For Queries. Please Contact Us at 044 4322 7001; 97911 79307
What We Teach - EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst v9 (ECSA v9)
- The Need for Security Analysis
- Advanced Googling
- TCP/IP Packet Analysis
- Advanced Sniffing Techniques
- Vulnerability Analysis with Nessus
- Advanced Wireless Testing
- Designing a DMZ
- Snort Analysis
- Log Analysis
- Advanced Exploits and Tools
- Penetration Testing Analysis
- Customer and Legal Agreements
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre Penetration Testing Checklist
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Routers and Switches Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Wireless Network Penetration Testing
- Denial of Service Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Stolen Laptop, PDAs and Cell Phones Penetration Testing
- Application Penetration Testing
- Physical Security Penetration Testing
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Blue Tooth and Hand Held Device Penetration Testing
- Telecommunication and Broadband Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- Penetration Testing Deliverables and Conclusion
- Penetration Testing Report and Documentation Writing
- Penetration Testing Repot Analysis
- Post Testing Analysis
- Ethics of Licensed Penetration Tester
- Standards and Compliance