EC-Council Certified Security Analyst v10

Course Code: CS04

Course Objective

  •  teaches information security professionals how professional real-life penetration testing are conducted.
  •  Building on the knowledge, skills and abilities covered in the new CEH v10 program, we have simultaneously re-engineered the ECSA program as a progression from the former.
  • These skills will help you foster resiliency and continuity of operations during attacks.
  • identify different issues arising during an organization-wide security planning and how to avoid and eliminate them.

 

Target Audience

  • Ethical Hackers.
  • Penetration Testers.
  • Security Analysts.
  • Security Engineers.
  • Network Server Administrators.
  • Firewall Administrators.
  • Security Testers.
  • System Administrators.
  • Risk Assessment Professionals.

  

Course Outline

  • Introduction to Penetration Testing and Methodologies
  • Penetration Testing Scoping and Engagement Methodology
  • Open Source Intelligence (OSINT) Methodology
  • Social Engineering Penetration Testing Methodology
  • Network Penetration Testing Methodology - External
  • Network Penetration Testing Methodology - Internal
  • Network Penetration Testing Methodology - Perimeter Devices
  • Web Application Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Testing ActionsModule
  • Password Cracking Penetration Testing
  • Denial-of-Service Penetration Testing
  • Stolen Laptop, PDAs and Cell Phones Penetration Testing
  • Source Code Penetration Testing 6. Physical Security Penetration Testing
  • Surveillance Camera Penetration Testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • Virtual Machine Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • SAP Penetration Testing
  • Standards and Compliance
  • Information System Security Principles
  • Information System Incident Handling and Response
  • Information System Auditing and Certification


Register for this course


Date & Location

Date : 28 January 2024

Duration : 5 days

Place : Kuala Lumpur

Join This Course Now

Date : 03 November 2024

Duration : 5 days

Place : Cairo

Join This Course Now

download the Course file