IT TRAINING

EC-Council Certified Security Analyst

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hackingand Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

The EC-Council Certified Security Analyst (ECSA) program teaches various penetration testing and security auditing methodologies. Licensed Penetration Tester (LPT) program teaches the report writing skills of the professional pen tester. The LPT program was also designed to evaluate the student’s capabilities of performing penetration tests in real-time scenarios on an active cyber range.

Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification

Who needs to attend

Who needs to attend?
Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

what you will learn

What you will learn

  • Need for Security Analysis
  • TCP/IP Packet Analysis
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre-penetration Testing Steps
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Web Application Penetration Testing
  • SQL Penetration Testing
  • Penetration Testing Reports and Post Testing Actions
Prerequisites

Prerequisites
There are no prerequisites required for this course.

Follow on
There are no follow-ons for this course.

Certification programs
There are no certifications associated with this course.