetration Testing
Module 21: IDS Penetration Testing
Module 22: Wireless Network Penetration Testing
Module 23: Denial of Service Penetration Testing
Module 24: Password Cracking Penetration Testing
Module 25: Social Engineering Penetration Testing
Module 26: Stolen Laptop Penetration Testing
Module 27: Application Penetration Testing
Module 28: Physical Security Penetration Testing
Module 29: Database Penetration testing
Module 30: VoIP Penetration Testing
Module 31: VPN Penetration Testing
Module 32: Penetration Testing Report Analysis
Module 33: Penetration Testing Report and Documentation Writing
Module 34: Penetration Testing Deliverables and Conclusion
Module 35: Ethics of a Licensed Penetration Tester

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

X