Basic Penetration Testing - ECSA Certified Secure Analyst (v10)
I. Overview:
The ECSA program offers a seamless learning progress continuing where the CEH program left off.
The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
II. Duration: 39 hours
III. Objectives:
After completing this course, students will be able to:
- Analyze with the Penetration Testing Scoping and Engagement Methodology
- Analyze with the Open Source Intelligence (OSINT) Methodology
- Analyze with the Social Engineering Penetration Testing Methodology
- Analyze with the Network Penetration Testing Methodology
- Analyze with the Web Application Penetration Testing
- Analyze with the Database Penetration Testing Methodology
- Analyze with the Cloud Penetration Testing Methodology
- Perform advanced network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit selection, customization, launch and post exploitation maneuvers.
- Customize payloads
- Make critical decisions at different phases of a pen-testing engagement
- Perform advanced network scans beyond perimeter defenses
- Perform automated and manual vulnerability analysis
- Customization, launch, and post exploitation maneuvers
- Perform a full fledged Penetration Testing engagement
- Create a professional pen-testing report
- Demonstrate the application of penetration testing methodology presented in the ECSA program
IV. Prerequisites:
Students should attend Computer Networking & Linux Administration Fundamentals course or equivalent knowledge / experience.
V. Intended Audience:
- Ethical Hackers
- Penetration Testers
- Security Analysts
- Security Engineers
- Network Server Administrators
- Firewall Administrators
- Security Testers
- System Administrators
- Risk Assessment Professionals
VI. Course outlines:
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement Methodology
- Open Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Network Penetration Testing Methodology - External
- Network Penetration Testing Methodology - Internal
- Network Penetration Testing Methodology - Perimeter Devices
- Web Application Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Testing Actions
Online
At Ho Chi Minh City
At Ha Noi