Basic Penetration Testing - ECSA Certified Secure Analyst (v10)

I.      Overview:

The ECSA program offers a seamless learning progress continuing where the CEH program left off.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.

II.      Duration: 39 hours
III.      Objectives:

After completing this course, students will be able to:

  • Analyze with the Penetration Testing Scoping and Engagement Methodology
  • Analyze with the Open Source Intelligence (OSINT) Methodology
  • Analyze with the Social Engineering Penetration Testing Methodology
  • Analyze with the Network Penetration Testing Methodology
  • Analyze with the Web Application Penetration Testing
  • Analyze with the Database Penetration Testing Methodology
  • Analyze with the Cloud Penetration Testing Methodology
  • Perform advanced network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit selection, customization, launch and post exploitation maneuvers.
  • Customize payloads
  • Make critical decisions at different phases of a pen-testing engagement
  • Perform advanced network scans beyond perimeter defenses
  • Perform automated and manual vulnerability analysis
  • Customization, launch, and post exploitation maneuvers
  • Perform a full fledged Penetration Testing engagement
  • Create a professional pen-testing report
  • Demonstrate the application of penetration testing methodology presented in the ECSA program
 IV.      Prerequisites:

Students should attend Computer Networking & Linux Administration Fundamentals course or equivalent knowledge / experience.

V.      Intended Audience:
  • Ethical Hackers
  • Penetration Testers
  • Security Analysts
  • Security Engineers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment Professionals
  VI.      Course outlines:
  1. Introduction to Penetration Testing and Methodologies
  2. Penetration Testing Scoping and Engagement Methodology
  3. Open Source Intelligence (OSINT) Methodology
  4. Social Engineering Penetration Testing Methodology
  5. Network Penetration Testing Methodology - External
  6. Network Penetration Testing Methodology - Internal
  7. Network Penetration Testing Methodology - Perimeter Devices
  8. Web Application Penetration Testing Methodology
  9. Database Penetration Testing Methodology
  10. Wireless Penetration Testing Methodology
  11. Cloud Penetration Testing Methodology
  12. Report Writing and Post Testing Actions
  • Online

  • At Ho Chi Minh City

  • At Ha Noi


Other courses