Home > Training > ECSA

Advanced Penetration Testing and Security Analysis (ECSA)

Course Description Schedule Course Outline
 

Who should attend

CEH-certified security professionals aiming for ECSA certification and LPT licensure. This is the natural next step towards professional security testing and analysis.

The ILO (Instructor-led Online) Experience:

This live, online, instructor-led training modality offers you the course in the standard "5 day" format that you are used to. The course runs from 8am to 4pm (Mountain Time Zone) for five consecutive days, and with access to the course over the internet, you can train in the comfort of your home or office.

Prerequisites

Candidates must have extensive experience with Windows® and/or Unix/Linux operating systems, along with comprehensive knowledge of TCP/IP and networking.

To achieve the LPT designation, you must also meet the following requirements:

  • Achieve Certified Ethical Hacker (CEH) Certification.
  • Achieve EC-Council Certified Security Analyst (ECSA) certification.

Course Objectives

Upon the completion of Fast Lane’s Advanced Penetration Testing and Security Analysis Course, you will know:

  • The latest exploit goals and methodologies
  • Advanced information-gathering techniques
  • Expert network discovery tools and techniques
  • Identifying and exploiting architectural weaknesses
  • Advanced enumeration of network devices, platforms and protocols
  • Cracking contemporary authentication and authorization
  • Advanced router, firewall and IDS testing
  • Exploiting IPS
  • Vulnerability research and automated scanning in the enterprise
  • The anatomy of root kits, Trojans, malware and viruses
  • Mastering Web application testing
  • Exploiting complex protocols, such as SSH, SSL, and IPSEC
  • Using payload generators
  • Advanced wireless testing tools and techniques
  • Penetration testing and “Social Engineering”
  • Penetration testing and the law

Comments

What’s included?

Only Fast Lane’s Advanced Penetration Testing and Security Analysis offers you the following benefits:

  • Five days of intense immersion training
  • Fast Lane is an EC- Council Authorized Training Partner
  • Voucher for the ECSA Certification
  • Training towards the LPT licensure (you will be required to complete licensure steps independently, but the training fulfills requirements)
  • Five CDs full of cutting-edge hacker/auditor tools, including: CD of BackTrack, the premier hacking platform and Vampireware: a Security Testing Framework
  • Online access to resource materials
  • Security tool downloads
  • Greater industry acceptance as seasoned security professional. Industry acceptance as a legal and ethical security professional
  • A comprehensive walk-through of what it takes to perform an actual pen test: from scoping to reporting
  • EC-Council's endorsement as a Licensed Penetration Testing professional allows you to practice as a penetration testing consultant internationally
  • Access to proprietary EC-Council software, templates and penetration testing methodologies
  • License to practice and conduct security testing in organizations accredited by EC-Council

NOTE: these classes are conducted using Web conferencing. The audio component is supported by both VoIP and Phone bridge.

Detailed Course Outline

Module 1: The Need for Security Analysis

Module 2: Advanced Googling

Module 3: TCP/IP Packet Analysis

Module 4: Advanced Sniffing Techniques

Module 5: Vulnerability Analysis with Nessus

Module 6: Advanced Wireless Testing

Module 7: Designing a DMZ

Module 8: Snort Analysis

Module 9: Log Analysis

Module 10: Advanced Exploits and Tools

Module 11: Penetration Testing Methodologies

Module 12: Customers and Legal Agreements

Module 13: Rules of Engagement

Module 14: Penetration Testing Planning and Scheduling

Module 15: Pre Penetration Testing Checklist

Module 16: Information Gathering

Module 17: Vulnerability Analysis

Module 18: External Penetration Testing

Module 19: Internal Network Penetration Testing

Module 20: Routers and Switches Penetration Testing

Module 21: Firewall Penetration Testing

Module 22: IDS Penetration Testing

Module 23: Wireless Network Penetration Testing

Module 24: Denial of Service Penetration Testing

Module 25: Password Cracking Penetration Testing

Module 26: Social Engineering Penetration Testing

Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing

Module 28: Application Penetration Testing

Module 29: Physical Security Penetration Testing

Module 30: Database Penetration Testing

Module 31: VoIP Penetration Testing

Module 32: VPN Penetration Testing

Module 33: War Dialing

Module 34: Virus and Trojan Detection

Module 35: Log Management Penetration Testing

Module 36: File Integrity Checking

Module 37: Blue Tooth and Hand held Device Penetration Testing

Module 38: Telecommunication and Broadband Communication Penetration Testing

Module 39: Email Security Penetration Testing

Module 40: Security Patches Penetration Testing

Module 41: Data Leakage Penetration Testing

Module 42: Penetration Testing Deliverables and Conclusion

Module 43: Penetration Testing Report and Documentation Writing

Module 44: Penetration Testing Report Analysis

Module 45: Post Testing Actions

Module 46: Ethics of a Licensed Penetration Tester

Module 47: Standards and Compliance

Classroom training

Duration: 5 days

Price:
  • US$ 2,895
Online training

Duration: 5 days

Price:
  • US$ 2,895
 
Live chat by BoldChat