EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)

About The Course

ecsa-cybervault-cyber-vaults-it-jobs-ceh-chfi-cissp-training-courses-security-service-kothrud-pune

The ECSA penetration testing certification is a security credential like no other!

The ECSA penetration testing course conducted at Cybervault pune provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

Cybervault Securities Solutions Pvt. Ltd. Pune is the best institute in Pune for ECSA and provides the best training in accordance to International EC Council norms.

About the Program

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

  • Focuses on pentesting methodology with an emphasis on hands-on learning
  • The exam will now have a prerequisite of submitting a pentesting report
  • The goal of these changes is to make passing ECSA more difficult; therefore making it a more respected certification

ECSA V10 Exam info:

  • Credit Towards Certification: ECSA v9   ( REPLACE ECSA v9 with ECSA V10 )
  • Number of Questions: 150
  • Passing Score: 70%
  • Test Duration: 4 Hours

Who Is the Course For?

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

SYLLABUS

  1. Introduction to Penetration Testing and Methodologies
  2. Penetration Testing Scoping and Engagement Methodology
  3. Open Source Intelligence (OSINT) Methodology
  4. Social Engineering Penetration Testing Methodology
  5. Network Penetration Testing Methodology – External
  6. Network Penetration Testing Methodology – Internal

7. Network Penetration Testing Methodology – Perimeter Devices
8. Web Application Penetration Testing Methodology
9. Database Penetration Testing Methodology
10. Wireless Penetration Testing Methodology
11. Cloud Penetration Testing Methodology
12. Report Writing and Post Testing Actions