EC-Council Certified Security Analyst

Code : ECSAv10

Version : 10.0
Durée (j) : 5
Durée (h) : 40
Prix HT : 2014 €
Prix CLC HT : Accepté

 

Nos prochaines dates en e-learning :
a venir

 

5 jours pour

 

  • Introduction to Penetration Testing and Methodologies
  • Penetration Testing Scoping and Engagement Methodology
  • Open Source Intelligence (OSINT) Methodology
  • Social Engineering Penetration Testing Methodology
  • Network Penetration Testing Methodology – External
  • Network Penetration Testing Methodology – Internal
  • Network Penetration Testing Methodology – Perimeter Devices
  • Web Application Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Testing Actions

 

A qui s’adresse ce cours ?

 

  • Ethical Hackers,
  • Penetration Testers,
  • Security Analysts,
  •  Security Engineers,
  •  Network Server Administrators,
  •  Firewall Administrators,
  •  Security Testers, System
  •  Administrators,
  •  Risk Assessment Professionals.

 

Déroulement du stage

  1. Penetration Testing Essential Concepts This is an Essential Prerequisite as it helps you to prepares you the ECSA courseware. Serves as a base to build Advanced Pen Testing Concepts
  2. Password Cracking Penetration Testing
  3. Denial-of-Service Penetration Testing
  4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing 6. Surveillance Camera Penetration Testing
  7. VoIP Penetration Testing
  8. VPN Penetration Testing
  9. Virtual Machine Penetration Testing
  10. War Dialing
  11. Virus and Trojan Detection
  12. Log Management Penetration Testing
  13. File Integrity Checking
  14. Telecommunication and Broadband Communication Penetration Testing
  15. Email Security Penetration Testing
  16. Security Patches Penetration Testing
  17. Data Leakage Penetration Testing
  18. SAP Penetration Testing
  19. Standards and Compliance
  20. Information System Security Principles
  21. Information System Incident Handling and Response
  22. Information System Auditing and Certification

 

 

Sanction

 

Contacts:

info@learneo.com
01 53 20 37 00