A “Professional” level course, with the Certified Ethical Hacker being the “Core” level certification. A globally recognized certification that can verify an individual’s penetration testing capabilities.
You are an ethical hacker. In fact, you are a Certified Ethical Hacker. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.
Is that enough?
Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client? Do you have any experience writing a custom penetration testing report?
The ECSA course provides the student with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques learned in the Certified Ethical Hacker course (CEH) and elevates the students‘ ability into full exploitation by teaching them how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.
This course is aimed to:
To be eligible to attempt the exam, candidates are required to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found.
The certification exam has the following characteristics:
Candidates must submit reports to the required standards.
It is a web-based exam, proctored online through the EC-Council Exam portal.
Credit Towards Certification: ECSA v9
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 hours
The course has the following topics:
Security Analysis and Penetration Testing Methodologies
TCP IP Packet Analysis
Pre-penetration Testing Steps
Information Gathering Methodology
External Network Penetration Testing Methodology
Internal Network Penetration Testing Methodology
Firewall Penetration Testing Methodology
IDS Penetration Testing Methodology
Web Application Penetration Testing Methodology
SQL Penetration Testing Methodology
Database Penetration Testing Methodology
Wireless Network Penetration Testing Methodology
Mobile Devices Penetration Testing Methodology
Cloud Penetration Testing Methodology
Report Writing and Post Test Actions
Our instructors are certified in different EC Council, Information Security, Cloud Computing and Risk Management disciplines and have an extensive experience in:
The design and implementation of Information Security Management Systems in the private and in the public sector.
The selection, implementation and configuration of tools and controls which support the Information Security management and which are the ones of most standing and acknowledgement in the market.
First and second level audits for Information Security Management Systems.
Teaching various ITSM, ISO, Information Security and Risk Management courses in the academic and professional field.
The participant receives a high quality, didactic material in English developed by EC- Council.
For more information about this training course (schedules, locations, costs, etc.) or any of the other IT training courses we offer, please contact us. We will be happy to assist you!