EC-Council

Certified Security Analyst

E|CSA

Certified Security Analyst (E|CSA)

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

Training at a glance

Level

Intermediate

Duration

5 Days

Experience

3 years: CEH

Average Salary

$72,000

Labs

Yes

Level

Intermediate

Duration

5 Days

Experience

3 years: CEH

Average Salary

$72,000

Labs

Yes

Training Details

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.

Acquired Skills

  • Network Penetration Testing
  • Identify security issues in network design and implementation
  • Web Application Penetration Testing
  • Detect security issues in web applications that exists due to insecure design and development practices
  • Social Engineering Penetration Testing
  • Identify employees that do not properly authenticate, follow, validate, handle, the processes and technology
  • Wireless Penetration Testing
  • Identify misconfigurations in organization’s wireless infrastructure including WLAN, Mobile
  • Cloud Penetration Testing
  • Determine security issues in organization’s cloud infrastructure
  • Database Penetration Testing
  • Identify security issues in the configuration of database server and their instances

Module 00: Penetration Testing Essential Concepts (Self-Study)
Module 01: Introduction to Penetration Testing and Methodologies
Module 02: Penetration Testing Scoping and Engagement Methodology
Module 03: Open-Source Intelligence (OSINT) Methodology
Module 04: Social Engineering Penetration Testing Methodology
Module 05: Network Penetration Testing Methodology – External
Module 06: Network Penetration Testing Methodology – Internal
Module 07: Network Penetration Testing Methodology – Perimeter Devices
Module 08: Web Application Penetration Testing Methodology
Module 09: Database Penetration Testing Methodology
Module 10: Wireless Penetration Testing Methodology
Module 11: Cloud Penetration Testing Methodology
Module 12: Report Writing and Post Testing Actions

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
  • Certified Ethical Hacker (CEH v10) certification is not required but strongly recommended as a prerequisite to attending this course.

Upcoming Classes

OUR EC-COUNCIL AWARDS AND ACCREDITATIONS

Not only are we an EC-Council Accredited Training Center on a global level, but we have also received the EC-Council Academia Circle of Excellence Award for three years running. We also employ EC-Council award-winning Circle of Excellence instructors! As a result, your EC-Council training experience will be both superior and successful.

Accredited Training Center

Due to our expertise in security-based training, we deliver Authorized EC-Council Official Curriculum classes due to being an Accredited Training Center

Academic Training Partner

Through our university partnerships we are an EC-Council Accredited Academic Training partner. We strive to achieve academic excellence!

Circle of Excellence

We are honored to have received the EC-Council Academic Circle of Excellence Award in 2017! This award is also coupled with a multi-year EC-Council Circle of Excellence instructor. A winning combination!

We Offer More Than Just EC-Council Training

Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.

Strategic Planning & Project Management

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.

IT & Cybersecurity

ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.

Leadership & Management

Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.

From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.