EC-COUNCIL CERTIFICATION

Power the next e-revolution by improving website traffic and online visibility with scalable, result-driven
EC-COUNCIL CERTIFICATION strategies and techniques that enable businesses to be on the top of the digital game.
ECSA Training & Certification
The EC-Council ECSA V10 pentest (penetration) program takes the tools and techniques you learned in the CEH Certified Ethical Hacker course V10 (CEH V10 ) and enhances your skills, ability into full exploitation by teaching you how to apply the skills and techniques learned in the CEH V10 by utilizing EC-Council’s published penetration testing skills, and methodology. It focuses on ECSA V10 pentesting methodology with an advance emphasis on full hands-on learning.
The ECSA V10 penetration testing (pentest) course provides you with a full and real world hands-on penetration testing experience and it is a globally recognised and accepted hacking and penetration testing class available that fully covers the testing (pentesting) of modern infrastructures, operating systems and application environments while teaching the students how to make the documents and how to write a penetration testing report.
Topics Covered
  • The Need for Security Analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Techniques
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Pen Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell phones Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Blue Tooth and Hand held Device Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Licensed Penetration Tester
  • Standards and Compliance      
Want to start a project? Let's Consult