EC Council Certified Security Analyst Training | Earn the Best IT Security Certification; CSA & LPT from EC-Council

Certified Security Analyst Course Description

If you are a security professional & looking to value add yourself with continuous learning, then EC-Council Certified Security Analyst credential is a must have certification to your cap.

The ECSA penetration tester course was designed by professionals to teach ethical hackers how to apply their hacking skills (Not limited to but including The Five Phases of Ethical Hacking) in a pen test scenario. 

he ECSA Training course readies students for EC-Council's CSA certificate exam which validates information security professionals' understanding of and experience with, conducting realistic penetration tests. With top experts and an interactive, lab-filled environment, students learn advanced knowledge and experience regarding the available methodologies, tools, and techniques which are required to perform comprehensive information security penetration tests. Students gain practical experience with the Licensed Penetration Tester in order to perform the intensive assessments required to effectively identify and mitigate risks to an infrastructure's security. 

Certified Security Analyst Course Learning Outcomes

  • Perform Network And Application Penetration Testing Using Both Automated And Manual Techniques
  • Design And Perform Audits Of Computer Systems To Ensure They Are Operating Securely And That Data Is Protected From Both Internal And External Threats
  • Assess Assigned System To Determine System Security Status
  • Design And Recommend Security Policies And Procedures
  • Ensure Compliance To Policies And Procedures
  • Evaluate Highly Complex Security Systems According To Industry Best Practices To Safeguard Internal Information Systems And Databases
  • Lead Investigations Of Security Violations And Breaches And Recommend Solutions; Prepare Reports On Intrusions As Necessary And Provide An Analysis Summary For Management
  • Respond To More Complex Queries And Request For Computer Security Information And Report From Both Internal And External Customers

Certified Security Analyst Training - Suggested Audience

This training is aimed at IT Security & administration professionals. Suggested attendees are:
  • Network Server Administrators
  • Firewall Administrators
  • Information Security Analysts
  • System Administrators
  • Risk Assessment
  • Systems Administrators
  • Security Testers
  • Risk Assessment Professionals
  • Network Security Analysts
  • Penetration Testers
  • Incident Management Analysts

Certified Security Analyst Training Duration

  • Open-House F2F (Public): 5 days
  • In-House F2F (Private): 5 days, for commercials please send us an email with group size to

Certified Security Analyst Training - Prerequisites

  • CEH would be a added bonus, but not mandatory.
  • Experience in IT Security Environment.

This Certified Security Analyst training course outline includes:

  • Module 1: The Need for Security Analysis
  • Module 2: Advanced Googling
  • Module 3: TCP/IP Packet Analysis
  • Module 4: Advanced Sniffing Techniques
  • Module 5: Vulnerability Analysis with Nessus
  • Module 6: Advanced Wireless Testing
  • Module 7: Designing a DMZ
  • Module 8: Snort Analysis
  • Module 9: Log Analysis
  • Module 10: Advanced Exploits and Tools
  • Module 11: Penetration Testing Methodologies
  • Module 12: Customers and Legal Agreements
  • Module 13: Penetration Testing Planning and Scheduling
  • Module 14: Pre Penetration Testing Checklist
  • Module 15: Information Gathering
  • Module 16: Vulnerability Analysis
  • Module 17: External Penetration Testing
  • Module 18: Internal Network Penetration Testing
  • Module 19: Router Penetration Testing
  • Module 20: Firewall Penetration Testing
  • Module 21: IDS Penetration Testing
  • Module 22: Wireless Network Penetration Testing
  • Module 23: Denial of Service Penetration Testing
  • Module 24: Password Cracking Penetration Testing
  • Module 25: Social Engineering Penetration Testing
  • Module 26: Stolen Laptop Penetration Testing
  • Module 27: Application Penetration Testing
  • Module 28: Physical Security Penetration Testing
  • Module 29: Database Penetration testing
  • Module 30: VoIP Penetration Testing
  • Module 31: VPN Penetration Testing
  • Module 32: Penetration Testing Report Analysis
  • Module 33: Penetration Testing Report and Documentation Writing
  • Module 34: Penetration Testing Deliverables and Conclusion
  • Module 35: Ethics of a Licensed Penetration Tester

Keny White


Keny White is Professor of the Department of Computer Science at Boston University, where he has been since 2004. He also currently serves as Chief Scientist of Guavus, Inc. During 2003-2004 he was a Visiting Associate Professor at the Laboratoire d'Infomatique de Paris VI (LIP6). He received a B.S. from Cornell University in 1992, and an M.S. from the State University of New York at Buffalo.


After working as a software developer and contractor for over 8 years for a whole bunch of companies including ABX, Proit, SACC and AT&T in the US, He decided to work full-time as a private software trainer. He received his Ph.D. in Computer Science from the University of Rochester in 2001. "What I teach varies from beginner to advanced and from what I have seen, anybody can learn and grow from my courses".


Average Rating

1 rating

Detailed Rating

5 stars
4 stars
3 stars
2 stars
1 star

    This is great

    I really love the course editor in LearnPress. It is never easier when creating courses, lessons, quizzes with this one. It's the most useful LMS WordPress plugin I have ever used. Thank a lot! Testing quiz is funny, I like the sorting choice question type most.