CEH Training

EC-Council Certified Security Analyst(ECSA V10) TRAINING & Certification

The ECSA program offers a seamless learning progress continuing where the CEH program left off.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

EC-Council Certified Security Analyst V10

CEH Training

Course Description

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.

Who Should Attend

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

Modules Covered

  • Penetration Testing Essential Concepts (Student Introducation)
  • Introduction to Penetration Testing and Methodologies
  • Penetration Testing Scoping and Engagement Methodology
  • Open-Source Intelligence (OSINT) Methodology
  • Social Engineering Penetration Testing Methodology
  • Network Penetration Testing Methodology – External
  • Network Penetration Testing Methodology – Internal
  • Network Penetration Testing Methodology – Perimeter Devices
  • Web Application Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Testing Actions

Course Duration

  • Fast Track : 5 Days (8 Hours/Day)

CEH Exam Certification Info

  • Credit Towards Certification: ECSA v10
  • Number of Questions: 150
  • Exam Duration : 4 Hours
  • Passing Score : 70%

Kit Include

  • EC-Council authorized Electronic Courseware, Lab Manuals & Tools
  • ECSA v10 Certification from EC-Council (After clearing the exam)
  • Information Security Analyst authorized certificate from Codec Networks

Post Training Program (Codec Networks Specialty)

  • One Live Project Work
  • Extensive Exam Preparation Classroom Training (4 Classes)
  • Hand-over Labs & Practical´s Checklist for review

Why Codec Networks

Codec Networks provides the Best Ethical Hacking Training in Delhi NCR . Here we have an environment exactly like the actual one where they will be taught how to perform information gathering, scanning, getting access i.e. hacking, maintaining access, clearing tracks as well as how to secure their own networks. We have intensive lab environment where the student will gain practical knowledge with reference to the current security attacks and threats scenarios well-built simulated lab where the students can perform the practical under the supervision of experienced trainers who are working in the cybersecurity domains. The whole concept is to provide practical knowledge along with concept clearing in Cyber Security which is useful from career perspective in the organisation as well as for the security enthusiasts, entrepreneur. At the end of training students will have a good understanding and hands on experience in IT Security.

EC-Council Certified Security Analyst (Practical)

CEH Practical training

About the EC-Council Certified Security Analyst (Practical)

The preparatory course for this certification is the EC-Council Certified Security Analyst (ECSA) course. While there is no additional course or training required after the ECSA, we strongly recommend that you attempt the ECSA (Practical) exam only if you have attended the current ECSA course/equivalent. The aim of this credential is to help set gifted penetration testing practitioners apart from the crowd.

ECSA (Practical) presents you with an organization and its network environment, containing multiple hosts. The internal network consists of several subnets housing various organizational units. It is made up of militarized and demilitarized zones, connected with a huge pool of database servers in a database zone. As a security precaution, and by design, all the internal resource zones are confi­gured with different subnet IPs. The militarized zone houses the domain controllers and application servers that provide application frameworks for various departments of the organization.

The ECSA (Practical) tests your ability to perform threat and exploit research, understand exploits in the wild, write your own exploits, customize payloads, and make critical decisions at different phases of a pen testing engagement that can make or break the whole assessment. You will also be required to create a professional pen testing report with essential elements and guidance for the organization in the scenario to act on.

Objective

  • Perform advanced network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit selection, customization, launch and post exploitation maneuvers.
  • Customize payloads.
  • Make critical decisions at different phases of a pen-testing engagement.
  • Perform advanced network scans beyond perimeter defenses.
  • Perform automated and manual vulnerability analysis.
  • Customization, launch, and post exploitation maneuvers.
  • Perform a full fledged Penetration Testing engagement.
  • Perform a full fledged Penetration Testing engagement.
  • Demonstrate the application of penetration testing methodology presented in the ECSA program.

Eligibility Criteria

  • Be an ECSA member in good standing (Your USD 100 application fee will be waived);
  • or Have a minimum of 2 years working experience in InfoSec domain (You will need to pay USD 100 as a non-refundable application fee);
  • or Have any other industry equivalent certifications such as OSCP or GPEN cert (You will need to pay USD 100 as a non-refundable application fee).